FESR www.trigrid.it Trinacria Grid Virtual Laboratory Grid Industry Day Catania 26-27 October 2006 Secure Data Storage Into Grid Enviroment Unico Srl :

Slides:



Advertisements
Similar presentations
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Privileged Identity Management Enterprise Password Vault
Abstract HyFS: A Highly Available Distributed File System Jianqiang Luo, Mochan Shrestha, Lihao Xu Department of Computer Science, Wayne State University.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
About DataViz, Inc. In business 25 years 13+ years experience in the mobile industry Specializing in Office compatibility for non-Microsoft platforms.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Encrypted File System (EFS) Sankara Narayanan. CSE 785 Computer Security, Syracuse University, NY Spring 2003 – 2004.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Introduction to Computer Administration System Administration
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Migrating Printing from SNA to TCP/IP & Secured Output Distribution Banking, Financial & Insurance Marketing Representatives Tracy GuardDenice HurtMark.
Chapter 10 – UNIX. History In late 1960s, two employees of Bell Labs (Ken Thompson & Dennis Ritchie) designed a new operating system to overcome the constraints.
Unit 6, Chapter 12 LAN Installation & Operation. Objectives Describe the installation and operation of a LAN. Describe the necessary management criteria.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Microsoft Visual SourceSafe Very popular Mainly used by Windows developers Cornerstone of many development teams Provides essential version control functions.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
STEALTH Content Store for SharePoint using Caringo CAStor  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Web: tel: +44 (0) IEB Asset Maintenance System.
تأسست سنة Agenda Brief of New Vision Company Our Partnerships Our Projects Our Services Our Partnerships.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
Computer Fundamentals MSCH 233 Lecture 2. What is a Software? Its step by step instructions telling the computer how to process data, execute operations.
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
TenBox Technologies Small software company specializing in server PDF solutions Located in Portland, Oregon
Introduction The network is the computer By Waseem Anwar Chaudhri.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
FESR Consorzio COMETA - Progetto PI2S2 The COMETA consortium and its activities for Grid adoption by Industry in the context of.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
SAMPLE IMAGE gLite on the Market – Why and How ir Works 4 th EGEE User Forum Thursday, 05 March 2009 Le Ciminiere, Catania, Sicily, Italy Gaël Youinou.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
CEG 2400 FALL 2012 Windows Servers Network Operating Systems.
Project Vision Improve Resilience of NetWare User Filestore Improve Resilience of Corporate Database Filestore Disaster Recovery Options ? Backup, Archival,
Module 1: Introduction to Windows 2000 and Networking.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Scuola Grid INFN, Trieste, 1-12 Dic Managing Confidential Data in the gLite Middleware – The Secure Storage.
HUB International: Software & Common Applications
PERFORMANCE TECHNOLOGIES A.E. June 2017
IBM System x Systems Management Made Easy ibm
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Customer Guide to Limited-Time Offer
Scuola Grid INFN, Martina Franca, Nov
Customized Solutions to your needs
Security and Encryption
How to prepare for the End of License of Windows Server 2012/R2
Veeam Backup Repository
Your Next LIMS: SaaS or On-Premise? Presented by:
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Promotion Valid From Sep. 1st 2009 ~ July 23rd 2010
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Chapter 2: System Structures
IBM System x Systems Management Made Easy ibm
DATS International Portfolio.
Agenda The current Windows XP and Windows XP Desktop situation
Productive + Hybrid + Intelligent + Trusted
STATEL an easy way to transfer data
Presentation transcript:

FESR Trinacria Grid Virtual Laboratory Grid Industry Day Catania October 2006 Secure Data Storage Into Grid Enviroment Unico Srl : Aldo Campisano Giordano Scuderi

Catania, October Agenda Who we are Who we are What we do What we do Why Secure Data for GRID Why Secure Data for GRID

Catania, October Who we are Unico Srl Activity: Design and Sales of Computer Systems Services & Support Employ : 30 people Locations: Catania – Napoli – Milano Invoice (FY 05): 8,123 k Euro ( 1,450 k Euro Services & Support 17.9% ) Investment R&D: 120 k Euro ( 1.5 % ) Internal Training: 40 k Euro ( 0,5 % )

Catania, October Certifications ISO 9001:2000 Anagrafe Nazionale Ricerche Nr HP Preferred Partner Sun Microsystem Partner Cisco Certified Microsoft Certified

Catania, October What we do System Integration  Multiple Operating Sistems  HP-UX  Solaris  Linux  Windows Server  Applications  High Availability Systems  Clustering  Networking ( LAN – WAN )  Wireless Tecnology  Storage Area Network  Network Attached Storage  Security  Disaster Recovery Planning

Catania, October What we do Some Customer Accent Srl Applied Materials ( Catania – Milano – L’Aquila ) Autogrill ( Data Center Milano ) Hewlett-Packard Italiana ST Microelectronics (Italy – France - Malta – Marocco) Università Catania – Messina

Catania, October What we do Services The Design of Architecture for Systems, Storage & Network Installation – Startup - Tuning Planned Hardware and Software Maintenance Help Desk Desk Side & Remote Support Fleet Management for PC & Mobile Pay per Use for : Computing - Storage – Printing & Coping

Catania, October Why GRID Access to Grid Enviroment is appealing Large Enterprise and SME offering : Computing Power & Performance Large Area of Storage A Pay per Use approach: –Pay only for what use and when you need it –No impact on their assets –Lower Total Cost of Ownership Avalaibility of Application Software

Catania, October Why Grid At the same time they need : An easy User Interface Availability Reliability Data Integrity A detailed Accounting Management System Relative low cost High Level of Security and……

Catania, October Secure Data Storage …. PROTECT THEIR OWN DATA FROM ACCESS BY ANY OTHER USER

Catania, October EncodedText.enc ClearText.txt Secure Data Storage sensitive Data could be “sensitive” and then must be protected  We believe that to protect access to the file with password is not secure enough  We trust that protect informations contained in user data using Encryption algorithm is much more secure Before Encryption After Encryption

Catania, October Secure Data Storage A password, used to protect access to a file, can be discovered in worse case, in some hours….. ….. but time needed to crack a 128-bit key, even using a very fast today’s computer, is : 1,198,920,341,200,668,243 years

Catania, October Secure Data Storage A higher level application built on top of many gLite grid services: – Command Line application for data management A lower level API built on top of gLite API: – API to access encrypted data from user application

Catania, October Command Line Application Set of commands that can be used from user interface: – Similar to lcg-util commands, but work on encrypted data – Give to the users transparent encryption/decryption process Example (copy local file to grid): lcg-cr -d -L lcg-scr -d -L Allow to accomplish ordinary data management operations: – Data copy to Grid storage element – Data copy from Grid storage element – Delete data from Grid storage element

Catania, October Application Program Interface Library that allow User Application to access encrypted data: – Transparent encryption and decryption – Extends existing API’s adding all the secure storage functionality Porting of user applications require small changes: – Example:  gfal_read (fd, buffer, buffer_size )  gfal_secure_read ( fd, buffer, buffer_size )

Catania, October Implementation Command Line Application Under Development –First alpha release coming soon

Catania, October Future development API development will start after first release of Command Line Application – Essential functions are being included in first release – API and Command Line Application are released under Open Source License ( source code are available ) – Tutorial and documentation for developers – An example of API implementation

Catania, October Secure Storage System Only encrypted data are present in GRID Storage Encryption and Decryption are transparent Only authorized users will get key Encrypted data Key Secure Storage Software Data Grid Storage Key repository

Catania, October Thanks