Secure cloud data storage and access. Mihai Ordean Research Fellow University of Birmingham
|
|
- Caren Dortha McDonald
- 8 years ago
- Views:
Transcription
1 Secure cloud data storage and access Mihai Ordean Research Fellow University of Birmingham
2 Introduction
3 What can we encrypt?
4 What can we encrypt? DATA
5 What can we encrypt? Dynamic data DATA
6 What can we encrypt? Static data DATA
7 Protecting dynamic data Company Workstation Company Server
8 Protecting dynamic data Remote Client TLS, SSH, IPSec,. Company Server
9 Protecting dynamic data? Client TLS, SSH, IPSec,. Server
10 Protecting static data Client Cloud
11 Protecting static data
12 Protecting static data
13 Protecting static data
14 Protecting static data
15 Protecting data from the cloud Symmetric key encryption Public key encryption
16 Is encrypting data enough?
17 Analysing data access: who is the doctor?? Medical database patient records insurance records appointments
18 Analysing data access: who owns this cyphertext?? Medical database patient records insurance records appointments
19 Analysing data access Medical database patient records insurance records appointments
20 Analysing data access Medical database patient records insurance records appointments
21 Analysing data access Medical database patient records insurance records appointments
22 Analysing data access Medical database patient records insurance records appointments
23 Analysing data access Medical database patient records insurance records appointments
24 Just using encryption is not enough Content security the data is encrypted Metadata security ownership information, timestamps, access rights, cyphertext length, etc. Access pattern security when is the data accessed, who accesses the data, how is the data accessed, etc.
25 Oblivious RAM
26 Oblivious RAM (ORAM) Uses symmetric encryption (e.g. AES) to encrypt small data structures (e.g. data buckets ). Replaces specific file operations like read and write (i.e. download and upload) with a generic access operation. The access operation has a significant overhead in order to disguise the exact data being accessed.
27 PathORAM [Stefanov-van Dijk-Shi-Chan-Fletcher-Ren-Yu-Devadas13] ID1 ID2 ID3 ID27 ID10 ID16 MAP PATH_B PATH_B PATH_A PATH_D PATH_A PATH_C STASH ID1:Data1 ID27:Data27 ID10:Data10 ID16:Data16 BUCKET1 ID20:Data20 ID13:Data13 ID14:Data14 ID22:Data22 BUCKET2 BUCKET3 ID05:Data5 ID7:Data7 ID6:Data6 ID2:Data2 ID11:Data11 ID12:Data12 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID19:Data19 ID15:Data15 ID28:Data28 ID3:Data3 ID8:Data8 LEVEL 0 LEVEL 1 ID17:Data17 ID24:Data24 ID23:Data23 ID26:Data26 ID18:Data18 ID4:Data4 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2
28 PathORAM access READ: ID2:empty BUCKET1 MAP ID2 PATH_B ID20:Data20 ID13:Data13 ID14:Data14 ID22:Data22 LEVEL 0 REQUEST: PATH_B BUCKET2 ID7:Data7 BUCKET3 ID05:Data5 ID6:Data6 ID2:Data2 ID11:Data11 ID12:Data12 LEVEL 1 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID19:Data19 ID15:Data15 ID28:Data28 ID3:Data3 ID8:Data8 ID17:Data17 ID24:Data24 ID23:Data23 ID26:Data26 ID18:Data18 ID4:Data4 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2
29 PathORAM access READ: ID2:empty BUCKET1 MAP ID2 PATH_B ID20:Data20 ID13:Data13 ID14:Data14 ID22:Data22 LEVEL 0 REQUEST: PATH_B BUCKET2 ID7:Data7 BUCKET3 ID05:Data5 ID6:Data6 ID2:Data2 ID11:Data11 ID12:Data12 LEVEL 1 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID19:Data19 ID15:Data15 ID28:Data28 ID3:Data3 ID8:Data8 ID17:Data17 ID24:Data24 ID23:Data23 ID26:Data26 ID18:Data18 ID4:Data4 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2 RECEIVE: PATH_B Bucket5 Bucket2 Bucket1 ID4:Data4 ID24:Data24 ID8:Data8 ID19:Data19 ID2:Data2 ID7:Data7 ID22:Data22 ID14:Data14 ID13:Data13 ID20:Data20
