Security and accounting for Storage Service Provider

Size: px
Start display at page:

Download "Security and accounting for Storage Service Provider"

Transcription

1 Security and accounting for Storage Service Provider Yongdae Kim Collaborators: N. Hopper, J. Weissman, A. Chandra Students: V. Kher, I. Osipkov, S. Hong, J. Kim University of Minnesota Supported by DISC, NSF CAREER Grant CNS , ETRI (Korea)

2 Organization Introduction to SSP Secure File Sharing in SSP Temporal Access Control in SSP Proxy Re-encryption for SSP Accounting and Metering in SSP Distributed Accounting in P2P File Archiving System If time permits 2

3 What is SSP? Storage Service Provider (SSP) is a company that provides computer storage space and related management services. SSPs also offer periodic backup, archiving and the ability to consolidate data from multiple company locations so that data can be effectively shared. Enterprise SSP offers managed storage services backup, fault tolerance, high availability, security, fire protection, 24-hour service for organizations that do not want to manage these services on their own. 3

4 By Doug Chandler, IDC analyst Why more storage companies are getting into services? Many customers are looking for help at the strategic level: storage architecture and planning the tactical level: data backup assistance Many storage vendors are seeing their product sales growth slipping, as storage hardware becomes commoditized, so they re looking for other ways to drive revenue. What s the future of the storage utility or Storage Service Provider (SSP) model? Early on appealed directly to Internet companies The pay-by-the-drink pricing appealed to these customers, as well as the ability to scale up quickly if needed. When the dot.coms went away, the SSP market became much tougher, because enterprise firms haven t yet bought into this model. The future of the pure SSP model is uncertain, but we think, more firms will become comfortable with outsourcing not only storage but a lot of their infrastructure needs. 4

5 Storage service provider revival? Randy Kerns, ComputerWorld Past Failure Few years ago, some start-ups attempted SSP. This experiment was, in a word, unsuccessful. So why did it fail? the industry went into a severe economic downturn then. It may also be that the economics were really not that compelling. Reluctance of businesses to turn over the control of their data to someone else. Revival Why? The economic downturn seems to have ended. The demand for capacity continues unabated Business continuity is required to protect operations from local or regional interruptions. Regulatory requirements are having a great impact on storage. Examples Sun announces fixed price service. IBM, HP Remote replication: Amerivault, Arsenal Digital, EVault, Iron Mountain 5

6 Summary: Why (not) Storage Service Provider? Why Business continuity is required to protect operations from local or regional interruptions. Regulatory requirements are having a great impact on storage. No worry about storage management such as backups, high availability, fault-tolerance, fire protection, file sharing Don t need to hire expert for long-term Why not? Reluctance of businesses to turn over the control of their data to someone else. From my perspective, SECURITY! 6

7 So in this talk On-going work on Storage Security in UMN Mostly from Career Award Proposal In SSP model, Key Management for File Sharing Temporal Access Control Proxy Re-encryption Accounting 7

8 File Sharing and Trust in SSP Information is more valuable than subscription fee. At least, the subscriber does not want SSP to read their data. E2E encryption Any data should be encrypted in a trusted domain and decrypted in a trusted domain. (SFS by Hughes) Or client (writer) encrypts and client (reader) decrypts. Client has key management overhead. Secure against insider (admin) misuse. SSP Does not have read permission! No need for read access control. It always has write permission! They have to, since customer paid to get service. Key Management for File Sharing 8

9 Goals Secure file sharing system with end-to-end encryption Group sharing Data confidentiality Efficient revocation Lesser overhead of key distribution and re-encryption Other issues Ensure data integrity User s sign modifications Non-repudiation Key recovery Key Management for File Sharing 9

10 Communication vs. Data Confidentiality Communication security is well-understood. Storage is a broadcast channel. Ephemeral key for encryption Don t use long term key. Compromise of a long-term key leads to compromise of all past ciphertext. Not applicable in storage! Can t use Diffie-Hellman protocol since parties may not be on-line. Group key management needs to provide forward/backward security. Revoked members should not be able to decrypt future messages. Impossible in storage, since we have to re-encrypt all data available to the member. New member should not be able to decrypt past messages. Impossible in storage! Lazy re-encryption: Re-encrypt the data, only when data is modified. Key Management for File Sharing 10

