Proof of Ownership in Remote Storage Systems
|
|
- Leslie Whitehead
- 7 years ago
- Views:
Transcription
1 Proof of Ownership in Remote Storage Systems S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg Summarized by Eli Haim Advanced Topics in Storage Systems School of Engineering - EE Tel Aviv University May 26, 2013 Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
2 Outline 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
3 Outline Introduction 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
4 Introduction Deduplication Client-Side Cross-User Deduplication Prior to uploading the file: The client computes a hash over the file (key), and sends it to the server. The server checks if the file already exists in its storage (via the key). If not, it uploads the file from the client. If yes, it does not need to upload it. Benefits: Saves storage space (at the server). Saves bandwidth (at both sides). Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
5 Introduction Deduplication Principles which lead to risks, as raised in this paper Knowing only the hash gives access to the entire file. Leads to attacks based on the principles: Getting a small amount of data, leads to access of a huge amount of data. Distribution of huge amounts of data. Leakage amplification. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
6 Introduction Attacks Potential Attacks Using the storage service as a Content Distribution Network (CDN): For example, a backup service is designed to support many uploads but very few downloads. Server break-in (cache). Malicious client software (low bandwidth). Leakage - risk increases as the number of users sharing the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
7 Outline PoW 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
8 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
9 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
10 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
11 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
12 PoW Requirements and Model Requirements from the Protocol Public hash function (enables cross-user deduplication). Bandwidth efficient. The server access only a short information per file (as the file may be stored in a secondary storage). Client side constraints: Single-pass over the file. Reasonable amount of memory. Security: no very-short state from which the proof can be computed. The protocol is efficient. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
13 Attacker Model PoW Requirements and Model The attacker have accomplices, who have the file. Constraints: The total number of bits that the accomplices send the attacker is the min-entropy of the file. The accomplices can help only at an off-line stage, i.e., before the protocol begins. The min-entropy of a distributiond = {p 1,...,p n} is defined by H = log max i p i. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
14 PoW Requirements and Model Strong PoW The file is randomly drawn from a distribution D. t = bits of min-entropy of D. s = minimal number of bits which the attacker didn t get from the accomplices. T = event that the attacker convinces the server. ǫ = soundness. Definition (Strong PoW) where f(s) is negligible in s. Pr(T) ǫ+f(s), Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
15 PoW Requirements and Model Strong PoW The file is randomly drawn from a distribution D. t = bits of min-entropy of D. s = minimal number of bits which the attacker didn t get from the accomplices. T = event that the attacker convinces the server. ǫ = soundness. Definition (Strong PoW) where f(s) is negligible in s. Pr(T) ǫ+f(s), Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
16 Outline Solution: A General Protocol 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
17 Solution: A General Protocol Preprocessing: Construction of the Merkle-Tree Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
18 Solution: A General Protocol Validation Sibling-path of a leaf: the leaf together with the siblings of all the nodes in the path from the leaf to the root. The root of the tree can be computed from the sibling path. A sibling-path is valid if the root, as computed from it, is indeed equal to the root of the tree. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
19 Solution: A General Protocol Protocol The server selects in random a small number of leaf-indexes (poly-logarithmic in the filesize). The server sends these indexes to the client. The client returns the sibling-path of every leaf-index. The server check that every sibling-path is valid. If all are valid, then the client proves the server that it owns the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
20 Merkle-Tree Lemma Solution: A General Protocol Every prover that convinces the server with high enough probability, can be converted into an extractor which extracts most of the leaves of the tree. α = the redundancy of the erasure code, i.e. knowing (1 α) of the file suffices. s = number of leaves in the tree. u = number of requested leaves in the protocol. T = event that the prover convinces the server. K = number of leaves that the extractor can extracts. Lemma (Merkle-tree Lemma) For every prover and every δ [0, 1], there exists an extractor which makes at most u2 s(1+logs) δ calls to the prover. if Pr(T) (1 α) u +δ, then Pr(K (1 α)s) 1 4. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
21 Solution: A General Protocol Theorem Theorem The Merkle-tree based protocol is a strong PoW with soundness (1 α) u. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
22 Outline Security-Efficiency Tradeoff 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
23 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
24 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
25 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
26 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
27 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
28 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
29 Outline Performance Evaluation 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
30 Performance Evaluation Implementation Parameters Block size: B = 512bit Buffer size: L = min(64mbyte, filesize) Number of iterations for reduction & mixing): 5. Number of challenge leaves: u = 20. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
31 Performance Evaluation Performance Evaluation Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
32 Proof of Ownership Thank you for your attention Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
More informationProofs of Ownership in Remote Storage Systems
Proofs of Ownership in Remote Storage Systems Shai Halevi 1, Danny Harnik 2, Benny Pinkas 3, and Alexandra Shulman-Peleg 2 1 IBM T. J. Watson Research Center, 2 IBM Haifa Research Lab, 3 Bar Ilan University
More informationSide channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced
More informationLeakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Jia Xu and Jianying Zhou Infocomm Security Department, Institute for Infocomm Research, Singapore {xuj, jyzhou}@i2r.a-star.edu.sg Abstract.