30 PathORAM access READ: RECEIVE: ID2:empty PATH_B REQUEST: Bucket5 Bucket2 Bucket1 PATH_B ID4:Data4 ID24:Data24 ID8:Data8 ID19:Data19 ID2:Data2 ID7:Data7 ID22:Data22 ID14:Data14 ID13:Data13 ID20:Data20 MAP STASH BUCKET1 ID1 ID2 ID3 ID27 ID10 ID16 PATH_B PATH_C PATH_A PATH_D PATH_A PATH_C ID1:Data1 ID27:Data27 ID10:Data10 ID16:Data16 ID4:Data4 ID24:Data24 ID8:Data8 ID2:Data2 BUCKET2 BUCKET3 ID05:Data5 ID6:Data6 ID11:Data11 ID12:Data12 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID15:Data15 ID28:Data28 ID3:Data3 LEVEL 0 LEVEL 1 ID17:Data17 ID23:Data23 ID26:Data26 ID18:Data18 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2
31 PathORAM access WRITE: ID1:Data1 ID24:Data24 Bucket5 ID19:Data19 ID8:Data8 ID7:Data7 PATH_B Bucket2 ID10:Data10 ID20:Data20 ID13:Data13 ID27:Data27 ID8:Data8 Bucket1 ID4:Data4 ID16:Data16 1xPaths 3xBuckets => one per level 12xBlocks => 4 per bucket MAP BUCKET1 ID1 ID2 ID3 ID27 ID10 ID16 PATH_B PATH_C PATH_A PATH_D PATH_A PATH_C ID1:Data1 ID27:Data27 ID10:Data10 ID16:Data16 STASH ID2:Data2 ID22:Data22 BUCKET2 BUCKET3 ID05:Data5 ID6:Data6 ID11:Data11 ID12:Data12 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID15:Data15 ID28:Data28 ID3:Data3 LEVEL 0 LEVEL 1 ID17:Data17 ID23:Data23 ID26:Data26 ID18:Data18 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2
32 PathORAM structure ID1 ID2 ID3 ID27 ID10 ID16 MAP PATH_B PATH_C PATH_A PATH_D PATH_A PATH_C STASH ID2:Data2 ID22:Data22 BUCKET1 ID16:Data16 ID4:Data4 ID8:Data8 ID27:Data27 BUCKET2 BUCKET3 ID13:Data13 ID05:Data5 ID20:Data20 ID6:Data6 ID10:Data10 ID11:Data11 ID7:Data7 ID12:Data12 BUCKET4 BUCKET5 BUCKET6 BUCKET7 ID21:Data21 ID8:Data8 ID15:Data15 ID28:Data28 ID3:Data3 ID19:Data19 LEVEL 0 LEVEL 1 ID17:Data17 ID24:Data24 ID23:Data23 ID26:Data26 ID18:Data18 ID1:Data1 ID25:Data25 ID9:Data9 PATH_A PATH_B PATH_C PATH_D LEVEL 2
33 PathORAM performance Example Assuming a 128GB database with: - S = 64KB block size - Z = 5 blocks per bucket - L = 20 levels SecretDocument.txt a 1MB document stored in the database
34 PathORAM performance Example Assuming a 128GB database with: - S = 64KB block size - Z = 5 blocks per bucket - L = 20 levels What are the bandwidth requirements to access this document? SecretDocument.txt a 1MB document stored in the database
35 PathORAM performance Example Assuming a 128GB database with: - S = 64KB block size - Z = 5 blocks per bucket - L = 20 levels 1MB = 1024KB Block per document N: N = 1024KB/64KB (size of the block) = 16 SecretDocument.txt a 1MB document stored in the database
36 PathORAM performance Example Assuming a 128GB database with: - S = 64KB block size - Z = 5 blocks per bucket - L = 20 levels SecretDocument.txt a 1MB document stored in the database 1MB = 1024KB Block per document N: N = 1024KB/64KB (size of the block) = 16 To send/receive ONE document ORAM requires: N*S*Z*L = 100MB
37 ORAM applications Personal health records Credit score systems GENOME related research Private information retrieval (PIR) protocols
38 Searchable encryption
39 Searchable Encryption
40 Searching For each document in the database: For each word in document: if word = top-secret exit for print document-id
41 Encrypting databases word document-id document ENCRYPTED word ENCRYPTED document-id WORD DOCUMENT-ID Database Encrypted database
42 Searchable Encryption KEYWORDS: CIA WATERGATE NIXON US GCHQ GB Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB Efficiency of the index Number of documents increases => time increases Number of keywords increases => time increases
43 Searchable Encryption KEYWORDS: CIA WATERGATE NIXON US GCHQ GB Inverted index CIA WATERGATE NIXON US GCHQ GB Efficiency of the index Number of keywords increases => time increases
44 What do we want to protect? What we search for KEYWORDS: CIA WATERGATE What is the result of the search query DOCUMENT NAMES: How often we search for something 1: 2: n: CIA