11 A Simple Solution A 1 has (r, w) permission, A 2 has r permission on file F. Meta-data: E PKA1 (K), E PKA2 (K), S SKA1 (F) Encrypted Data: E K (F) Any reader can decrypt! Non-repudiation and data integrity are guaranteed. A 2 revoked, A 3 gets r permission. No data change yet. [E PKA1 (K), E PKA3 (K), S SKA1 (F)], E K (F) A 2 revoked, A 3 gets r permission. Data change. [E PKA1 (K ), E PKA3 (K ), S SKA1 (F )], E K (F ) Key Management for File Sharing 11

12 LockBox: Save storage space/computation! When group of users have same permission [E PKA1 (K 1, K 2 ), E PKA3 (K 1, K 2 ), S SKA1 (F 1 ), S SKA1 (F 2 )] E K1 (F 1 ), E K2 (F 2 ) When any file changes, lock box changes. Still many public key operations! Key Management for File Sharing 12

13 Using Symmetric Binomial Used for Sensor Network Security Assumption: Group of users know each other s id. Goal: Any two users can compute a shared key without using PKC. Setup: server randomly generates a bivariate t-degree polynomial f(x,y) = (from i,j=0 to t) a ij x i y j mod q, ( q is a prime number ) such that f(x,y)=f(y,x). For each user A i, the setup server distributes f(a i,y). User A i will compute f(a i, A j ) and user A j will compute f(a j, A i ) by evaluating f(a j,y) at point A i. f(a j,a i )=f(a i,a j ) Unconditionally secure and t-collusion resistant Key Management for File Sharing 13

14 Applying Binomial to LockBox Let K 12 = f(a 1, A 2 ), K 13 = f(a 1, A 3 ) When group of users have same permission [E K12 (K 1, K 2 ), E K13 (K 1, K 2 )], E K1 (F 1 ), E K2 (F 2 ) Pros No public key operation. User s storage is small. Issues What should be t? How much trust we can give to users? Key Management for File Sharing 14

15 Other Possible Approaches Scalable approaches (scale up to 1,000,000 users) Group key distribution Group of k users can share a key in a centralized environment Each user needs to compute log k hash functions to compute a lock-box key. Join and leave are efficient: log k hash operation. Space overhead: 2k (Still smaller than PKC) Broadcast encryption Group of k users can share a key in a centralized, stateless environment User key storage is relatively big: log k Leave is efficient: log k hash operation. Space overhead: 2 r (r: number of revoked users) Key Management for File Sharing 15

16 Organization Introduction to SSP Secure File Sharing in SSP Temporal Access Control in SSP Proxy Re-encryption for SSP Accounting and Metering in SSP Distributed Accounting in P2P File Archiving System If time permits 16

17 Temporal Access Control in SSP Problem Setting Alice wants to have control over her private information She wants to store it with a highly available storage provider, which she could access from anywhere Storage provider should not know what she is storing Alice - Minimal computation Alice should be able to let the people she like access some information for a limited period of time Temporal Access Control in SSP 17

18 Basic Architecture Authorization Private Information Storage Private Information Retrieval Temporal Access Control in SSP Private Information Update 18

19 Existing Approaches Access Control List (ACL): Owner defines an ACL and gives it to the PIP PIP should be trusted. Else encrypt the data implies more key management issues Kerberos : Owner has to play AS Problems same as above + Owner has to be online Lockbox: encrypt the file with symmetric key and encrypt the symmetric key with public key of users who will be granted access (used in Storage Security) Owner has to be online to provide access to new user! Once the authorization expires update the lockbox, has to contact PIP! Temporal Access Control in SSP 19

20 Time-Lock Puzzle Owner encrypts info and dies: he wants it to be decrypted no earlier than 30 days after Solution 1: force receiver to do intensive computation that will take no less than 30 days. Note: cannot be parallelizable!! Solution 2: give it to a trusted agent who will decrypt it after 30 days Solution 3: agent has PK i /SK i pair for day i and all public keys are published but secret keys are revealed incrementally Our solution CoPRA Temporal Access Control in SSP 20

