Secure storage for your data in the Internet! If you have any question, you can contact us on: om.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Presentation by Priyanka Sawarkar
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Coda file system: Disconnected operation By Wallis Chau May 7, 2003.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 12 Reading assignment n From “Running Linux”, on reserve at PSU Main library (2-hour checkout) Chapter 1 (pages 1 through 41)Chapter 1 (pages 1.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
The Internet 8th Edition Tutorial 1 Browser Basics.
Examine Quality Assurance/Quality Control Documentation
JOIN A COMMUNITY OF 80,000 E-COMMERCE SITES WORLDWIDE.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 7: Active Directory Replication.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Your storage on the ground; Your files in the cloud.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 11 Case Study 2: Windows Vista Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Building service testbeds on FIRE D5.2.5 Virtual Cluster on Federated Cloud Demonstration Kit August 2012 Version 1.0 Copyright © 2012 CESGA. All rights.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Information Systems and Network Engineering Laboratory II DR. KEN COSH WEEK 1.
Moscow, 2009 ACCORD-TSHM Accord. Reliability in an unreliable world. OKB SAPR Special Design Bureau for CAD System Design
1 Windows 2008 Configuring Server Roles and Services.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
Module 5: Implementing Group Policy
9 Systems Analysis and Design in a Changing World, Fourth Edition.
SmartReport Backend Reporting Tool © 2003 ITC Software
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Afresco Overview Document management and share
Physical Database Design Purpose- translate the logical description of data into the technical specifications for storing and retrieving data Goal - create.
Creating and Managing Digital Certificates Chapter Eleven.
Web Server.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Linux Operations and Administration
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
Copyright © SkyeyTech, Inc. CRMdesk Power and elegance.
Information Systems and Network Engineering Laboratory II
The advantages and the disadvantages of working in the cloud.
Distributed Cache Technology in Cloud Computing and its Application in the GIS Software Wang Qi Zhu Yitong Peng Cheng
Sharing and Synching files
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
e-Health Platform End 2 End encryption
Cloud based Open Source Backup/Restore Tool
ONLINE SECURE DATA SERVICE
Introducing NTFS Reliability Security Long file names Efficiency
Presentation transcript:

Secure storage for your data in the Internet! If you have any question, you can contact us on: om

mySafeDisk — cloud storage service which is available through special client SafeDisk program. Secure data storage is provided based on: data encryption before its transmission via Internet channels to the cloud storage; encryption both downloaded and stored data, and its information, sizes and names, files attributes as well; deleting all the service usage information from the computer as soon as service operating is completed; usage of access key to the user data without which there will be no access even in case of login and parole theft.

Comparisons with main key players: mySafeDiskDropboxYandex.DiscGoogle Drive Automatic modifications synchronization ++++ Data encryption before transferring +--- Shared folders -+++ Files versions ++-+ Data «deduplication» on a server +++- Transmission of modifications only while synchronizing +++- No local data storage required No necessity of local data storage +--- Public links to files/folders -+++

Merits of MySafeDisk service: high level of security for files to be transmitted and stored; access to the data store is managed through the familiar operating system interface; Internet traffic minimization by generation of the deltas of files modifications; construction of files changes queues and its keeping in the virtual memory during the whole period of service operation; absence of stored data duplication; capability to save updates in edited data in case of Internet disconnection.

General description of file-storing technology realized by mySafeDisk: User’s module Adapter Client’s module File storage xml-rpc Client-side program of SafeDisk Server part of mySafeDisk service

Client-part of decision consists of: user’s module – software method implementing user interface; adapter – software method which provides cooperation of client and server parts; client’s module – software method implementing client-part functions. Server-part of decision consists of: file storage – software-hardware complex realizing files and folders storage and access to them.

Main functions of mySafeDisk user’s module: ensuring of working of virtual file system and virtual memory; unperformed job stacking, saving and rebuilding file/folders tree from local database. Main functions of mySafeDisk adapter: support of the operation with the specified file storage; file/folders-tree download from the file storage; files loading and its downloading from the file storage.

Main functions realized by SafeDisk client module: operations of creating, renaming, relocation, deleting of files and folders, as well as reading, recording, delta upgrading of changes in files content; creating (generating) public and private user keys; files and folders tree handling on the server; composition of files and folders structures, recording the history of its modifications; encryption the file blocks with using AES-256 algorithms and directory charts using RSA.

Encryptor diagram used in SafeDisk: * Keys К1 — К4 stored in the file storage and additionally encoded by the keys, which are obtained from content of corresponding block. File of spontaneous maintenance Unit 3Unit 2Unit 4Unit 1 К1*К2* К4* К3* List of units forming the file. Structure of files and folders К К RSA К Public — is stored in the file storage Private — is stored by the user module Step 4 Step 3 Encryption of files and folders structure Encryption of units’ content Drawing up the structure of files and folders Step 1 Step 2

Main functions realized by file storage: forming of user’s domain account, its authentication, authorization and object registration handling; storage of file’s units of varied sizes with encoded keys; file’s units updating by using changing deltas; avoiding of file’s units duplication; public user’s keys storage; file storage resource quoting – footprint, Internet traffic, etc.

Diagram of avoiding duplication: Hashing an encrypted content of the unit by the algorithm SHA-256 Unit hBhB К Hashing an original content of the unit by the algorithm SHA-256 Encrypting by the algorithm AES-256 hKB DB hKB are stored in the DB as the identification record of unique record - hB. If there is an attempt to load the unit in the file storage that will duplicate an already existed unit — hB will match, so in the scheme of files and folders link to the existing block will be added.

Organization of various services of secure data storage is possible while using mySafeDisk: SAAS-decisions for providing safety cloud data storage for Internet-users; corporate file storage on customer company request; for such storage the customer’s equipment or existing infrastructure can be used; highly tailored service, for instance, service of electronic safe deposit cell.

Directions of mySafeDisk development: realization of file sharing; assignment of files and folders access privileges; support of shared folders for information sharing between users; realization of “rapid access links” to the files on the disk for browser and client program; client-program adaptation for work with Linux operating systems. Today’s mySafeDisk’s state: operating in beta-testing mode service –