Side channels in cloud services, the case of deduplication in cloud storage

Size: px
Start display at page:

Download "Side channels in cloud services, the case of deduplication in cloud storage"

Transcription

1 Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 1 / 18

2 Outline 1 Introduction 2 Deduplication 3 Security Loophole 4 Solutions 5 Conclusions Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 2 / 18

3 Introduction Cloud storage Fast growth of data volumes: Demand for online storage services Cloud storage services: Low cost, scalable, pay-per-use Service delivered via internet Deduplication: Storing only a single copy of data Provides user a link to the existing copy Reduces storage space of service provider Decreases consumption of bandwidth from client to server Disk and bandwidth savings 90% Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 3 / 18

4 Main Contribution Introduction Pointing out security loopholes due to cross user deduplication Proposing solution that reduces the risk of data leakage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 4 / 18

5 Deduplication Deduplication Strategies File-level: Stores a single copy of each file Block-level: Segments file to blocks. Stores single copy of each block Approaches Target-Based Approach: Dedup is handled by the storage service User is unaware of dedup Does not save bandwidth Source-Based Approach: User sends hash signature to the server If a copy already exists the file is not sent Saves bandwidth and storage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 5 / 18

6 Security Loophole The Loophole Settings Source-based approach The client knows whether dedup has occured Cross user dedup Other users can find out whether the file was uploaded Dropbox, Mozy and Memopal apply this setting The server answers the following question by yes/no Did any user previously uploaded a copy of this file? Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 6 / 18

7 Security Loophole Attack 1: Identifying File Assumptions The file is known to the attacker Unlikely to be at the possession of any other user The attacker uploads the file and checks whether dedup was performed Dedup can answer whether the user possess the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 7 / 18

8 Security Loophole Attack 2: Finding the Content of a File Assume the number of possibilities is limited The attacker uploads each possible version of the file The deduplicated version is identical to the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 8 / 18

9 Security Loophole Attack 3: Covert Channel Assume malicious software installed on the users machine The software establishes a covert channel based on cross users dedup Bypasses the firewall and communicates with its control server Binary example The software saves two files on the users machine The files are uploaded to the users backup service The control server uploads these files to the same backup service The deduplicated file represents the binary value Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 9 / 18

10 Solutions Solution 1: Encryption Encrypting the file using personal key before uploading to the service Different keys for identical files yield different encrypted files Does not allow deduplication This solution is vulnerable to offline dictionary attacks Deduplication reveals the key May indicate that a certain user posses the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 10 / 18

11 Solutions Solution 2: Target-Based Approach Deduplication is performed on the server side Eliminates bandwidth saving The cost of transferring 1 GB is proportional to the cost of storing it for 2 month (Amazon S3 service, June 2010) Solution of Mozyhome Relatively small files are uploaded Source based deduplication is performed on larger files Effective when Sensitive data is stored in small files Most bandwidth is consumed by large files Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 11 / 18

12 Solutions Solution 3: Randomization Weakening the correlation between existence of files in the storage system and deduplication Each file is assigned with a random threshold Source based deduplication is performed when the number of copies of different users exceeds this threshold Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 12 / 18

13 Solutions Solution 3: Description For every file X select a threshold t X [2,..., d] d may be public t X is chosen uniformly at random It is known only to the server c X is the number of users that uploaded copies of the file Source based dedup occurs when either c X t X X is uploaded by a client that already uploaded it Otherwise the file is sent and target based dedup occurs Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 13 / 18

14 Solutions Solution 3: Deletions Possible attack Attacker identifies source based dedup after t uploads It then deletes two files and again uploads these copies If source based dedup occurs after only one upload it indicates that some other user uploaded the file Not very practical attack since deleted files are retained by the service for some period of time Solution When c X t X source based dedup is always performed the server must keep a copy of the file even when all files are deleted Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 14 / 18

15 Solutions Solution 3: Security Analysis Examine the case where either A single copy of the file was uploaded No copy was uploaded Seems to be the most relevant for breaching single user privacy The events are as follows Attacker uploads single copy and dedup occurs: Happens only when t X = 2 and a single copy was uploaded Attacker detects that the file was uploaded Attacker uploads d copies before dedup occurs: Happens only when t X = d and no copy was uploaded Attacker detects that the file was not uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 15 / 18