21 Temporal Access Control Extension of Time-Lock Puzzle Owner puts data on untrusted storage provider At any time in the future, owner can make unscheduled updates Owner is able to give access to anyone for any number of days well ahead of time Once access for a future period has been obtained, user never has to contact owner again Storage provider is not involved in access control: it uploads data to anyone who requests it Temporal Access Control in SSP 21

22 Challenge How can the PIP do updates without owner interference? There exists a function f such that Homomorphic encryption! f(k 1, E k (m)) = E k1 (m) Temporal Access Control in SSP 22

23 Applications Private Information on the Internet We will be able to realize privacy on the Internet using our approach. For example Alice purchasing products from a website could provide authorization to some information, with which the website could contact a PIP. At this point we can limit future access only. Disclosure of Medical History Information A patient gives a doctor access to its information up to a certain day. It only makes sense that doctor should be able to obtain the old history as well, but should not be able to spy on patient in the future. Time Released Cryptography Only at some point of time, you can read my information! Military: Orders: need-to-know pre-compiled orders. Today you must be in Iraq, tomorrow in Afghanistan and the next day in Pakistan. Old info does not matter since troop deployments are public, but enemy cannot find out tomorrow s deployment place. Temporal Access Control in SSP 23

24 Organization Introduction to SSP Secure File Sharing in SSP Temporal Access Control in SSP Proxy Re-encryption for SSP Accounting and Metering in SSP Distributed Accounting in P2P File Archiving System If time permits 24

25 Proxy Re-encryption Alice stores encrypted files at storage provider SP and wants to give read-only access to Bob 1, Bob 2,. Naïve approach Alice encrypts file F (E K (F)) and stores it in SP. Alice also tells Key Server KS to give read access to B 1, B 2. B 1 downloads E K (F). B 1 asks KS for decryption key. SK encrypts K with Bob s key and sends it to Bob. SK: Key Translator To prevent insider misuse, it is desirable that KS should not be able to read data. Proxy re-encryption problem Proxy Re-encryption 25

26 High-Level Approach (Ateniese et. Al.) Alice computes tok Bob which is a function of Bob s public key and Alice s secret key The token is stored at KS Given ciphertext E K (F) and tok Bob, KS can re-encrypt so that Bob can decrypt using his secret key f(e K (F), tok Bob ) = E PK (F) Goals: Each file is encrypted using a different key and can be decrypted without updating token SP cannot decrypt any files Collusion-safe Proxy Re-encryption 26

27 Protocol Description Proxy Re-encryption 27

28 Problems and Goals Collusion When Bob and SP collaborate (without giving Bob s private), SP can decrypt any file! Goals: Even with access to the token, Bob cannot extract anything that allows others to decrypt unless his secret key is compromised The above should be true even when Bob colludes with others who were given their own tokens Proxy Re-encryption 28

29 Organization Introduction to SSP Secure File Sharing in SSP Temporal Access Control in SSP Proxy Re-encryption for SSP Accounting and Metering in SSP Distributed Accounting in P2P File Archiving System If time permits 29

30 Uncheatable Accounting and Secure Metering Bandwidth? Storage? IP Network SSPs Cheating incentives Consumer attempts to deny consumption Producer attempts to increase consumption At least, SSP computes cost of I/O as well as storage usage. It would be more beneficial if SSP can prove Bob (also to the public) how much they spend. Pricing model. Uncheatable Accounting and Secure Metering 30

31 Uncheatable Accounting Applications Pricing, predicting trends Naïve solution Third party intervention Expensive and time consuming Can still result in disputes Not provable Need a solution Both parties can prove usage without third party intervention Uncheatable Accounting and Secure Metering 31

32 Goals Accounting for bandwidth and storage Number of bytes read and written Consumer should not be able to repudiate usage Producer should not be able to overstate usage No third party intervention Minimal accounting and verification overhead on the accountant Minimal overhead on the SSP as well as the consumers Uncheatable Accounting and Secure Metering 32

