Proof of Ownership in Remote Storage Systems

Size: px
Start display at page:

Download "Proof of Ownership in Remote Storage Systems"

Transcription

1 Proof of Ownership in Remote Storage Systems S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg Summarized by Eli Haim Advanced Topics in Storage Systems School of Engineering - EE Tel Aviv University May 26, 2013 Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

2 Outline 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

3 Outline Introduction 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

4 Introduction Deduplication Client-Side Cross-User Deduplication Prior to uploading the file: The client computes a hash over the file (key), and sends it to the server. The server checks if the file already exists in its storage (via the key). If not, it uploads the file from the client. If yes, it does not need to upload it. Benefits: Saves storage space (at the server). Saves bandwidth (at both sides). Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

5 Introduction Deduplication Principles which lead to risks, as raised in this paper Knowing only the hash gives access to the entire file. Leads to attacks based on the principles: Getting a small amount of data, leads to access of a huge amount of data. Distribution of huge amounts of data. Leakage amplification. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

6 Introduction Attacks Potential Attacks Using the storage service as a Content Distribution Network (CDN): For example, a backup service is designed to support many uploads but very few downloads. Server break-in (cache). Malicious client software (low bandwidth). Leakage - risk increases as the number of users sharing the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

7 Outline PoW 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

8 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

9 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

10 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

11 PoW Proof of Ownership (PoW) A new concept: Proof of Ownership A proof mechanism that prevents such vulnerability. A protocol by which the client can prove to the server that it has a copy of the file, without actually sending the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

12 PoW Requirements and Model Requirements from the Protocol Public hash function (enables cross-user deduplication). Bandwidth efficient. The server access only a short information per file (as the file may be stored in a secondary storage). Client side constraints: Single-pass over the file. Reasonable amount of memory. Security: no very-short state from which the proof can be computed. The protocol is efficient. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

13 Attacker Model PoW Requirements and Model The attacker have accomplices, who have the file. Constraints: The total number of bits that the accomplices send the attacker is the min-entropy of the file. The accomplices can help only at an off-line stage, i.e., before the protocol begins. The min-entropy of a distributiond = {p 1,...,p n} is defined by H = log max i p i. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

14 PoW Requirements and Model Strong PoW The file is randomly drawn from a distribution D. t = bits of min-entropy of D. s = minimal number of bits which the attacker didn t get from the accomplices. T = event that the attacker convinces the server. ǫ = soundness. Definition (Strong PoW) where f(s) is negligible in s. Pr(T) ǫ+f(s), Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

15 PoW Requirements and Model Strong PoW The file is randomly drawn from a distribution D. t = bits of min-entropy of D. s = minimal number of bits which the attacker didn t get from the accomplices. T = event that the attacker convinces the server. ǫ = soundness. Definition (Strong PoW) where f(s) is negligible in s. Pr(T) ǫ+f(s), Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

16 Outline Solution: A General Protocol 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

17 Solution: A General Protocol Preprocessing: Construction of the Merkle-Tree Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

18 Solution: A General Protocol Validation Sibling-path of a leaf: the leaf together with the siblings of all the nodes in the path from the leaf to the root. The root of the tree can be computed from the sibling path. A sibling-path is valid if the root, as computed from it, is indeed equal to the root of the tree. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

19 Solution: A General Protocol Protocol The server selects in random a small number of leaf-indexes (poly-logarithmic in the filesize). The server sends these indexes to the client. The client returns the sibling-path of every leaf-index. The server check that every sibling-path is valid. If all are valid, then the client proves the server that it owns the file. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

20 Merkle-Tree Lemma Solution: A General Protocol Every prover that convinces the server with high enough probability, can be converted into an extractor which extracts most of the leaves of the tree. α = the redundancy of the erasure code, i.e. knowing (1 α) of the file suffices. s = number of leaves in the tree. u = number of requested leaves in the protocol. T = event that the prover convinces the server. K = number of leaves that the extractor can extracts. Lemma (Merkle-tree Lemma) For every prover and every δ [0, 1], there exists an extractor which makes at most u2 s(1+logs) δ calls to the prover. if Pr(T) (1 α) u +δ, then Pr(K (1 α)s) 1 4. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