More informationSecure Hybrid Cloud Architecture for cloud computing
Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of
More informationISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
More informationSecure Auditing and Deduplicating Data in Cloud
IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015 Secure Auditing and Deduplicating Data in Cloud 1 Jingwei Li, Jin Li, Dongqing Xie and Zhang Cai Abstract As the cloud computing technology develops
More informationDeduplication as security issue in cloud services, and its representation in Terms of Service Agreements
Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,
More informationAhsay Online Backup Suite v5.1. Whitepaper In-File Delta
Suite v5.1 Version 5.1 June 2006 Table of Content 1 Introduction...3 1.1 Differential Delta Mode...3 1.2 Incremental Delta Mode...3 2 Delta Generation...4 3 Block Size Setting...4 4 During Backup...5 5
More informationSecure Deduplication of Encrypted Data without Additional Independent Servers
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas
More informationPhysical Data Organization
Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor
More informationModeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
More informationMTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
More informationSecure Deduplication of Encrypted Data without Additional Servers
Secure Deduplication of Encrypted Data without Additional Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas Bar Ilan
More informationDifferentially private client-side data deduplication protocol for cloud storage services
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..1159 RESEARCH ARTICLE Differentially private client-side data deduplication
More informationProvable ownership of files in deduplication cloud storage
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com)..784 SPECIAL ISSUE PAPER Provable ownership of files in deduplication
More informationMerkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number
More informationSide channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg
More informationHow Efficient can Memory Checking be?
How Efficient can Memory Checking be? Cynthia Dwork 1, Moni Naor 2,, Guy N. Rothblum 3,, and Vinod Vaikuntanathan 4, 1 Microsoft Research 2 The Weizmann Institute of Science 3 MIT 4 IBM Research Abstract.
More informationVictor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart
More information3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org
More informationFull and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
More informationTITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
More informationDiscuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
More informationData Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
More informationChapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
More informationChapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
More informationThe Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
More informationMETHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review
METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationA Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud
A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523
More information1 Introduction to Internet Content Distribution
OS 521: Advanced Algorithm Design Hashing / ontent Distribution 02/09/12 Scribe: Shilpa Nadimpalli Professor: Sanjeev Arora 1 Introduction to Internet ontent Distribution 1.1 The Hot-Spot Problem 1 ertain
More informationDatabases and Information Systems 1 Part 3: Storage Structures and Indices
bases and Information Systems 1 Part 3: Storage Structures and Indices Prof. Dr. Stefan Böttcher Fakultät EIM, Institut für Informatik Universität Paderborn WS 2009 / 2010 Contents: - database buffer -
More informationEchidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationPerfectly Secure Password Protocols in the Bounded Retrieval Model
Perfectly Secure Password Protocols in the Bounded Retrieval Model Giovanni Di Crescenzo 1, Richard Lipton 2, and Shabsi Walfish 3 1 Telcordia Technologies, Piscataway, NJ, USA giovanni@research.telcordia.com
More informationData Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs
Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of
More informationAuthorized data deduplication check in hybrid cloud With Cluster as a Service
Authorized data deduplication check in hybrid cloud With Cluster as a Service X.ALPHONSEINBARAJ PG Scholar, Department of Computer Science and Engineering, Anna University, Coimbatore. Abstract Data deduplication
More informationPGV: A Storage Enforcing Remote Verification Scheme
PGV: A Storage Enforcing Remote Verification Scheme Mohammad Iftekhar Husain, Steve Uurtamo, Steven Y. Ko, Atri Rudra, Ramalingam Sridhar Dept. of Computer Science and Engineering University at Buffalo,
More informationNimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationEnergy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
More informationCyber-Security Analysis of State Estimators in Power Systems
Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute
More informationOptimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
More informationThe IDG 9074 Remote Access Controller
secure Agent Secure Enterprise Solutions Product Overview The IDG 9074 Remote Access Controller 2448 E. 81 st St, Ste 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationFile Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
More informationEnterprise Historian 3BUF 001 152 D1 Version 3.2/1 Hot Fix 1 for Patch 4 Release Notes
Industrial IT Inform IT Enterprise Historian Enterprise Historian 3BUF 001 152 D1 Version 3.2/1 Hot Fix 1 for Patch 4 Release Notes Introduction This document provides release information for hot fix 1
More informationOutline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb
Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationVerifying Data Integrity in Peer-to-Peer Video Streaming
Verifying Data Integrity in Peer-to-Peer Video Streaming Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue University, West Lafayette, IN 47907
More informationVerifiable Delegation of Computation over Large Datasets
Verifiable Delegation of Computation over Large Datasets Siavosh Benabbas University of Toronto Rosario Gennaro IBM Research Yevgeniy Vahlis AT&T Cloud Computing Data D Code F Y F(D) Cloud could be malicious
More informationCloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
More informationHyper Historian Redundancy Setup Options
Description: Guide to configuring Hyper Historian redundancy settings OS Requirement: Windows Server 2003 x64/vista x64/ Server 2008 x64/windows 7 x64/ Server 2008 R2 x64 General Requirement: Hyper Historian
More informationCurrency and Correctness of Content in Object Storage Networks
Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering
More informationOnline Scheduling with Bounded Migration
Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider
More informationPrivate Inference Control
Private Inference Control David Woodruff MIT dpwood@mit.edu Jessica Staddon Palo Alto Research Center staddon@parc.com Abstract Access control can be used to ensure that database queries pertaining to
More informationHardware Configuration Guide
Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...