33 A Naïve Approach Signature per access Order of release of signature matters One signature per access One verification per access Huge verification burden on the accountant Main challenge: efficiency Exploring and evaluating potential approaches Uncheatable Accounting and Secure Metering 33

34 Organization Introduction to SSP Secure File Sharing in SSP Temporal Access Control in SSP Proxy Re-encryption for SSP Accounting and Metering in SSP Distributed Accounting in P2P File Archiving System If time permits 34

35 Distributed Accounting in P2P File Archiving Why P2P? Cheap off-the-shelf components Expensive RAID disks may not be needed Naturally distributed Geographically distributed: power outage resistance Variety of system software and hardware Robust to Failures Availability Bartering (perhaps transitive) can be used to obtain remote storage, i.e. no money is needed! A lot of storage space, decent bandwidth Why don t we help each other to provide reliability and availability? Distributed Accounting in P2P File Archiving 35

36 Challenges of P2P Trust No one is trusted initially No TTP exists to mediate grievances Identity Persistence Peers may change identities by changing IP addresses for example Peers may be able to maintain several identities (Sybil attack) Tendency to free-load Empirical measurements: Study at PARC Distributed Accounting in P2P File Archiving 36

37 Challenges of P2P Service Provision Are the files being stored? QoS Need reputation system Identify and Contain the bad guys Need accounting system Did he really provide service to others or he is just lying? Collusion and Sybil attacks Distributed Accounting in P2P File Archiving 37

38 Existing Approaches: Samsara Alice wants to store file F at Bob Alice sends F Bob sends token, same size as F Token can be forwarded but it has to be stored somewhere Chain can be formed with only one token If chain turns into circle, token is dropped Problems: If token is real file, it may return to Bob which makes no sense In a chain, if someone drops a file, chain-reaction follows No chain: large storage overhead 100% bandwidth overhead!!! Other problems as well, but interesting overall Can use probabilistic file dropping: Can be exploited by free-loaders Distributed Accounting in P2P File Archiving 38

39 Existing Approaches: Pastry-Based Details: Every node publishes its capacity allocated for others, files stored for others and files stored remotely for node itself If A stores file F at B, B uses Anonymous Communication to check that A does not lie to others. All requests for storage follow this protocol. Occasionally, a node chooses another random node (using DHT) and audits its books one level deep to make sure it really stores files Problems: If node fails, all its files will be dropped immediately Distributed Accounting in P2P File Archiving 39

40 Ideal Goal Store your files on the network as much as you contribute to the network. More formally C(A) > S t (A) for all node A at any time t, where C(A) is A s storage space contribution to the network S t (A) is size of total storage space A is using at time t. Requirements Should be able to handle on-line/off-line nature of P2P system Efficiency: Communication, Computation, (additional) Storage Robustness against collusion: Assuming that majority of the nodes are honest (cooperative) Should provide a mechanism that ensures my file is stored! Distributed Accounting in P2P File Archiving 40

41 More coming up! We have ideas and we will implement on top of wellknown P2P file sharing system Distributed Accounting in P2P File Archiving 41

42 Suggestions/Questions? Still actively on-going! Many other applications Medical information system ERP SSP If you have any security problems and questions, please let us know. except Jim :-) 42

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Melissa Chase (MSR) Joint work with Josh Benaloh, Kristin Lauter, and Eric Horvitz Medical Records Traditionally, health providers

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1 KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud Sanjay Madria Professor and Site Director for NSF I/UCRC Center on Net-Centric Software and Systems Missouri University

More information

SGFS: Secure, Flexible, and Policy-based Global File Sharing

SGFS: Secure, Flexible, and Policy-based Global File Sharing SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

Cryptanalysis of Cloud based computing

Cryptanalysis of Cloud based computing Cryptanalysis of Cloud based computing COMP 4109 Elom Tsiagbey Overview Introduction Recent threats to cloud computing Key Management models Conclusion Proposed key management model What is Cloud Computing?