21 Solution: A General Protocol Theorem Theorem The Merkle-tree based protocol is a strong PoW with soundness (1 α) u. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

22 Outline Security-Efficiency Tradeoff 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

23 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

24 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

25 Security-Efficiency Tradeoff Protocol with Small Space Computing the erasure code is expensive for very large files: requires many random accesses to the disk. Security assumptions (adds to previous ones): T is now an absolute leakage threshold to the knowledge of the attacker. The attacker now knows at most min(t,t s) bits of the file. Solution: the file is hashed down to L bits before the Merkle-tree construction. This requires a pairwise-independent hash ensemble. Theorem The leakage threshold is ( 1 T = L 3 1 ). 2b Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

26 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

27 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

28 Security-Efficiency Tradeoff A Streaming Protocol Computing the hash is expensive for very large files: requires many random accesses to the disk. Security assumption (adds to previous ones): The file is not arbitrary. It is drawn from an class of block-fixing distributions: Every block is completely random or fully known. The random blocks are chosen from a low-rank linear space. Solution: using a sparse linear hashing C. Theorem If for every t M full-rank matrix A, with high probability (over C), the code generated by the rows of AC has a minimum-distance at least d, then the scheme is a PoW with soundness ( ) u L d + 1 with respect to generalized block-fixing distributions with min-entropy t. L Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

29 Outline Performance Evaluation 1 Introduction 2 PoW 3 Solution: A General Protocol 4 Security-Efficiency Tradeoff 5 Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

30 Performance Evaluation Implementation Parameters Block size: B = 512bit Buffer size: L = min(64mbyte, filesize) Number of iterations for reduction & mixing): 5. Number of challenge leaves: u = 20. Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

31 Performance Evaluation Performance Evaluation Performance Evaluation Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

32 Proof of Ownership Thank you for your attention Summarized by Eli Haim (TAU) Proof of Ownership May 26, / 24

Security of Cloud Storage: - Deduplication vs. Privacy

Security of Cloud Storage: - Deduplication vs. Privacy Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt

More information

Proofs of Ownership in Remote Storage Systems

Proofs of Ownership in Remote Storage Systems Proofs of Ownership in Remote Storage Systems Shai Halevi 1, Danny Harnik 2, Benny Pinkas 3, and Alexandra Shulman-Peleg 2 1 IBM T. J. Watson Research Center, 2 IBM Haifa Research Lab, 3 Bar Ilan University

More information

Side channels in cloud services, the case of deduplication in cloud storage

Side channels in cloud services, the case of deduplication in cloud storage Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced

More information

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited

Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Jia Xu and Jianying Zhou Infocomm Security Department, Institute for Infocomm Research, Singapore {xuj, jyzhou}@i2r.a-star.edu.sg Abstract.

More information

Secure Hybrid Cloud Architecture for cloud computing

Secure Hybrid Cloud Architecture for cloud computing Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges

More information

Secure Auditing and Deduplicating Data in Cloud

Secure Auditing and Deduplicating Data in Cloud IEEE TRANSACTIONS ON COMPUTERS VOL: PP NO: 99 YEAR 2015 Secure Auditing and Deduplicating Data in Cloud 1 Jingwei Li, Jin Li, Dongqing Xie and Zhang Cai Abstract As the cloud computing technology develops

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Ahsay Online Backup Suite v5.1. Whitepaper In-File Delta

Ahsay Online Backup Suite v5.1. Whitepaper In-File Delta Suite v5.1 Version 5.1 June 2006 Table of Content 1 Introduction...3 1.1 Differential Delta Mode...3 1.2 Incremental Delta Mode...3 2 Delta Generation...4 3 Block Size Setting...4 4 During Backup...5 5

More information

Secure Deduplication of Encrypted Data without Additional Independent Servers

Secure Deduplication of Encrypted Data without Additional Independent Servers Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas

