Side channels in cloud services, the case of deduplication in cloud storage
|
|
- Bertha Miles
- 8 years ago
- Views:
Transcription
1 Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 1 / 18
2 Outline 1 Introduction 2 Deduplication 3 Security Loophole 4 Solutions 5 Conclusions Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 2 / 18
3 Introduction Cloud storage Fast growth of data volumes: Demand for online storage services Cloud storage services: Low cost, scalable, pay-per-use Service delivered via internet Deduplication: Storing only a single copy of data Provides user a link to the existing copy Reduces storage space of service provider Decreases consumption of bandwidth from client to server Disk and bandwidth savings 90% Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 3 / 18
4 Main Contribution Introduction Pointing out security loopholes due to cross user deduplication Proposing solution that reduces the risk of data leakage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 4 / 18
5 Deduplication Deduplication Strategies File-level: Stores a single copy of each file Block-level: Segments file to blocks. Stores single copy of each block Approaches Target-Based Approach: Dedup is handled by the storage service User is unaware of dedup Does not save bandwidth Source-Based Approach: User sends hash signature to the server If a copy already exists the file is not sent Saves bandwidth and storage Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 5 / 18
6 Security Loophole The Loophole Settings Source-based approach The client knows whether dedup has occured Cross user dedup Other users can find out whether the file was uploaded Dropbox, Mozy and Memopal apply this setting The server answers the following question by yes/no Did any user previously uploaded a copy of this file? Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 6 / 18
7 Security Loophole Attack 1: Identifying File Assumptions The file is known to the attacker Unlikely to be at the possession of any other user The attacker uploads the file and checks whether dedup was performed Dedup can answer whether the user possess the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 7 / 18
8 Security Loophole Attack 2: Finding the Content of a File Assume the number of possibilities is limited The attacker uploads each possible version of the file The deduplicated version is identical to the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 8 / 18
9 Security Loophole Attack 3: Covert Channel Assume malicious software installed on the users machine The software establishes a covert channel based on cross users dedup Bypasses the firewall and communicates with its control server Binary example The software saves two files on the users machine The files are uploaded to the users backup service The control server uploads these files to the same backup service The deduplicated file represents the binary value Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 9 / 18
10 Solutions Solution 1: Encryption Encrypting the file using personal key before uploading to the service Different keys for identical files yield different encrypted files Does not allow deduplication This solution is vulnerable to offline dictionary attacks Deduplication reveals the key May indicate that a certain user posses the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 10 / 18
11 Solutions Solution 2: Target-Based Approach Deduplication is performed on the server side Eliminates bandwidth saving The cost of transferring 1 GB is proportional to the cost of storing it for 2 month (Amazon S3 service, June 2010) Solution of Mozyhome Relatively small files are uploaded Source based deduplication is performed on larger files Effective when Sensitive data is stored in small files Most bandwidth is consumed by large files Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 11 / 18
12 Solutions Solution 3: Randomization Weakening the correlation between existence of files in the storage system and deduplication Each file is assigned with a random threshold Source based deduplication is performed when the number of copies of different users exceeds this threshold Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 12 / 18
13 Solutions Solution 3: Description For every file X select a threshold t X [2,..., d] d may be public t X is chosen uniformly at random It is known only to the server c X is the number of users that uploaded copies of the file Source based dedup occurs when either c X t X X is uploaded by a client that already uploaded it Otherwise the file is sent and target based dedup occurs Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 13 / 18
14 Solutions Solution 3: Deletions Possible attack Attacker identifies source based dedup after t uploads It then deletes two files and again uploads these copies If source based dedup occurs after only one upload it indicates that some other user uploaded the file Not very practical attack since deleted files are retained by the service for some period of time Solution When c X t X source based dedup is always performed the server must keep a copy of the file even when all files are deleted Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 14 / 18
15 Solutions Solution 3: Security Analysis Examine the case where either A single copy of the file was uploaded No copy was uploaded Seems to be the most relevant for breaching single user privacy The events are as follows Attacker uploads single copy and dedup occurs: Happens only when t X = 2 and a single copy was uploaded Attacker detects that the file was uploaded Attacker uploads d copies before dedup occurs: Happens only when t X = d and no copy was uploaded Attacker detects that the file was not uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 15 / 18
16 Solutions Solution 3: Security Analysis Attacker uploads 2 < t < d copies before dedup occurs: Either t X = t and no copy was uploaded or t X = t+1 and a copy was uploaded The probability that X was uploaded equals its a-priori probability For a fraction of 1 1 d 1 of the files the solution leaks no information that distinguish between the case where a single copy was uploaded and the case where no copy was uploaded Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 16 / 18
17 Solutions Solution 3: Implications Implications on the service provider No increase in storage For a file X bandwidth increases by t X 1 A new tradeoff is introduced: As d increases The fraction of unprotected files decreases The bandwidth consumption increases The analysis for the covert channel attack is similar to the previous one since the threshold refers to the number of users that uploaded the file Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 17 / 18
18 Conclusions Conclusions This work reveals security loopholes created in cloud storage services, due to deduplication Several solutions were proposed in order to deal with the security risk A randomized solution that decreases the risk for data leakage at moderate cost was proposed Since cloud storage services are becoming increasingly popular, this work may have significant impact on the privacy provided for many users Yair Yona (TAU) Side channels in cloud services Advanced Topics in Storage Systems 18 / 18