45 Padding Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB
46 Padding Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB
47 Padding Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB Inverted index CIA WATERGATE NIXON US GCHQ GB
48 Padding Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB Inverted index CIA WATERGATE NIXON US GCHQ GB
49 Intersections, again Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB
50 Intersections, again Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB
51 Intersections, again Forward index CIA WATERGATE US GCHQ GB CIA NIXON US GCHQ GB CIA CIA CIA CIA
52 Server the computation 1. Client work needs to be as low as possible. 2. Server needs to do most of the search work.
53 Secure searching Inverted index: CIA WATERGATE NIXON Symmetric key searchable encryption index: ENC. DOC. NAMES: INDEX: CIA CIA CIA
54 Secure searching Server has: ENC. DOC. NAMES: INDEX: CIA CIA CIA Search term:
55 Secure searching Server has: ENC. DOC. NAMES: INDEX: CIA CIA CIA Search term: Server computation:
56 Secure searching Server has: ENC. DOC. NAMES: INDEX: CIA CIA CIA Search term: Server computation:
57 Secure searching Server has: ENC. DOC. NAMES: INDEX: CIA CIA CIA Search term: Server computation:
58 Secure searching Server has: ENC. DOC. NAMES: INDEX: CIA CIA CIA Search term: Server computation: Result:
59 Performance Example 1 - OXT: [Cash-Jarecki-Jutla-Krawczyk-Rosu-Steiner13] Encrypted database size: 13GB DB Contents: 1.5 million s & attachments Avg. search time: less than 500ms Example 2 2Lev: [Cash-Jaeger-Jarecki-Jutla-Krawczyk-Steiner-Rosu14] Encrypted database size: 900GBs Setup time: 16 hours Avg. query time: less than 200ms
60 Searchable encryption limitations Encrypted search term is deterministic Access pattern is not completely hidden Setting up the index requires a significant amount of time Most schemes do not support index extensions
61 ORAM vs. Searchable Encryption ORAM Searchable encryption Provides anonymous access to data blocks Used in private information retrieval protocols Fully protects access patterns and data contents Requires a considerable overheads which greatly limit usability Enables users to securely search a precomputed index Used to efficiently locate data in large databases Protects search terms and search results Does not fully protect access patterns
62 Thank you!
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers
More informationESPRESSO: An Encryption as a Service for Cloud Storage Systems
8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014 Outline Introduction and
More informationAhsay Online Backup Suite v5.0. Whitepaper Backup speed
Ahsay Online Backup Suite v5.0 Version 5.0.1.0 Jan 2006 Table of Content 1 Introduction...3 2 Testing Configuration and Setup...4 2.1 Hardware and Software Setup...4 2.2 Test Scenarios...4 3 Results...5
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationXpresstransfer Online Backup Suite v5.0 Whitepaper Backup speed analysis
Xpresstransfer Online Backup Suite v5.0 Whitepaper Backup speed analysis Version 5.0 Table of Content 1 Introduction...... 3 2 Testing Configuration and Setup 3 2.1 Hardware and Software Setup... 3 2.2
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
More informationEfficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
More informationRanked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
More informationQUESTIONS AND ANSWERS
TECHNOLOGY CONSULTANCY Innovative. Reliable. Efficient. QUESTIONS AND ANSWERS WEB HOSTING SERVICES What you need to know about Web Hosting Q&A - WEBHOSTING 1. What is web hosting? Web Hosting is a service
More informationFeasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea
More informationSecure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
More informationGoogle Compute Engine Configuration
Google Compute Engine Configuration GCE Deployment Setup for VNS3 2014 1 Contents Introduction 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Manager 19 Instance
More informationNAS 259 Protecting Your Data with Remote Sync (Rsync)
NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having
More informationTechnical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationSecurity for Cloud & Big Data
Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 25, 2016 Awesome Project 2 Solutions Honorable mention: Vincent Wang and John Choi super-efficient updates (6-9x better
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationNew Constructions and Practical Applications for Private Stream Searching (Extended Abstract)
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)???? John Bethencourt CMU Dawn Song CMU Brent Waters SRI 1 Searching for Information Too much on-line info to
More informationHOW CLOUD DATABASE ENABLES EFFICIENT REAL-TIME ANALYTICS?