More information

Physical Data Organization

Physical Data Organization Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic

More information

Secure Deduplication of Encrypted Data without Additional Servers

Secure Deduplication of Encrypted Data without Additional Servers Secure Deduplication of Encrypted Data without Additional Servers Jian Liu Aalto University jian.liu@aalto.fi N. Asokan Aalto University and University of Helsinki asokan@acm.org Benny Pinkas Bar Ilan

More information

Differentially private client-side data deduplication protocol for cloud storage services

Differentially private client-side data deduplication protocol for cloud storage services SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..1159 RESEARCH ARTICLE Differentially private client-side data deduplication

More information

Provable ownership of files in deduplication cloud storage

Provable ownership of files in deduplication cloud storage SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com)..784 SPECIAL ISSUE PAPER Provable ownership of files in deduplication

More information

Merkle Hash Trees for Distributed Audit Logs

Merkle Hash Trees for Distributed Audit Logs Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number

More information

Side channels in cloud services, the case of deduplication in cloud storage

Side channels in cloud services, the case of deduplication in cloud storage Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg

More information

How Efficient can Memory Checking be?

How Efficient can Memory Checking be? How Efficient can Memory Checking be? Cynthia Dwork 1, Moni Naor 2,, Guy N. Rothblum 3,, and Vinod Vaikuntanathan 4, 1 Microsoft Research 2 The Weizmann Institute of Science 3 MIT 4 IBM Research Abstract.

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,

More information

Discuss the size of the instance for the minimum spanning tree problem.

Discuss the size of the instance for the minimum spanning tree problem. 3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can

More information

Data Structures Fibonacci Heaps, Amortized Analysis

Data Structures Fibonacci Heaps, Amortized Analysis Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

More information

Chapter 12 File Management. Roadmap

Chapter 12 File Management. Roadmap Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access

More information

Chapter 12 File Management

Chapter 12 File Management Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access

More information

The Advantages and Disadvantages of Network Computing Nodes

The Advantages and Disadvantages of Network Computing Nodes Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node

More information

METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review

METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Chapter 13 File and Database Systems

Chapter 13 File and Database Systems Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

1 Introduction to Internet Content Distribution

1 Introduction to Internet Content Distribution OS 521: Advanced Algorithm Design Hashing / ontent Distribution 02/09/12 Scribe: Shilpa Nadimpalli Professor: Sanjeev Arora 1 Introduction to Internet ontent Distribution 1.1 The Hot-Spot Problem 1 ertain

More information

Databases and Information Systems 1 Part 3: Storage Structures and Indices

Databases and Information Systems 1 Part 3: Storage Structures and Indices bases and Information Systems 1 Part 3: Storage Structures and Indices Prof. Dr. Stefan Böttcher Fakultät EIM, Institut für Informatik Universität Paderborn WS 2009 / 2010 Contents: - database buffer -

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Perfectly Secure Password Protocols in the Bounded Retrieval Model

Perfectly Secure Password Protocols in the Bounded Retrieval Model Perfectly Secure Password Protocols in the Bounded Retrieval Model Giovanni Di Crescenzo 1, Richard Lipton 2, and Shabsi Walfish 3 1 Telcordia Technologies, Piscataway, NJ, USA giovanni@research.telcordia.com

More information

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs

Data Reduction: Deduplication and Compression. Danny Harnik IBM Haifa Research Labs Data Reduction: Deduplication and Compression Danny Harnik IBM Haifa Research Labs Motivation Reducing the amount of data is a desirable goal Data reduction: an attempt to compress the huge amounts of

More information

Authorized data deduplication check in hybrid cloud With Cluster as a Service

Authorized data deduplication check in hybrid cloud With Cluster as a Service Authorized data deduplication check in hybrid cloud With Cluster as a Service X.ALPHONSEINBARAJ PG Scholar, Department of Computer Science and Engineering, Anna University, Coimbatore. Abstract Data deduplication

