Metadata Issues in a Cryptographic File System David Bindel IRAM/ISTORE/OceanStore Retreat.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Public Key Infrastructure and Applications
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
SUNDR: Secure Untrusted Data Repository
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Group Management, Permissions, and Revocation in OceanStore Barbara Engelhardt George Porter Naveen Sastry UC Berkeley January 2002.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure File Storage Nathanael Paul CRyptography Applications Bistro March 25, 2004.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Pond: the OceanStore Prototype Sean Rhea, Patric Eaton, Dennis Gells, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz University of California, Berkeley.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
SEC835 Practical aspects of security implementation Part 1.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
4P13 Week 1 Talking Points. Kernel Organization Basic kernel facilities: timer and system-clock handling, descriptor management, and process Management.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Network Security David Lazăr.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
DIGITAL SIGNATURE.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Wireless and Mobile Security
Final Exam Review. Common Attack Techniques Stack overflow – Basic version – Advanced versions Mitigations – Canary – W^X page – ASLR.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
L o g o Modern DBMSs security problems Nguyen Chi Thanh Nguyen Thanh Toan Group:
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Network Security Celia Li Computer Science and Engineering York University.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
OceanStore : An Architecture for Global-Scale Persistent Storage Jaewoo Kim, Youngho Yi, Minsik Cho.
Security Outline Encryption Algorithms Authentication Protocols
Tutorial on Creating Certificates SSH Kerberos
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Tutorial on Creating Certificates SSH Kerberos
LINUX SECURITY Dongmei Wu ID: /25/00.
A Redundant Global Storage Architecture
Presentation transcript:

Metadata Issues in a Cryptographic File System David Bindel IRAM/ISTORE/OceanStore Retreat

Overview Untrusted infrastructure assumption Cryptography review Cryptography in storage systems Securing metadata ECFS Conclusions

Untrusted Infrastructure “Trust No One”

Review: Encryption Protect privacy of data on insecure channel Shared key –Same key used to encrypt and decrypt Public key –Mathematically related public and private keys –Public key used to encrypt –Private key used to decrypt

Signatures and MACs Specify responsibility for document –Depends on document: prevent transfer –Depends on private key: prevent forgery Signatures verified using public key MACs verified using private key Message Digest Secure hash Signature Document Private Key Sign Algorithm

Encrypting Storage Where to encrypt stored data? –In file system –In device driver Why not in user tools? –Users make mistakes –It’s inconvenient Encryption should be transparent!

Cryptography and Permissions What policy are we enforcing? Conventional file systems support – Read and write permissions –Separate permissions for user, group, world –More complicated permissions (eg AFS) Existing cryptographic file systems support –All-or-nothing access

Protecting Metadata / privateusr bin rshssh rsh data ssh data encrypted-flag journalKFC-recipe Any new journal entries are public! Now running “ssh” is insecure!

Heirarchical Signatures Metadata (uid, gid, ctime, …) “usr”, /usr address “etc”, /etc address... Metadata “bin”, /usr/bin address... Metadata “vi”, /usr/bin/vi address... Metadata Index of block 0 Index of block 1... / /usr /usr/bin /usr/bin/vi Data block 0 of /usr/bin/vi Data block 1 of /usr/bin/vi, sign(data block 0), sign(data block 1), sign(/usr/bin/vi data) Replace with virus loader?, sign(/usr/bin data), sign(/usr), sign(/etc) /etc...

Globally Unique IDs Metadata (uid, gid, ctime, …) “usr”, /usr unique ID “etc”, /etc unique ID... Metadata Unique ID for /usr “bin”, /usr/bin unique ID... Metadata Unique ID for /usr/bin “vi”, /usr/bin/vi unique ID... Metadata Unique ID for /usr/bin/vi Index of block 0 Index of block 1... / /usr /usr/bin /usr/bin/vi Data block 0 of /usr/bin/vi Data block 1 of /usr/bin/vi /etc... Replace with virus loader? Sign(/usr/bin/vi ID, 0, data in block) Replace with data for /usr/bin/emacs? (v 5.0) Replace with data block 1 (v 4.0)? Sign(/usr/bin/vi data above) Sign(/usr/bin data) Sign(/usr data) Sign(/ data)

ECFS Extended version of CFS –Class project for architecture and systems –David Bindel, Monica Chew, Chris Wells Goal: Support more flexible permissions –Allow public data (eg.forward files) –Protect integrity using MACs

ECFS Architecture User Application ECFS daemon Underlying filesystem Metadata database Kernel NFS client Kernel file system client Plaintext No MACs Ciphertext MACs

ECFS Lessons Signatures can be integrated into the FS Handling metadata right is tricky! A cryptographic “layer” is awkward –Support should be built in from outset

Back to OceanStore OceanStore supports more general lookup structures than directory tree Conflict resolution interacts with security in potentially subtle ways Lots of other subtle issues come up –Handling denial of service attacks –Key management and distribution