HOW CLOUD DATABASE ENABLES EFFICIENT REAL-TIME ANALYTICS? DATA MANAGEMENT MATTERS Worldwide data volumes keep growing Real time management of big data Return result in milliseconds Deals with TBs to PBs
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,
More informationUsing S3 cloud storage with ROOT and CernVMFS. Maria Arsuaga-Rios Seppo Heikkila Dirk Duellmann Rene Meusel Jakob Blomer Ben Couturier
Using S3 cloud storage with ROOT and CernVMFS Maria Arsuaga-Rios Seppo Heikkila Dirk Duellmann Rene Meusel Jakob Blomer Ben Couturier INDEX Huawei cloud storages at CERN Old vs. new Huawei UDS comparative
More informationCenturyLink Cloud Configuration
CenturyLink Cloud Configuration CenturyLink Setup for VNS3:vpn, VNS3:net and VNS3:turret 2015 copyright 2015 1 Table of Contents Introduction 3 CenturyLink Cloud Deployment Setup 9 VNS3 Configuration Document
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationConnecting to the FILTER Virtual Private Network (VPN)
Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs
More informationSecurity of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
More informationHow To Write A Blog Post On Dropbox
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage
More informationAMAZON S3 AND EC2 PERFORMANCE REPORT
AMAZON S3 AND EC2 PERFORMANCE REPORT OVERVIEW A frequently asked question regarding the Amazon Web Services (AWS) cloud computing platform is how well their storage system (S3) performs with their computing
More informationHow To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com
More informationMeeting Cybersecurity Challenges through Innovative Computer System Design. Srini Devadas MIT
Meeting Cybersecurity Challenges through Innovative Computer System Design Srini Devadas MIT Attackers routinely compromise computer systems Attackers routinely compromise computer systems Attackers routinely
More informationData Storage Options for Research
Research IT Office Data Storage Options for Research By Ashok Mudgapalli Director of Research IT Agenda Current Research Data Storage Current Data Backup Strategies Available Storage Solution: Enterprise
More information11/13/2013. Research IT Office. Data Storage Options for Research. By Ashok Mudgapalli Director of Research IT. Agenda
Research IT Office Data Storage Options for Research By Ashok Mudgapalli Director of Research IT Agenda Current Research Data Storage Current Data Backup Strategies Available Storage Solution: Enterprise
More informationInstall Guide Housatonic Project Plan for PC. Housatonic Software - Project Plan 365 App
Install Guide Housatonic Project Plan for PC Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Workstation Requirements... 4 3. Install... 5 4. Uninstall... 7 www.projectplan365.com
More informationBandwidth consumption: Adaptive Defense and Adaptive Defense 360
Contents 1. 2. 3. 4. How Adaptive Defense communicates with the Internet... 3 Bandwidth consumption summary table... 4 Estimating bandwidth usage... 5 URLs required by Adaptive Defense... 6 1. How Adaptive
More informationACCREDITED SOLUTION. EXPLORER Core FTP
ACCREDITED SOLUTION EXPLORER Core FTP Document Name: EXPLORER Core FTP Revision: B Introduction: Typical Users: Product Description: This document describes the Core FTP (File Transfer Protocol) software
More informationComputing on Encrypted Data
Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 Smart Homes New Applications in the Internet of Things aggregation + analytics usage statistics and reports report energy
More informationCERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT
SS Data & Storage CERN Cloud Storage Evaluation Geoffray Adde, Dirk Duellmann, Maitane Zotes CERN IT HEPiX Fall 2012 Workshop October 15-19, 2012 Institute of High Energy Physics, Beijing, China SS Outline
More informationSeclusion Search over Encrypted Data in Cloud Storage Services
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationKeywords: cloud computing, multiple keywords, service provider, search request, ranked search
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
More informationFor example some Bookkeepers are using Dropbox to share the accounting files between them and their client.
DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number
More informationB. KTT Web-based File Transfer
B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.
More informationAmazon Web Services Student Tutorial
Amazon Web Services Free Usage Tier Elastic Compute Cloud Amazon Web Services Student Tutorial David Palma Joseph Snow CSC 532: Advanced Software Engineering Louisiana Tech University October 4, 2012 Amazon
More informationSSL DOES NOT MEAN SOL What if you don t have the server keys?