16 Solutions Solution 3: Security Analysis Attacker uploads 2 < t < d copies before dedup occurs: Either t X = t and no copy was uploaded or t X = t+1 and a copy was uploaded The probability that X was uploaded equals its a-priori probability For a fraction of 1 1 d 1 of the files the solution leaks no information that distinguish between the case where a single copy was uploaded and the case where no copy was uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 16 / 18

17 Solutions Solution 3: Implications Implications on the service provider No increase in storage For a file X bandwidth increases by t X 1 A new tradeoff is introduced: As d increases The fraction of unprotected files decreases The bandwidth consumption increases The analysis for the covert channel attack is similar to the previous one since the threshold refers to the number of users that uploaded the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 17 / 18

18 Conclusions Conclusions This work reveals security loopholes created in cloud storage services, due to deduplication Several solutions were proposed in order to deal with the security risk A randomized solution that decreases the risk for data leakage at moderate cost was proposed Since cloud storage services are becoming increasingly popular, this work may have significant impact on the privacy provided for many users Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 18 / 18

19 Conclusions Thank you for your attention!

Security of Cloud Storage: - Deduplication vs. Privacy

Security of Cloud Storage: - Deduplication vs. Privacy Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt

More information

Side channels in cloud services, the case of deduplication in cloud storage

Side channels in cloud services, the case of deduplication in cloud storage Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges

More information

Cloud Storage Security

Cloud Storage Security Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage

More information

Proof of Ownership in Remote Storage Systems

Proof of Ownership in Remote Storage Systems Proof of Ownership in Remote Storage Systems S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg Summarized by Eli Haim Advanced Topics in Storage Systems School of Engineering - EE Tel Aviv University

More information

Secure Storage in the Cloud

Secure Storage in the Cloud Secure Storage in the Cloud 14. ISSS Berner Tagung für Informationssicherheit "Cloud Computing: Chancen und Risiken" 24. November 2011, Bern Prof. Dr. Michael Waidner Fraunhofer SIT, Direktor Technische

More information

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Secure Hybrid Cloud Architecture for cloud computing

Secure Hybrid Cloud Architecture for cloud computing Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of

More information

Differentially private client-side data deduplication protocol for cloud storage services

Differentially private client-side data deduplication protocol for cloud storage services SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..1159 RESEARCH ARTICLE Differentially private client-side data deduplication

More information

Secure Deduplication of Encrypted Data without Additional Servers

Secure Deduplication of Encrypted Data without Additional Servers Secure Deduplication of Encrypted Data without Additional Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas Bar Ilan

More information

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Policy-based De-duplication Mechanism for Securing Cloud Storage International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.70-79, June 2015 70 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi

More information

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Policy-based De-duplication Mechanism for Securing Cloud Storage International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.95-102, June 2015 95 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,

More information

Proofs of Ownership in Remote Storage Systems

Proofs of Ownership in Remote Storage Systems Proofs of Ownership in Remote Storage Systems Shai Halevi 1, Danny Harnik 2, Benny Pinkas 3, and Alexandra Shulman-Peleg 2 1 IBM T. J. Watson Research Center, 2 IBM Haifa Research Lab, 3 Bar Ilan University

More information

A Survey on Deduplication Strategies and Storage Systems

A Survey on Deduplication Strategies and Storage Systems A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide

More information

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

Secure Deduplication of Encrypted Data without Additional Independent Servers

Secure Deduplication of Encrypted Data without Additional Independent Servers Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas

More information

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.

More information

Backups and Cloud Storage

Backups and Cloud Storage Backups and Cloud Storage Front Range PC Users Group November 1, 2011 Definitions 1 A search using Google with the search criteria: online backup returned >192 million results A search using Google with

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

Deduplication Demystified: How to determine the right approach for your business

Deduplication Demystified: How to determine the right approach for your business Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning

More information

!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved.

