S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
Database Administration and Security Transparencies 1.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Click to edit Master title style Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok 1 Owen S. Hofmann 2 Nadia Heninger 3 Edward.
Superdistribution --- The Concept and the Architecture Ryoichi Mori and Masaji Kawahara presented by Ping Xu 1. Introduction to Superdistribution 2. Protect.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Yoshi Kohno Amit Levy Hank Levy University of Washington.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Efficient Proactive Security for Sensitive Data Storage Arun Subbiah Douglas M. Blough School of ECE, Georgia Tech {arun,
Secure storage for your data in the Internet! If you have any question, you can contact us on: om.
Using Algebraic Signatures in Storage Applications Thomas Schwarz, S.J. Associate Professor, Santa Clara University Associate, SSRC UCSC Storage Systems.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Session 4 Windows Platform Dina Alkhoudari. Learning Objectives Configure disk quotas Repairing and Defragmenting Set permissions to files and folders.
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs The University of Michigan Scott Wolchok J. Alex Halderman The University of Texas at Austin.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Aggregation in Sensor Networks
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/
Identity-Based Secure Distributed Data Storage Schemes.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy Henry M. Levy University of Washington.
Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu | Tadayoshi Kohno | Amit A. Levy | Henry M. Levy Presented by: Libert Tapia.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Paper by: Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy University of Washington Vanish: Increasing Data Privacy with Self-Destructing.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
Grid technology Security issues Andrey Nifatov A hacker.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Linux-vs-Windows Security
Freenet: Anonymous Storage and Retrieval of Information
SOCSAMS e-learning Dept. of Computer Applications, MES College Marampally FILE SYSTEM.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
BY S.S.SUDHEER VARMA (13NT1D5816)
Security Issues in Information Technology
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Hardware-rooted Trust for Secure Key Management & Transient Trust
Professor Tzong-Chen Wu
Security Using Armstrong Numbers and Authentication using Colors
Data Management on Opportunistic Grids
People used to install software on their computers
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 1: Introduction
Sindhusha Doddapaneni
Research on Immunizing Embedded Linux Core Against Viruses and Software Faults Tao Gong1, 2, 3, Changxing Du1 1 College of Information S. & T., Donghua.
Peer to Peer Information Retrieval
Vanish: Increasing Data Privacy with Self-Destructing Data
Modern PC operating systems
Off-line Direct Disk Access System
Department of Computer Science
Cloud Storage-as-a-Service and Course Reflection
Presentation transcript:

S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI

I NTRODUCTION Cloud computing is a way of computing via the internet that shares computer resources instead of using software or storage on a local computer. Cloud services are becoming more and more important for people’s life People are more or less requested to submit or post some personal private information to the cloud by the internet

As people rely more and more on the internet and cloud technology, security of their privacy takes more and more risks. System or network must cache,copy or archive it. People have no knowledge about these copies and can not control them, so these copies may leak their privacy. Data privacy also can be leaked via cloud service provider, hackers intrusion or some legal action

V ANISH SYSTEM Sharing and protecting privacy. Secret key is divided and stored in a P2P system with distributed hash table(DHTs). System can maintain secret key. After 8 hours the DHT will refresh every node. Shamir secret sharing algorithm. How long the key can survive is also one of the disadvantages for vanish.

SEDAS Based on active storage framework Defines two new modules Self destruct method object that is associated with each secret key part. Survival time parameter for each secret key part User can use this system as a general object storage Focuses on related key distribution algorithm, Shamir’s algorithm

To implement a safety destruct with equal divided key. We use an object based storage interface to store and manage the equally divided key. Functionality and security properties.The result demonstrate that SEDAS is practical to use and meets all the privacy preserving goals SEDAS supports security erasing files and random encryption keys stored in a hard disk drive. K EY POINT ON SEDAS

D ATA S ELF DESTRUCT The self destructing data system in the cloud environment should meet some requirements How to destruct all the copies of the data simultaneously No explicit delete actions by the user or any third party storing that data. No need to modify any of the stored or archived copies of that data No use of secure hardware but support to complete erase data in HDD

S EDAS ARCHITECTURE

A CTIVE STORAGE OBJECT An active storage object derives from a user object and has a time-to-live (ttl) value property. The ttl value is used to trigger the self destruct operation. The ttl value of an active storage object is limited Active storage object class are used to manage ttl value

S ELF DESTRUCT METHOD OBJECT A self destruct method object is a service method It needs three arguments The lun arguments specifies the device. The pid arguments specifies the partition Object id arguments specifies the object to be destructed

D ATA PROCESS To use the SEDAS system user’s application should implement logic of data process and act as a client node. Two different logics Uploading Downloading

U PLOADING FILE PROCESS User upload file in storage system and store key in SEDAS system. Specify the file, the key and ttl as arguments for the uploading procedure. Assume data and key read from the file. Key shares generated by Shamir secret sharing algorithm will be used to create active storage object in storage node in the SEDAS system.

D OWNLOADING FILE PROCESS Any user can download data stored in the data storage system Data must be decrypted before use The whole logic is implemented in code of user’s application

D ATA SECURITY ERASING IN DISK The system pre-specifies a directory in a special area to store sensitive files. Monitor the file allocation table and acquire and maintain a list of all sensitive documents, the logical block address LBA list of sensitive documents appear to increase or decrease the update is sent to the OSD OSD internal synchronization maintains the list of LBA, the LBA data in the list updates.

CONCLUSION This introduced a new approach for protecting data privacy from attackers who retroactively obtain through legal or other means. SEDAS causes sensitive information. A proof of concept prototype based on object based storage techniques.

R EFRENCES R. Geambasu, T. Kohno, A. Levy and H. M. Levy "Vanish: Increasing data privacy with self-destructing data", Proc. USENIX Security Symp., pp A. Shamir "How to share a secret", Commun. ACM, vol. 22, no. 11, pp S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters and E. Witchel "Defeating vanish with low-cost sybil attacks against large DHEs", Proc. Network and Distributed System Security Symp., 2010 L. Zeng, Z. Shi, S. Xu and D. Feng "Safevanish: An improved data self- destruction for protecting data privacy", Proc. Second Int. Conf. Cloud Computing Technology and Science (CloudCom), pp L. Qin and D. Feng "Active storage framework for object-based storage device", Proc. IEEE 20th Int. Conf. Advanced Information Networking and Applications (AINA), 2006 Y. Zhang and D. Feng "An active storage system for high performance computing", Proc. 22nd Int. Conf. Advanced Information Networking and Applications (AINA), pp

T HANK Y OU