More information

PGV: A Storage Enforcing Remote Verification Scheme

PGV: A Storage Enforcing Remote Verification Scheme PGV: A Storage Enforcing Remote Verification Scheme Mohammad Iftekhar Husain, Steve Uurtamo, Steven Y. Ko, Atri Rudra, Ramalingam Sridhar Dept. of Computer Science and Engineering University at Buffalo,

More information

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Energy Efficiency in Secure and Dynamic Cloud Storage

Energy Efficiency in Secure and Dynamic Cloud Storage Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

The IDG 9074 Remote Access Controller

The IDG 9074 Remote Access Controller secure Agent Secure Enterprise Solutions Product Overview The IDG 9074 Remote Access Controller 2448 E. 81 st St, Ste 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com

More information

Data Deduplication Scheme for Cloud Storage

Data Deduplication Scheme for Cloud Storage 26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we

More information

File Management. Chapter 12

File Management. Chapter 12 Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution

More information

Enterprise Historian 3BUF 001 152 D1 Version 3.2/1 Hot Fix 1 for Patch 4 Release Notes

Enterprise Historian 3BUF 001 152 D1 Version 3.2/1 Hot Fix 1 for Patch 4 Release Notes Industrial IT Inform IT Enterprise Historian Enterprise Historian 3BUF 001 152 D1 Version 3.2/1 Hot Fix 1 for Patch 4 Release Notes Introduction This document provides release information for hot fix 1

More information

Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb

Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Verifying Data Integrity in Peer-to-Peer Video Streaming

Verifying Data Integrity in Peer-to-Peer Video Streaming Verifying Data Integrity in Peer-to-Peer Video Streaming Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue University, West Lafayette, IN 47907

More information

Verifiable Delegation of Computation over Large Datasets

Verifiable Delegation of Computation over Large Datasets Verifiable Delegation of Computation over Large Datasets Siavosh Benabbas University of Toronto Rosario Gennaro IBM Research Yevgeniy Vahlis AT&T Cloud Computing Data D Code F Y F(D) Cloud could be malicious

More information

Cloud Storage Security

Cloud Storage Security Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage

More information

Hyper Historian Redundancy Setup Options

Hyper Historian Redundancy Setup Options Description: Guide to configuring Hyper Historian redundancy settings OS Requirement: Windows Server 2003 x64/vista x64/ Server 2008 x64/windows 7 x64/ Server 2008 R2 x64 General Requirement: Hyper Historian

More information

Currency and Correctness of Content in Object Storage Networks

Currency and Correctness of Content in Object Storage Networks Currency and Correctness of Content in Object Storage Networks Organization: The Johns Hopkins University 3400 N. Charles St. Baltimore, MD USA 21218 Technical Contacts: Randal Burns 224 New Engineering

More information

Online Scheduling with Bounded Migration

Online Scheduling with Bounded Migration Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider

More information

Private Inference Control

Private Inference Control Private Inference Control David Woodruff MIT dpwood@mit.edu Jessica Staddon Palo Alto Research Center staddon@parc.com Abstract Access control can be used to ensure that database queries pertaining to

More information

Hardware Configuration Guide

Hardware Configuration Guide Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...

More information

How Efficient can Memory Checking be?

How Efficient can Memory Checking be? How Efficient can Memory Checking be? Cynthia Dwork Moni Naor Guy N. Rothblum Vinod Vaikuntanathan Abstract We consider the problem of memory checking, where a user wants to maintain a large database on

More information

Application Design and Development

Application Design and Development C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though

More information

idedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti

idedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti idedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti Advanced Technology Group NetApp 1 idedup overview/context Storage Clients

More information

Secure Cloud Storage and Computing Using Reconfigurable Hardware

Secure Cloud Storage and Computing Using Reconfigurable Hardware Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications

More information

Theoretical Aspects of Storage Systems Autumn 2009

Theoretical Aspects of Storage Systems Autumn 2009 Theoretical Aspects of Storage Systems Autumn 2009 Chapter 3: Data Deduplication André Brinkmann News Outline Data Deduplication Compare-by-hash strategies Delta-encoding based strategies Measurements

More information

Storage Systems Autumn 2009

Storage Systems Autumn 2009 Storage Systems Autumn 2009 Chapter 5: Securely Auditing André Brinkmann Sources Different Publications Slides from Randal Burns, Johns Hopkins University, USA Awkward for large data What s wrong with

More information

Digital Signatures. What are Signature Schemes?