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

WHITE PAPER www.tresorit.com

WHITE PAPER www.tresorit.com WHITE PAPER tresor [tʀeˈzoːɐ ] noun (German) 1. lockable, armoured cabinet THE CLOUD IS UNTRUSTED The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister

Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

The Ephemerizer File System

The Ephemerizer File System File System Design with Assured Delete Radia Perlman Sun Microsystems radia.perlman@sun.com Abstract This paper describes a system that supports high availability of data, until the data should be expunged,

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Using the Cloud: A Quick Guide for Small and Medium Businesses

Using the Cloud: A Quick Guide for Small and Medium Businesses Using the Cloud: A Quick Guide for Small and Medium Businesses Author: Ben McDougall (Greystone Consulting Ltd), November 2013 1 What is the Cloud? Although we have been hearing about The Cloud for the

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

A Survey of Cloud Storage Security Research. Mar Kheng Kok Nanyang Polytechnic mar_kheng_kok@nyp.gov.sg

A Survey of Cloud Storage Security Research. Mar Kheng Kok Nanyang Polytechnic mar_kheng_kok@nyp.gov.sg A Survey of Cloud Storage Security Research Mar Kheng Kok Nanyang Polytechnic mar_kheng_kok@nyp.gov.sg Presentation Outline Security concerns of cloud storage Data confidentiality in the cloud Data availability/integrity

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Computer and Network Security. Outline

Computer and Network Security. Outline Computer and Network Security Lecture 10 Certificates and Revocation Outline Key Distribution Certification Authorities Certificate revocation 1 Key Distribution K A, K B E KA ( K AB, E KB (KAB) ) K A

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Alliance AES Key Management

Alliance AES Key Management Alliance AES Key Management Solution Brief www.patownsend.com Patrick Townsend Security Solutions Criteria for selecting a key management solution for the System i Key Management is as important to your

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

7 Key Management and PKIs

7 Key Management and PKIs CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Storage Systems Autumn 2009

Storage Systems Autumn 2009 Storage Systems Autumn 2009 Chapter 5: Securely Auditing André Brinkmann Sources Different Publications Slides from Randal Burns, Johns Hopkins University, USA Awkward for large data What s wrong with

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio Sazzad.Masud@gmail.com, Ram.Krishnan@utsa.edu Abstract Cloud

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Dynamic Data Storage for Trustworthy Cloud

Dynamic Data Storage for Trustworthy Cloud www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9350-9354 Dynamic Data Storage for Trustworthy Cloud Prof. M.M.More, Mahesh

More information

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack Elements of Applied Cryptography Key Distribution Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack Point-to-point key establishment Alice Bob Each pair of users must share

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

Plutus: scalable secure file sharing on untrusted storage

Plutus: scalable secure file sharing on untrusted storage Plutus: scalable secure file sharing on untrusted storage Mahesh Kallahalla HP Labs Joint work with Erik Riedel (Seagate Research), Ram Swaminathan (HP Labs), Qian Wang (Penn State), Kevin Fu (MIT) March

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

Cloud Storage and Backup

Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup Cloud Storage and Backup services from iomartcloud have been designed to deliver the performance, capacity, security and flexibility needed to address

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

Lecture 17: Re-encryption

Lecture 17: Re-encryption 600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy

More information

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 - Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC

More information

WHY CLOUD BACKUP: TOP 10 REASONS

WHY CLOUD BACKUP: TOP 10 REASONS WHITE PAPER DATA PROTECTION WHY CLOUD BACKUP: TOP 10 REASONS Contents REASON #1: Achieve disaster recovery with secure offsite cloud backup REASON #2: Freedom from manual and complex tape backup tasks

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

How To Make A Trustless Certificate Authority Secure

How To Make A Trustless Certificate Authority Secure Network Security: Public Key Infrastructure Guevara Noubir Northeastern University noubir@ccs.neu.edu Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

How To Ensure Data Integrity In Clouds

How To Ensure Data Integrity In Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Cryptography and Key Management Basics

Cryptography and Key Management Basics Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Managed Encryption Service

Managed Encryption Service Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

How To Get To A Cloud Storage And Byod System

How To Get To A Cloud Storage And Byod System Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1

White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1 White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management

More information

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA) Computer Science CSC/ECE 574 Computer and Network Security Topic 7.2 Public Key Infrastructure (PKI) CSC/ECE 574 Dr. Peng Ning 1 What Is PKI Informally, the infrastructure supporting the use of public

More information