Team Wolf Distributed, Consistent and Secure USB Storage Comprehensive Design Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.

Slides:



Advertisements
Similar presentations
3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi Abdul-Mohsin AL-Faraj ( ) Hamed Al-Mehdhar ( )
Advertisements

Objectives Overview Define an operating system
11-May-15CSE 542: Operating Systems1 File system trace papers The Zebra striped network file system. Hartman, J. H. and Ousterhout, J. K. SOSP '93. (ACM.
Team Wolf Distributed, Consistent and Secure USB Hub Sean Busch Matt Dube Eddie Lai Zhou Zheng.
Team Wolf Distributed, Consistent and Secure USB Storage Final Project Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Handheld TFTP Server with USB Andrew Pangborn Michael Nusinov RIT Computer Engineering – CE Design 03/20/2008.
Introduction to Web Database Processing
Team Wolf Distributed, Consistent and Secure USB Storage Midyear Design Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
1 Netprog 2002 Network Terminology Motivation, Terminology, Layered systems (and other random stuff)
Maintaining and Updating Windows Server 2008
INSTALLING QNAP NAS FOR A SMALL NETWORK OF 5 PCS.
File Systems (2). Readings r Silbershatz et al: 11.8.
Sun NFS Distributed File System Presentation by Jeff Graham and David Larsen.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Managing Local and Network Printer Chapter 11 powered by dj.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Operating Systems Operating System
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Barracuda Load Balancer Server Availability and Scalability.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
Lesson 8 Operating Systems
Hands-On Microsoft Windows Server 2008
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
MagicInfo Pro Server Software All control, content, and scheduling is performed within the MagicInfo Pro Server software previously installed. Before.
Irwin/McGraw-Hill Copyright © 2004 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS6th Edition.
VeribisCRM CUSTOMER RELATIONSHIP MANAGEMENT Engin Duran Experience is our know how.
Implementing File and Print Services
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
MAHI Research Database Data Validation System Software Prototype Demonstration September 18, 2001
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
1 CMPT 275 High Level Design Phase Architecture. Janice Regan, Objectives of Design  The design phase takes the results of the requirements analysis.
1 Managing Printers (Week 12, Monday 3/26/2007) © Abdou Illia, Spring 2007.
Chapter Fourteen Windows XP Professional Fault Tolerance.
INFO1 – Practical problem solving in the digital world
Storage & Connectivity Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Chapter 1 In-lab Quiz Next week
Explain the purpose of an operating system
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Operating Systems JEOPARDY Computer Repair NetworkOS OS Tasks ConceptsComponentsMisc
PPT Slides by Dr. Craig Tyran & Kraig Pencil Information Systems Software MIS 320 Kraig Pencil Summer 2013.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
CENTRALISED AND CLIENT / SERVER DBMS. Topics To Be Discussed………………………. (A) Centralized DBMS (i) IntroductionIntroduction (ii) AdvantagesAdvantages (ii)
3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi ABDUL-MOHSIN AL-FARAJ ( ) Hamed Al-Mehdhar ( )
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Database Systems. Role and Advantages of the DBMS Improved data sharing Improved data security Better data integration Minimized data inconsistency Improved.
Ethernet. Ethernet  Ethernet is the standard communications protocol embedded in software and hardware devices, intended for building a local area network.
Sync and Exchange Research Data b2drop.eudat.eu This work is licensed under the Creative Commons CC-BY 4.0 licence B2DROP EUDAT’s Personal.
 Abstract of Green Computing  Green computing, green IT or ICT Sustainability, refers to environmentally sustainable computing or IT. In the article.
Managing Devices Lesson 5. Objectives Objective Domain Matrix Technology SkillObjective Domain DescriptionObjective Domain Number Connecting Plug-and-Play.
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Final Presentation Smart-Home Smart-Switch using Arduino
Product Overview Presentation Issue 1.0 9/4/07 External distribution MKT-SD-P-001E.
Implementation Method Linux-USB Gadget Framework –The Linux-USB Gadget Framework makes it easy for peripherals and other devices embedding GNU/Linux system.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Simple Add-Ons from Disus
Introduction to Computers
Introducing MagicInfo Lite
Presentation transcript:

Team Wolf Distributed, Consistent and Secure USB Storage Comprehensive Design Review Eddie Lai Matt Dube Sean Busch Zhou Zheng