More informationHow Efficient can Memory Checking be?
How Efficient can Memory Checking be? Cynthia Dwork Moni Naor Guy N. Rothblum Vinod Vaikuntanathan Abstract We consider the problem of memory checking, where a user wants to maintain a large database on
More informationApplication Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
More informationidedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti
idedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti Advanced Technology Group NetApp 1 idedup overview/context Storage Clients
More informationSecure Cloud Storage and Computing Using Reconfigurable Hardware
Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications
More informationTheoretical Aspects of Storage Systems Autumn 2009
Theoretical Aspects of Storage Systems Autumn 2009 Chapter 3: Data Deduplication André Brinkmann News Outline Data Deduplication Compare-by-hash strategies Delta-encoding based strategies Measurements
More informationStorage Systems Autumn 2009
Storage Systems Autumn 2009 Chapter 5: Securely Auditing André Brinkmann Sources Different Publications Slides from Randal Burns, Johns Hopkins University, USA Awkward for large data What s wrong with
More informationDigital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationTwo Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface
File Management Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified Filesystem design Implementing
More information16 April 2015. Cloud Security. Dr. Andreas Wespi. 2015 IBM Corporation
16 April 2015 Cloud Security Dr. Andreas Wespi The Roots of Cloud Computing Malcolm McLean, one of the founders of Cloud Computing, back in 1956 Born on Nov. 14, 1913, in Maxton, North Carolina Malcolm
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.70-79, June 2015 70 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.95-102, June 2015 95 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationB-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
More informationHow To Find Local Affinity Patterns In Big Data
Detection of local affinity patterns in big data Andrea Marinoni, Paolo Gamba Department of Electronics, University of Pavia, Italy Abstract Mining information in Big Data requires to design a new class
More informationv w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors.
3. Cross product Definition 3.1. Let v and w be two vectors in R 3. The cross product of v and w, denoted v w, is the vector defined as follows: the length of v w is the area of the parallelogram with
More informationLattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)
More informationScalable Prefix Matching for Internet Packet Forwarding
Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationExpert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V
\\\\ Best Practices for Managing Storage with Hyper-V Learn how storage functionality changes with the newest Hyper-V release and how it differs from VMware. Get details on specific Hyper-V features including
More informationWeb Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
More informationSecure Neighbor Discovery in Wireless Sensor Networks
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationBig Data Technology Map-Reduce Motivation: Indexing in Search Engines
Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process
More informationDiscovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar (abhishek.kumar@paladion.net) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
More informationHow To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationIris: A Scalable Cloud File System with Efficient Integrity Checks
Iris: A Scalable Cloud File System with Efficient Integrity Checks Emil Stefanov UC Berkeley emil@cs.berkeley.edu Marten van Dijk RSA Laboratories mvandijk@rsa.com Ari Juels RSA Laboratories ajuels@rsa.com
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationOperating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University
Operating Systems CSE 410, Spring 2004 File Management Stephen Wagner Michigan State University File Management File management system has traditionally been considered part of the operating system. Applications
More informationMonitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
More informationData Replication in Privileged Credential Vaults
Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches
More informationMAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services
MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng School of Computer, Huazhong University of Science and Technology,
More informationNovell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011
Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,
More informationDatabase Design Patterns. Winter 2006-2007 Lecture 24
Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationA Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
More informationKey Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
More information13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
More information