!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Memeo C1 Security Bret Savage, CTO October 2013 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Guiding Principles Memeo C1 was scratch-built from the ground up to be the ultimate

More information

DXi Accent Technical Background

DXi Accent Technical Background TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on

More information

M Y S E C U R E B A C K U P. p r o d u c t o v e r v i e w O N L I N E B U S I N E S S B A C K U P

M Y S E C U R E B A C K U P. p r o d u c t o v e r v i e w O N L I N E B U S I N E S S B A C K U P O N L I N E B U S I N E S S B A C K U P Protect your company s files against loss, theft, viruses, and natural disasters. Share business data securely and privately in the office or across the globe. Sync

More information

METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review

METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 32 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper How Deduplication Benefits Companies of All Sizes An Acronis White Paper Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 What is deduplication?... 4 File-level deduplication

More information

FOR THE FUTURE OF DATA CENTERS?

FOR THE FUTURE OF DATA CENTERS? WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a

More information

DETECTION OF PEER TO PEER APPLICATIONS

DETECTION OF PEER TO PEER APPLICATIONS DETECTION OF PEER TO PEER APPLICATIONS AN OPSWAT WHITE PAPER Author: Priti Dadlani Contributors: Benny Czarny, Steven Ginn, Toshit Antani April 2008 OPSWAT, INC. www.opswat.com CONTENTS Introduction...

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Complete Data Protection & Disaster Recovery Solutions

Complete Data Protection & Disaster Recovery Solutions Complete Data Protection & Disaster Recovery Solutions Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After

More information

Deduplication has been around for several

Deduplication has been around for several Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

(More) Side Channels in Cloud Storage

(More) Side Channels in Cloud Storage (More) Side Channels in Cloud Storage Linking Data to Users Tobias Pulls Department of Computer Science Karlstad University Karlstad, Sweden tobias.pulls@kau.se Abstract. Public cloud storage services

More information

TIPS IN PREVENTING INFORMATION LEAKAGE

TIPS IN PREVENTING INFORMATION LEAKAGE TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

Cumulus: filesystem backup to the Cloud

Cumulus: filesystem backup to the Cloud Michael Vrable, Stefan Savage, a n d G e o f f r e y M. V o e l k e r Cumulus: filesystem backup to the Cloud Michael Vrable is pursuing a Ph.D. in computer science at the University of California, San

More information

An Encrypted File System

An Encrypted File System EncryptFS: An Encrypted File System By: Jorge Ornelas (joor2992) Ulziibayar Otgonbaatar (ulziibay) Otitochi Mbagwu (otitochi) 1 Abstract EncryptFS is an encrypted file system that stores files on an untrusted

More information

Demystifying Deduplication for Backup with the Dell DR4000

Demystifying Deduplication for Backup with the Dell DR4000 Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

SPECIAL REPORT. Data Deduplication. Deep Dive. Put your backups on a diet. Copyright InfoWorld Media Group. All rights reserved.

SPECIAL REPORT. Data Deduplication. Deep Dive. Put your backups on a diet. Copyright InfoWorld Media Group. All rights reserved. SPECIAL REPORT Data Deduplication Deep Dive Put your backups on a diet Copyright InfoWorld Media Group. All rights reserved. Sponsored by 2 Data deduplication explained How to reduce backup overhead and

More information

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh Privacy and Verifiability for Data Storage in Cloud Computing Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh Cloud Computing Outsourcing storage & computation High availability No IT maintenance

More information

Turnkey Deduplication Solution for the Enterprise

Turnkey Deduplication Solution for the Enterprise Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for

More information

Security of Cloud Computing

Security of Cloud Computing 1 University of Bath & BCS Council 26 March 2012 1 Thanks to Ali Kaafarani for the briefing How secure is cloud computing? How secure is c l o u d computing? the two questions are essentially equivalent,

More information

Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas

Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Topics Introduction Data Sharing Dropbox and Sharing Dropbox Security

More information

VANGUARD ONLINE BACKUP

VANGUARD ONLINE BACKUP VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: E-Guide An in-depth look at data deduplication methods This E-Guide will discuss the various approaches to data deduplication. You ll learn the pros and cons of each, and will benefit from independent

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.

More information

Open Source Data Deduplication

Open Source Data Deduplication Open Source Data Deduplication Nick Webb Red Wire Services, LLC nickw@redwireservices.com www.redwireservices.com @disasteraverted Introduction What is Deduplication? Different kinds? Why do you want it?