SSL DOES NOT MEAN SOL What if you don t have the server keys? J. Scott Haugdahl Architect, Blue Cross Blue Shield MN Robert Bullen Systems Engineer, Blue Cross Blue Shield MN Setting Expectations This
More informationOutsourced Private Information Retrieval
Outsourced Private Information Retrieval Yizhou Huang Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada y226huang@cs.uwaterloo.ca Ian Goldberg Cheriton School of Computer
More informationIpswitch WS_FTP Server
Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The
More informationPublishing Your Website Using MS-FTP (for Windows Users)
Publishing Your Website Using MS-FTP (for Windows Users) After finishing your pages for the web site, you'll need to upload your pages on the web to publish your site. This is a tutorial on how to use
More informationALPTEKİN KÜPÇÜ. Assistant Professor of Computer Science and Engineering
ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Core Research Cryptography Security Privacy Application Areas Research Topics Cloud Computation Cloud Storage Peer-to-Peer Systems
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationDSS. Data & Storage Services. Cloud storage performance and first experience from prototype services at CERN
Data & Storage Cloud storage performance and first experience from prototype services at CERN Maitane Zotes Resines, Seppo S. Heikkila, Dirk Duellmann, Geoffray Adde, Rainer Toebbicke, CERN James Hughes,
More informationOpenEMR A Fully Integrated Certified ed EHR and Practice ce Management age e System Medical Information Integration, LLC OpenEMR 4.1 ONC-ATB Ambulatory EHR 2011-20122012 Certified Easy to Learn,, Easy
More informationThe following sections provide information on the features and tasks of Server Inventory:
IIServer Inventory The Server Inventory component of Novell ZENworks 7 Server Management enables you to collect hardware and software inventory information from local and remote servers of your enterprise.
More informationData Processing Solutions - A Case Study
Sector & Sphere Exploring Data Parallelism and Locality in Wide Area Networks Yunhong Gu Univ. of Illinois at Chicago Robert Grossman Univ. of Illinois at Chicago and Open Data Group Overview Cloud Computing
More informationUDR: UDT + RSYNC. Open Source Fast File Transfer. Allison Heath University of Chicago
UDR: UDT + RSYNC Open Source Fast File Transfer Allison Heath University of Chicago Motivation for High Performance Protocols High-speed networks (10Gb/s, 40Gb/s, 100Gb/s,...) Large, distributed datasets
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationDevelopment of Monitoring and Analysis Tools for the Huawei Cloud Storage
Development of Monitoring and Analysis Tools for the Huawei Cloud Storage September 2014 Author: Veronia Bahaa Supervisors: Maria Arsuaga-Rios Seppo S. Heikkila CERN openlab Summer Student Report 2014
More informationOBM (Out of Band Management) Overview
OBM (Out of Band Management) Overview With the growth of IP, routers deployed into an IP network must not only be accessible by the network operator for maintenance and configuration purposes, but secure
More informationDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,
More informationIDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM
IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM FEBRUARY 2013 Ivana Lung, University of Guelph, Research Shop Intern Citation: Lung, I. (2013). Identifying the optimal multi-user document
More informationDSS. Diskpool and cloud storage benchmarks used in IT-DSS. Data & Storage Services. Geoffray ADDE
DSS Data & Diskpool and cloud storage benchmarks used in IT-DSS CERN IT Department CH-1211 Geneva 23 Switzerland www.cern.ch/it Geoffray ADDE DSS Outline I- A rational approach to storage systems evaluation
More informationAre You Paying Too Much for ediscovery Processing?