19 Conclusions Thank you for your attention!
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
More informationSide channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg
More informationISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
More informationCloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
More informationProof of Ownership in Remote Storage Systems
Proof of Ownership in Remote Storage Systems S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg Summarized by Eli Haim Advanced Topics in Storage Systems School of Engineering - EE Tel Aviv University
More informationSecure Storage in the Cloud
Secure Storage in the Cloud 14. ISSS Berner Tagung für Informationssicherheit "Cloud Computing: Chancen und Risiken" 24. November 2011, Bern Prof. Dr. Michael Waidner Fraunhofer SIT, Direktor Technische
More informationData Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs
Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of
More informationDeduplication as security issue in cloud services, and its representation in Terms of Service Agreements
Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,
More informationSecure Hybrid Cloud Architecture for cloud computing
Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of
More informationDifferentially private client-side data deduplication protocol for cloud storage services
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..1159 RESEARCH ARTICLE Differentially private client-side data deduplication
More informationSecure Deduplication of Encrypted Data without Additional Servers
Secure Deduplication of Encrypted Data without Additional Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas Bar Ilan
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.70-79, June 2015 70 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.95-102, June 2015 95 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationTITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
More informationProofs of Ownership in Remote Storage Systems
Proofs of Ownership in Remote Storage Systems Shai Halevi 1, Danny Harnik 2, Benny Pinkas 3, and Alexandra Shulman-Peleg 2 1 IBM T. J. Watson Research Center, 2 IBM Haifa Research Lab, 3 Bar Ilan University
More informationA Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationSecure Deduplication of Encrypted Data without Additional Independent Servers
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas
More informationM Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P
O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.
More informationBackups and Cloud Storage
Backups and Cloud Storage Front Range PC Users Group November 1, 2011 Definitions 1 A search using Google with the search criteria: online backup returned >192 million results A search using Google with
More informationWhat Dropbox Can t Do For Your Business
What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded
More informationDeduplication Demystified: How to determine the right approach for your business
Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning
More information!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved.
Memeo C1 Security Bret Savage, CTO October 2013 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Guiding Principles Memeo C1 was scratch-built from the ground up to be the ultimate
More informationDXi Accent Technical Background
TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on
More informationM Y S E C U R E B A C K U P. p r o d u c t o v e r v i e w O N L I N E B U S I N E S S B A C K U P
O N L I N E B U S I N E S S B A C K U P Protect your company s files against loss, theft, viruses, and natural disasters. Share business data securely and privately in the office or across the globe. Sync
More informationMETHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review
METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,
More informationData In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
More informationWhat Dropbox Can t Do For Your Business
What Dropbox Can t Do For Your Business 32 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded
More informationWHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper
How Deduplication Benefits Companies of All Sizes An Acronis White Paper Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 What is deduplication?... 4 File-level deduplication
More informationFOR THE FUTURE OF DATA CENTERS?
WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a
More informationDETECTION OF PEER TO PEER APPLICATIONS
DETECTION OF PEER TO PEER APPLICATIONS AN OPSWAT WHITE PAPER Author: Priti Dadlani Contributors: Benny Czarny, Steven Ginn, Toshit Antani April 2008 OPSWAT, INC. www.opswat.com CONTENTS Introduction...
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationComplete Data Protection & Disaster Recovery Solutions
Complete Data Protection & Disaster Recovery Solutions Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More informationDeduplication has been around for several
Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding
More informationIntroduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov
Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox
More information(More) Side Channels in Cloud Storage
(More) Side Channels in Cloud Storage Linking Data to Users Tobias Pulls Department of Computer Science Karlstad University Karlstad, Sweden tobias.pulls@kau.se Abstract. Public cloud storage services
More informationTIPS IN PREVENTING INFORMATION LEAKAGE
TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How
More informationAnalyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
More informationCumulus: filesystem backup to the Cloud
Michael Vrable, Stefan Savage, a n d G e o f f r e y M. V o e l k e r Cumulus: filesystem backup to the Cloud Michael Vrable is pursuing a Ph.D. in computer science at the University of California, San
More informationAn Encrypted File System
EncryptFS: An Encrypted File System By: Jorge Ornelas (joor2992) Ulziibayar Otgonbaatar (ulziibay) Otitochi Mbagwu (otitochi) 1 Abstract EncryptFS is an encrypted file system that stores files on an untrusted
More informationDemystifying Deduplication for Backup with the Dell DR4000
Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationSPECIAL REPORT. Data Deduplication. Deep Dive. Put your backups on a diet. Copyright InfoWorld Media Group. All rights reserved.