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security

More information

Storing & Synchronizing Data In The Cloud

Storing & Synchronizing Data In The Cloud Storing & Synchronizing Data In The Cloud Val D. Steed, CPA, MA, CITP CEO K2 Enterprises Copyright 2012, K2E, LLC. Reproduction or reuse for purposes other than a K2 Enterprises training event is prohibited.

More information

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized

More information

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Comparing Box and Egnyte. White Paper

Comparing Box and Egnyte. White Paper White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:

More information

A Survey on Hybrid Cloud with De-Duplication

A Survey on Hybrid Cloud with De-Duplication A Survey on Hybrid Cloud with De-Duplication Pooja S Dodamani, Pradeep Nazareth M. Tech Student, Dept. of Computer science and Engineering, NMAMIT, Karnataka, India Assistant Professor, Dept. of Computer

More information

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues: Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:

More information

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,

More information

Application Design and Development

Application Design and Development C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET

More information

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała

Data Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication

More information

Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services

Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

IaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS

IaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and

More information

WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression

WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE

Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that

More information

Markus'Suonto' Deduplication-system-for-user-encrypted-data-

Markus'Suonto' Deduplication-system-for-user-encrypted-data- Aalto'university SchoolofScience Markus'Suonto' Deduplication-system-for-user-encrypted-data- Master5sthesis 17.03.2015 Instructors:Prof.RefikMolva,M.Sc.PasqualePuzio Supervisor:Prof.JukkaNurminen i 1.

More information

3Gen Data Deduplication Technical

3Gen Data Deduplication Technical 3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and

More information

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents PREVENTIA Forward Thinking Security Solutions Skyhigh Best Practices and Use cases. Table of Contents Discover Your Cloud 1. Identify all cloud services in use & evaluate risk 2. Encourage use of low-risk

More information

Some good online archiving systems for data backup

Some good online archiving systems for data backup Some good online archiving systems for data backup Term Paper Under the course of e-business covered in Master of Science in Business Consulting at the Faculty of Business Application of Computer Science

More information

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them. Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1 Certificate Use Overview

More information

Two-Level Metadata Management for Data Deduplication System

Two-Level Metadata Management for Data Deduplication System Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,

More information

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers

More information

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication

Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

How To Get To A Cloud Storage And Byod System

How To Get To A Cloud Storage And Byod System Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although

More information

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973)

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) Cloud Computing: Security Issues In Infrastructure-As-A-Service Model

More information

Checklist and Tips to Choosing the Right Backup Strategy

Checklist and Tips to Choosing the Right Backup Strategy E-Guide Checklist and Tips to Choosing the Right Backup Strategy Data deduplication is no longer just a cool technology, it's become a fairly common component of modern data backup strategies. Learn how

More information

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance

More information

Cloud Computing and Amazon Web Services

Cloud Computing and Amazon Web Services Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD

More information

Regulatory Compliance

Regulatory Compliance Regulatory Compliance Security: From a security standpoint, disk, tape and DVD, none of them meet the regulatory requirements of Sarbanes Oxley or HIPAA simply because they are generally not encrypted.

More information

SDFS Overview. By Sam Silverberg

SDFS Overview. By Sam Silverberg SDFS Overview By Sam Silverberg Why did I do this? I had an Idea that I needed to see if it worked. Design Goals Create a dedup file system capable of effective inline deduplication for Virtual Machines

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection

More information

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation

Top Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely

More information

Logz.io See the logz that matter

Logz.io See the logz that matter See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files

More information

BALANCING FOR DISTRIBUTED BACKUP

BALANCING FOR DISTRIBUTED BACKUP CONTENT-AWARE LOAD BALANCING FOR DISTRIBUTED BACKUP Fred Douglis 1, Deepti Bhardwaj 1, Hangwei Qian 2, and Philip Shilane 1 1 EMC 2 Case Western Reserve University 1 Starting Point Deduplicating disk-based

More information

Risks and Benefits of the Cloud

Risks and Benefits of the Cloud Risks and Benefits of the Cloud In recent history there have been constant revolutions in the way personal data is stored and transferred. Today, one does not even need a physical data storage device such

More information