Are You Paying Too Much for ediscovery Processing? How new technologies can accelerate ediscovery and lower your costs Guy MacNeill Product Manager, Lexbe LC ediscovery Webinar Series About our webinars
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage
More informationjoin.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
More informationCumulus: filesystem backup to the Cloud
Michael Vrable, Stefan Savage, a n d G e o f f r e y M. V o e l k e r Cumulus: filesystem backup to the Cloud Michael Vrable is pursuing a Ph.D. in computer science at the University of California, San
More informationSecure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
More informationMulti-User Searchable Encryption in the Cloud. Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 September 10, 2015 Trondheim, Norway
Multi-User Searchable Encryption in the Cloud Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 th September 10, 2015 Trondheim, Norway Outline Searchable Encryption Multi-User Scenarios State of
More informationHow To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On
ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationStellar Phoenix. Access Database Repair 5.0 Installation Guide
Stellar Phoenix Access Database Repair 5.0 Installation Guide Overview Stellar Phoenix Access Database Repair, a secure and easy to use application is designed for repairing corrupt Microsoft Access (.mdb,.accdb)
More informationValue-added Services for 3D City Models using Cloud Computing
Value-added Services for 3D City Models using Cloud Computing Javier HERRERUELA, Claus NAGEL, Thomas H. KOLBE (javier.herreruela claus.nagel thomas.kolbe)@tu-berlin.de Institute for Geodesy and Geoinformation
More informationOptimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
More informationCLoud Computing is the long dreamed vision of
1 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Cong Wang, Student Member, IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Wenjing Lou, Senior Member,
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationPatient Controlled Encryption: Ensuring Privacy of Electronic Medical Records
Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Melissa Chase (MSR) Joint work with Josh Benaloh, Kristin Lauter, and Eric Horvitz Medical Records Traditionally, health providers
More informationACR Triad Site Server Click Once Software System
ACR Triad Site Server Click Once Software System Version 2.5 20 October 2008 User s Guide American College of Radiology 2007 All rights reserved. CONTENTS INTRODUCTION...3 ABOUT TRIAD...3 DEFINITIONS...4
More informationPOPI Cloud Backups. Overview. The Challenges
POPI Cloud Backups Overview POPI Online Backup offers a simple, Secure, rapid deployment solution that is customizable and cost effective to implement a Backup strategy throughout your organisation. POPI
More informationLessons Learned while Pushing the Limits of SecureFile LOBs. by Jacco H. Landlust. zondag 3 maart 13
Lessons Learned while Pushing the Limits of SecureFile LOBs @ by Jacco H. Landlust Jacco H. Landlust 36 years old Deventer, the Netherlands 2 Jacco H. Landlust / idba Degree in Business Informatics and
More informationWAN Optimization and Cloud Computing. Josh Tseng, Riverbed
WAN Optimization and Cloud Computing Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationData Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
More informationTuning Microsoft SQL Server for SharePoint. Daniel Glenn
Tuning Microsoft SQL Server for SharePoint Daniel Glenn Daniel Glenn @DanielGlenn http://knowsp.com SharePoint and Collaboration Practice Leader @ InfoWorks, Inc. www.infoworks-tn.com PASS Nashville Business
More informationSystem Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
More informationPrivacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh
Privacy and Verifiability for Data Storage in Cloud Computing Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh Cloud Computing Outsourcing storage & computation High availability No IT maintenance
More informationAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationIntroduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov
Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationPrivacy and Security in Cloud Computing
Réunion CAPPRIS 21 mars 2013 Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧnen Slide 1 Cloud computing Idea: Outsourcing Ø Huge distributed data centers Ø Offer storage and computation Benefit:
More informationWorkflow Solutions Data Collection, Data Review and Data Management
Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow
More informationDESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
More informationClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
More informationUpgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
More informationAncero Backup & Disaster Recovery (BDR) Service Guide
Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware
More informationHow To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple
Intralinks Customer Managed Keys Technical Overview Version 2.0 October 2014 Copyright 2014 Intralinks, Inc. 1 Intralinks Customer Managed Keys, Technical Overview January 5, 2015 About This Document...
More informationSOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle
SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012 Load Test Results for Submit and Approval Phases of Request Life Cycle Table of Contents Executive Summary 3 Test Environment 4 Server
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationMUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
More informationCrank Your BI Performance up to 11 - Sizing, Tuning & Performance Testing. Innovation Center Network, Silicon Valley Active Global Support
Crank Your BI Performance up to 11 - Sizing, Tuning & Performance Testing James Rapp Jonathan Brown Innovation Center Network, Silicon Valley Active Global Support How-To Live Example Existing Patterns
More informationDistributed Data Storage Based on Web Access and IBP Infrastructure. Faculty of Informatics Masaryk University Brno, The Czech Republic
Distributed Data Storage Based on Web Access and IBP Infrastructure Lukáš Hejtmánek Faculty of Informatics Masaryk University Brno, The Czech Republic Summary New web based distributed data storage infrastructure
More informationGet Your Business Connected Dedicated Leased Line Internet Access
Get Your Business Connected Dedicated Leased Line Internet Access Uncontended, dedicated internet service Market leading performance and availability A Leased Line & your business What this means for you
More informationMillbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
More information