Secure Cloud Computing with FlexCloud

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure Cloud Computing with FlexCloud"

Transcription

1 Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Secure Cloud Computing with FlexCloud Dr.-Ing. Anja Strunk DAAD Summer School CTDS 2012 Sousse, Tunisia

2 Outline Cloud Computing Security Problems π-box: Building your personal secure cloud Secure Cloud Storage Prototype & Evaluation Conclusion & Future Work # 2

3 Security Problems U.S. covernment is allowed to access European clouds. (June, 2011) Dropbox accepts arbitrary passwords for 4 hours (July, 2011) Thunderbold destroys Amazon EC2. (August 2011) Confidentiality Integrity Availability # 3

4 Outline Cloud Computing Security Problems π-box: Building your personal secure cloud Secure Cloud Storage Prototype & Evaluation Conclusion & Future Work # 4

5 π-cloud Approach Subsume all end devices within a Personal Secure Cloud (π-cloud) controlled by the π-box. π-cloud π-box # 5

6 π-box Architecture Service execution with respect to security and other nonfunctional requirements. π-box π-service Controller π-cockpit π-data Controller User Interface / GUI Data storage & distribution with respect to security and other nonfunctional requirements. Infrastructure management π-resource Manager Peer-to-Peer Network public resources (not necessarily trustworthy) private resources (trustworthy) # 6

7 Outline Cloud Computing Security Problems π-box: Building your personal secure cloud Secure Cloud Storage Prototype & Evaluation Conclusion & Future Work # 7

8 π-data Controller # 8 Shared Folder Cloud Storage Protocol Adapter Meta Data Data Controller: Storing File Dispersion Cryptography π-cloud = Company Intranet

9 File Dispersion: Principle Ensure availability despite of unreliable cloud storage providers k threshold, i.e. # of necessary shares to reconstruct n total # of shares a file is split into E.g. k=6, n=8 If k < n, we need redundant information. # 9

10 π-data Controller # 10 Shared Folder Cloud Storage Protocol Adapter Meta Data File Dispersion Cryptography π-cloud = Company Intranet Data Controller: Storing

11 Cryptography: Principle Ensure confidentiality and integrity by encryption and check sum AES-CBC AES-CBC AES-CBC AES-CBC + SHA256 + SHA256 + SHA256 + SHA256 # 11

12 π-data Controller # 12 Shared Folder Cloud Storage Protocol Adapter Meta Data File Dispersion Cryptography π-cloud = Company Intranet Data Controller: Storing

13 π-data Controller # 13 Shared Folder Cloud Storage Protocol Adapter Meta Data File Dispersion Cryptography π-cloud = Company Intranet Data Controller: Storing

14 Data Controller: Reconstruction Meta-Data contains all information about dispersion, encryption keys, storage nodes π-cloud = Firmen Intranet Meta Data Shared Folder File Dispersion Cryptography Cloud Storage Protocol Adapter π-data Controller # 14

15 Meta Data Cloud Storage Protocol Adapter π-data Controller # 15 Shared Folder File Dispersion Cryptography π-cloud = Firmen Intranet Data Controller: Reconstruction

16 Outline Cloud Computing Security Problems π-box: Building your personal secure cloud Secure Cloud Storage Prototype & Evaluation Conclusion & Future Work # 16

17 Prototype π-cloud = Firmen Intranet Data Base (MySQL) Dispersion (JEasure, C) Cryptography (AES, Java) z (API) (FTP) Shared Folder (SMB) Protocol Adapter (FUSE) π-data Controller (Proxy Server) # 17

18 Performance: Information Dispersal File size: 24 MB Machine: Single Core Machine 2 GB memory Throughput [Mbit/s] Dispersion parameter: k = 6 Towards User Centric Data Governance and Control in the Cloud # 18

19 Performance: Cryptography File size: 24 MB Machine: Single Core Machine 2 GB memory Key Size Crypto bit 10 Crypto bit 12 Crypto bit 14 # of iterations Towards User Centric Data Governance and Control in the Cloud # 19

