Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT.

Slides:



Advertisements
Similar presentations
During spacecraft-level environmental testing, after all instruments were integrated, the government assembled a data clerk team to support test data collection.
Advertisements

Audit Control Environment Mike Smorul UMIACS. Issues surrounding asserting integrity Threats to Integrity of Digital Archives –Hardware/media degradation.
Guide to Computer Forensics and Investigations, Second Edition
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
ADAPT An Approach to Digital Archiving and Preservation Technology Principal Investigator: Joseph JaJa Lead Programmers: Mike Smorul and Mike McGann Graduate.
May Archiving PAWN: A Policy-Driven Software Environment for Implementing Producer- Archive Interactions in Support of Long Term Digital.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Producer-Archive Workflow Network (PAWN) Goals Consistent with the Open Archival Information System (OAIS) model Use of web/grid technologies and platform.
ACE: A Software Tool to Ensure the Integrity of Digital Archives Principal Investigator: Joseph JaJa Graduate Student: Sangchul Song Lead Programmer: Michael.
Robust Tools for Archiving and Preserving Digital Data Joseph JaJa, Mike Smorul, and Mike McGann Institute for Advanced Computer Studies Department of.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation Mike Smorul, Joseph JaJa, Yang Wang, and Fritz McCall.
Archival Prototypes and Lessons Learned Mike Smorul UMIACS.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
COEN 252 Computer Forensics
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Real Security InterSwyft Technical information's.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Advanced Topics: MapReduce ECE 454 Computer Systems Programming Topics: Reductions Implemented in Distributed Frameworks Distributed Key-Value Stores Hadoop.
Operating Systems.  Operating System Support Operating System Support  OS As User/Computer Interface OS As User/Computer Interface  OS As Resource.
Cloud Integrity Monitoring Mike Smorul ADAPT Group University of Maryland, College Par.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Introduction to Apache Hadoop Zibo Wang. Introduction  What is Apache Hadoop?  Apache Hadoop is a software framework which provides open source libraries.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
1 Abstract & Main Goal המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory The focus of this project was the creation of an analyzing device.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
A Multimedia Presentation by Louis Balzani. o Source of extreme power o High elasticity o Large data centers generate 5-7x savings.
MD5 ALGORITHM past and present. History Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Cryptographic Hash Functions
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Data & Storage Services CERN IT Department CH-1211 Genève 23 Switzerland t DSS Data architecture challenges for CERN and the High Energy.
Enhanced Availability With RAID CC5493/7493. RAID Redundant Array of Independent Disks RAID is implemented to improve: –IO throughput (speed) and –Availability.
2/26/2004 Dan Swaney 1 Preservation Metadata and the OAIS Information Model A Metadata Framework to Support the Preservation of Digital Objects A review.
Design and Implementation of a High-Performance distributed web crawler Vladislav Shkapenyuk and Torsten Suel Proc. 18 th Data Engineering Conf., pp ,
Research and Service Support Resources for EO data exploitation RSS Team, ESRIN, 23/01/2013 Requirements for a Federated Infrastructure.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1.
KEEPS – a system for UELMA preservation and security
Web Applications Security Cryptography 1
KEEPS – a system for UELMA preservation and security
5/7/2018 Java Security and a Firewall Extension for Authenticity Control of Java Applets.
VNF Package Integrity and Authenticity – Public key based
Now every configuration is possible
Multiple Platters.
Secure Sockets Layer (SSL)
Information Security message M one-way hash fingerprint f = H(M)
Joseph JaJa, Mike Smorul, and Sangchul Song
Spatial Analysis With Big Data
Sindhusha Doddapaneni
Principles of Computer Security
(Dectris Eiger) HDF5 Stream Writer
STRATEGIC ENCRYPTION
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
MAC: Message Authentication Code
MDM Enterprise.
File Transfer Issues with TCP Acceleration with FileCatalyst
Introduction to Operating Systems
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Specialized Cloud Architectures
FST Network All Rights Reserved
Beyond FTP & hard drives: Accelerating LAN file transfers
Chapters 1-3 Concepts NT Server Capabilities
Hashing Hash are the auxiliary values that are used in cryptography.
ACE – Auditing Control Environment
Presentation transcript:

Hashing THEN AND NOW MIKE SMORUL – ADAPT PROJECT

Commodity Storage Performance  2003 JetStor III IDE-FC  62MB/s large block  2013  218MB/s workstation SSD  Perc 6/MD1000, 400MB/s+

Chip Speed  2003: Pentium 4  3.2Ghz  2013: Core i7 Extreme  3.5Ghz

Hashing Performance  SHA-256 Hashing  Java: 85MB/s  Crypto++: MB/s  Real World Penalty  Java: 20-40% penalty on slow seek disk

Implications  Flipped bottlenecks

How to overcome  Faster/weaker digests  Simultaneous transfers  Data locality, tape?  Improve single stream performance

Parallelize Single Stream  Independent IO and digest threads  Always have work for the digest algorithm.  Large files saw over 95% of algorithm potential.  Small files unchanged.

Securing Data in Motion ?

Where to apply fixity  Internal integrity services  At Transfer via manifests  End to End?

Operational Integrity  Internal Auditing  Prove your hardware  Error, not malice detection  Peer-Auditing  Prove your friends

Transporting Integrity  Manifest Lists  Transfer validation  Digital Signatures  Prove identity  Token Based  Prove time

Chronopolis Integrity  Current:  Producer supplied authoritative manifest  Peers locally monitor integrity  Manually trace back to point of ingest

Chronopolis Integrity  In-progress  Single integrity token back to ingest  Ideal  Tokens issued prior to arrival  ‘Prove’ the state of data to point before Chronopolis

Manifests 2.0  Beyond simple transfer list  Token manifests  Portable, embeddable  Python, etc

Cloud Integrity  Digests in a cloud validate transfer only  Http headers can pass extended integrity information  End-user verification

Integrity as provenance  Integrity checking forward in time  Consumer level verification of data  Integrity from object creation  Start integrity checking before archiving

Closing  Why are you hashing?  What do you want to prove?  Hashing Cost/performance

Contact Mike Smorul