Team Wolf 2 Backing Up Data  Everyone needs to save their work and data This data needs to be available in multiple locations Data needs to be readily available Today’s most popular storage device is the thumb drive  Backups have problems Can be physically broken Need to be carried around Can wear out after a number of reads/writes  This leads to using multiple backups  Multiple backups create problems Data changes create inconsistencies between backups When many backups are created, data becomes vulnerable

Team Wolf 3 Distributed Consistent Secure USB Hub  Our project: Distributed Consistent Secure USB Hub  Makes maintaining backups simple and intuitive Uses off-the-shelf USB sticks for storage Looks like a mass storage device to user’s PC Can be accessed easily without any software installation  Maintains consistency Storage Devices at different locations get updated simultaneously Synchronization as easy as a push of a button  Optional security measures Secret sharing prevents users’ data from being compromised

Team Wolf 4 Outline  Project Summary  System Design PC Interface File Consistency Software Hub Communication User Interface Secret Sharing Software  Prototype  Demonstration  Question and Answer

Team Wolf 5  Step 1: User writes file to local USB hub  Step 2: USB hub stores file on local USB sticks  Step 3: User initiates a sync request  Step 4: Consistency software detects file system updates  Step 5: Hub distributes file system updates Project Summary

Team Wolf 6 Project Design Implementation  Parts implemented by team Consistency Software Network Interface PC interface User interface  Additional ports and processing provided by embedded PC

Team Wolf 7 PC Interface  Hub connects to PC without any software installation Not all users will be allowed to install software on their PC  Hub appears as a USB mass storage device  Use USB OTG port By interfacing with the PC via this port, board appears as USB device Shows contents of attached USB drives

Team Wolf 8 File Consistency Software  Custom software to recognize when updates are made  Changes recognized using conventional UNIX tools Timestamps and checksums recorded, then “diff”ed with previous record  What happens if a file is added? Software recognizes timestamp and checksum change Distributes file upon synchronization  What happens if only a timestamp is changed? Software recognizes only a timestamp change Distributes timestamp change, but does not re-distribute file

Team Wolf 9 Hub Communication  TCP Client/Server Model Secure using SSL  Upon synchronization, the hubs will distribute updates across the network When a hub is distributing updates, it will act as a client The receiving hub will act as the server  Each client will connect to a server, distribute its updates, then disconnect

Team Wolf 10 User Interface  Hub is manually operated by user  Simple user interface consists of two buttons One button initiates synchronization One button ejects USB sticks  Buttons are mounted on Hub via embedded PC’s GPIO ports  Two LEDs provide feedback for users One alerts user when a sync is in progress The other shows when it is safe to remove USBs from hub

Team Wolf 11 Secret Sharing  User has option to share information secretly with other hubs  If a USB drive is lost or compromised, no useful information about its contents can be recovered  (k,n) Threshold scheme Requires a subset, k, of a set, n, to recover data With fewer than k pieces, no information about the data can be recovered

Team Wolf 12 Secret Sharing  Implements what is known as Shamir's [1] method for secret sharing in the Galois Field 2 8  Method relies on the creation of a random polynomial Samples various coordinates along the curve of the polynomial Interpolates these points in order to reconstruct the secret  Functionality partially provided by libgfshare UNIX library [1] Shamir, Adi (1979), "How to share a secret", Communications of the ACM 22 (11): 612–613, doi: /

Team Wolf 13 Prototype  Our Hub is currently being prototyped on an Advantech development board powered by the Intel Atom  The next prototype will be built on the BeagleBoard-xM Board offers a slimmer form factor − Lacks unneeded ports that Advantech board has − Solid state memory vs. HDD Primary motivation for using BeagleBoard is its USB OTG port − Allows the board to be mounted on User’s PC as USB mass storage device  Approx. cost with peripherals: ~$150

Team Wolf 14 Project Summary  Distributed Consistent Secure USB Hub allows user to keep backups on multiple USB sticks consistent  Hub simplifies process for user Hub appears as USB mass storage device Doesn’t require software installation on user’s PC Simple user interface allows hub to be operated with only two buttons  Hub distributes updates to backups securely across network  User has optional secret sharing functionality  Prototype built using BeagleBoard-xM

Team Wolf 15 Demonstration  Non Secret Sharing Scenario 1: Hub1 adds multiple files Scenario 2: Hub2 removes file  Secret Sharing Scenario 1: Hub1 adds multiple files Scenario 2: Hub1 recreates a secret with all n shares present Scenario 3: Hub2 recreates a secret with n-1 shares present

Team Wolf 16 Questions