Digital Signatures. What are Signature Schemes? Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Two Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface

Two Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface File Management Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified Filesystem design Implementing

More information

16 April 2015. Cloud Security. Dr. Andreas Wespi. 2015 IBM Corporation

16 April 2015. Cloud Security. Dr. Andreas Wespi. 2015 IBM Corporation 16 April 2015 Cloud Security Dr. Andreas Wespi The Roots of Cloud Computing Malcolm McLean, one of the founders of Cloud Computing, back in 1956 Born on Nov. 14, 1913, in Maxton, North Carolina Malcolm

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Policy-based De-duplication Mechanism for Securing Cloud Storage International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.70-79, June 2015 70 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi

More information

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Policy-based De-duplication Mechanism for Securing Cloud Storage International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.95-102, June 2015 95 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi

More information

B-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees

B-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:

More information

How To Find Local Affinity Patterns In Big Data

How To Find Local Affinity Patterns In Big Data Detection of local affinity patterns in big data Andrea Marinoni, Paolo Gamba Department of Electronics, University of Pavia, Italy Abstract Mining information in Big Data requires to design a new class

More information

v w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors.

v w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors. 3. Cross product Definition 3.1. Let v and w be two vectors in R 3. The cross product of v and w, denoted v w, is the vector defined as follows: the length of v w is the area of the parallelogram with

More information

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)

More information

Scalable Prefix Matching for Internet Packet Forwarding

Scalable Prefix Matching for Internet Packet Forwarding Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V \\\\ Best Practices for Managing Storage with Hyper-V Learn how storage functionality changes with the newest Hyper-V release and how it differs from VMware. Get details on specific Hyper-V features including

More information

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing) 1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication

More information

Secure Neighbor Discovery in Wireless Sensor Networks

Secure Neighbor Discovery in Wireless Sensor Networks Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu

More information

Lecture 5 - CPA security, Pseudorandom functions

Lecture 5 - CPA security, Pseudorandom functions Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.

More information

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process

More information

Discovering passwords in the memory

Discovering passwords in the memory Discovering passwords in the memory Abhishek Kumar (abhishek.kumar@paladion.net) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability

More information

How To Encrypt Data With A Power Of N On A K Disk

How To Encrypt Data With A Power Of N On A K Disk Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,

More information

Iris: A Scalable Cloud File System with Efficient Integrity Checks

Iris: A Scalable Cloud File System with Efficient Integrity Checks Iris: A Scalable Cloud File System with Efficient Integrity Checks Emil Stefanov UC Berkeley emil@cs.berkeley.edu Marten van Dijk RSA Laboratories mvandijk@rsa.com Ari Juels RSA Laboratories ajuels@rsa.com

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Operating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University

Operating Systems CSE 410, Spring 2004. File Management. Stephen Wagner Michigan State University Operating Systems CSE 410, Spring 2004 File Management Stephen Wagner Michigan State University File Management File management system has traditionally been considered part of the operating system. Applications

More information

Monitoring PostgreSQL database with Verax NMS

Monitoring PostgreSQL database with Verax NMS Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance

More information

Data Replication in Privileged Credential Vaults

Data Replication in Privileged Credential Vaults Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches

More information

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng School of Computer, Huazhong University of Science and Technology,

More information

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011 Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,

More information

Database Design Patterns. Winter 2006-2007 Lecture 24

Database Design Patterns. Winter 2006-2007 Lecture 24 Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

A Survey on Deduplication Strategies and Storage Systems

A Survey on Deduplication Strategies and Storage Systems A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information