SPECIAL REPORT Data Deduplication Deep Dive Put your backups on a diet Copyright InfoWorld Media Group. All rights reserved. Sponsored by 2 Data deduplication explained How to reduce backup overhead and
More informationPrivacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh
Privacy and Verifiability for Data Storage in Cloud Computing Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh Cloud Computing Outsourcing storage & computation High availability No IT maintenance
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationSecurity of Cloud Computing
1 University of Bath & BCS Council 26 March 2012 1 Thanks to Ali Kaafarani for the briefing How secure is cloud computing? How secure is c l o u d computing? the two questions are essentially equivalent,
More informationSecurity Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas
Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Topics Introduction Data Sharing Dropbox and Sharing Dropbox Security
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationLDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
More informationDiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
More informationE-Guide. Sponsored By:
E-Guide An in-depth look at data deduplication methods This E-Guide will discuss the various approaches to data deduplication. You ll learn the pros and cons of each, and will benefit from independent
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationTresorit s DRM. A New Level of Security for Document Collaboration and Sharing
Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.
More informationOpen Source Data Deduplication
Open Source Data Deduplication Nick Webb Red Wire Services, LLC nickw@redwireservices.com www.redwireservices.com @disasteraverted Introduction What is Deduplication? Different kinds? Why do you want it?
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationStoring & Synchronizing Data In The Cloud
Storing & Synchronizing Data In The Cloud Val D. Steed, CPA, MA, CITP CEO K2 Enterprises Copyright 2012, K2E, LLC. Reproduction or reuse for purposes other than a K2 Enterprises training event is prohibited.
More informationTorrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized
More informationLecture 11. RFS A Network File System for Mobile Devices and the Cloud
Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,
More informationA Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud
A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523
More informationComparing Box and Egnyte. White Paper
White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:
More informationA Survey on Hybrid Cloud with De-Duplication
A Survey on Hybrid Cloud with De-Duplication Pooja S Dodamani, Pradeep Nazareth M. Tech Student, Dept. of Computer science and Engineering, NMAMIT, Karnataka, India Assistant Professor, Dept. of Computer
More informationConfinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
More informationCLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,
More informationApplication Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationBacking Up Your Files. External Hard Drives
Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine
More informationHEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS T. Ristenpart, H. Shacham, S. Savage UC San Diego E. Tromer MIT CPCS 722: Advanced Systems Seminar Ewa Syta GET
More informationFAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
More informationData Deduplication in Tivoli Storage Manager. Andrzej Bugowski 19-05-2011 Spała
Data Deduplication in Tivoli Storage Manager Andrzej Bugowski 19-05-2011 Spała Agenda Tivoli Storage, IBM Software Group Deduplication concepts Data deduplication in TSM 6.1 Planning for data deduplication
More informationMove from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services
Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationIaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS
Move from traditional IT Solutions to Cloud Computing In today s global business arena, innovation is important for business growth. To innovate, your business depends on IT efficiency, reliability and
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationTalk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
More informationMarkus'Suonto' Deduplication-system-for-user-encrypted-data-
Aalto'university SchoolofScience Markus'Suonto' Deduplication-system-for-user-encrypted-data- Master5sthesis 17.03.2015 Instructors:Prof.RefikMolva,M.Sc.PasqualePuzio Supervisor:Prof.JukkaNurminen i 1.
More information3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
More informationPREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents
PREVENTIA Forward Thinking Security Solutions Skyhigh Best Practices and Use cases. Table of Contents Discover Your Cloud 1. Identify all cloud services in use & evaluate risk 2. Encourage use of low-risk
More informationSome good online archiving systems for data backup
Some good online archiving systems for data backup Term Paper Under the course of e-business covered in Master of Science in Business Consulting at the Faculty of Business Application of Computer Science
More informationCertificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1 Certificate Use Overview
More informationTwo-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
More informationDynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers
More informationData De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationHow To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
More informationSHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973)
SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN 2278 5973) Cloud Computing: Security Issues In Infrastructure-As-A-Service Model
More informationChecklist and Tips to Choosing the Right Backup Strategy
E-Guide Checklist and Tips to Choosing the Right Backup Strategy Data deduplication is no longer just a cool technology, it's become a fairly common component of modern data backup strategies. Learn how
More informationOnly 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services
Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance
More informationCloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
More informationRegulatory Compliance
Regulatory Compliance Security: From a security standpoint, disk, tape and DVD, none of them meet the regulatory requirements of Sarbanes Oxley or HIPAA simply because they are generally not encrypted.
More informationSDFS Overview. By Sam Silverberg
SDFS Overview By Sam Silverberg Why did I do this? I had an Idea that I needed to see if it worked. Design Goals Create a dedup file system capable of effective inline deduplication for Virtual Machines
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationTop Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
More informationLogz.io See the logz that matter
See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files
More informationBALANCING FOR DISTRIBUTED BACKUP
CONTENT-AWARE LOAD BALANCING FOR DISTRIBUTED BACKUP Fred Douglis 1, Deepti Bhardwaj 1, Hangwei Qian 2, and Philip Shilane 1 1 EMC 2 Case Western Reserve University 1 Starting Point Deduplicating disk-based
More informationRisks and Benefits of the Cloud
Risks and Benefits of the Cloud In recent history there have been constant revolutions in the way personal data is stored and transferred. Today, one does not even need a physical data storage device such
More information