20 Performance Evaluation: Overall Test 3 Test 2 Test 1 32 Mbit/s -Box 20 Mbit/s 10 Mbit/s Single Core Machine 2 GB memory Upload Download Test 1 Test 2 Test 3 Test 1 Test 2 Test Time (seconds) Time (seconds) Network Share Dispersion Cryptography Upload/Download Upload finished from user perspective File size: 24 MB; Dispersion parameters: n=8, k=6; Cryptography parameters: Towards AES (256 User bit, Centric 14 iterations), Data Governance SHA256; and Control in the Cloud Machine: Single Core, 2 GB # 20

21 Outline Cloud Computing Security Problems π-box: Building your personal secure cloud Secure Cloud Storage Evaluation Conclusion & Future Work # 21

22 Conclusion The -Cloud is a solution to externalize IT resources without loosing data control Price of Security: Delay due to extra processing Additional storage space due redundancy. Efficiency: # 22

23 Tomorrow's forecast: still cloudy but sunny spots Contact: # 23

FlexCloud: Reliable and Secure Cloud Overlay Infrastructures

FlexCloud: Reliable and Secure Cloud Overlay Infrastructures Department of Computer Science Institute of Systems Architecture Chair of Computer Networks FlexCloud: Reliable and Secure Cloud Overlay Infrastructures Prof. Dr. Alexander Schill 2013 Who we are Internet

More information

CloudFTP: A free Storage Cloud

CloudFTP: A free Storage Cloud CloudFTP: A free Storage Cloud ABSTRACT: The cloud computing is growing rapidly for it offers on-demand computing power and capacity. The power of cloud enables dynamic scalability of applications facing

More information

Cloud Storage Security

Cloud Storage Security Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage

More information

GRAU DataSpace 2.0 THE SECURE COMMUNICATION PLATFORM FOR ENTERPRISES AND ORGANIZATIONS YOUR DATA. YOUR CONTROL

GRAU DataSpace 2.0 THE SECURE COMMUNICATION PLATFORM FOR ENTERPRISES AND ORGANIZATIONS YOUR DATA. YOUR CONTROL GRAU DataSpace 2.0 THE SECURE COMMUNICATION PLATFORM FOR ENTERPRISES AND ORGANIZATIONS YOUR DATA. YOUR CONTROL Introduction Global file sharing is a mega trend Sync & Share is a new product category Consumer

More information

Uptime Infrastructure Monitor. Installation Guide

Uptime Infrastructure Monitor. Installation Guide Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc

Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc Transforming cloud infrastructure to support Big Data Ying Xu Aspera, Inc Presenters and Agenda! PRESENTER Ying Xu Principle Engineer, Aspera R&D ying@asperasoft.com AGENDA Challenges in Moving Big Data

More information

4/10/2012. Hall. Cherokee. Bartow. Forsyth. Barrow. Gwinnett. Paulding. Cobb. Walton. DeKalb. Douglas. Fulton. Rockdale. Carroll. Clayton.

4/10/2012. Hall. Cherokee. Bartow. Forsyth. Barrow. Gwinnett. Paulding. Cobb. Walton. DeKalb. Douglas. Fulton. Rockdale. Carroll. Clayton. Carroll Bartow Paulding Douglas Coweta Cobb Cherokee Fulton Fayette Clayton DeKalb Spalding Forsyth Henry Gwinnett Rockdale Hall Newton Barrow Walton 4/10/2012 Cloud Computing On demand use of remote computer

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

Installing Ubuntu 12.04.1 LTS with full disk encryption

Installing Ubuntu 12.04.1 LTS with full disk encryption Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know

More information

MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE

MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE Nigro Antonio Ambus Giuliano Perugia, 14 Luglio 2012 Agenda 1 2 3 4 What is Cloud Computing? Memory on the Cloud : DAAS or Cloud Storage Principal vendors

More information

Benchmarking Cloud Storage Systems

Benchmarking Cloud Storage Systems Benchmarking Cloud Storage Systems Xing Wang Master in Security and Mobile Computing Submission date: July 2014 Supervisor: Yuming Jiang, ITEM Co-supervisor: Julien Beaudaux, ITEM Markus Hidell, KTH Royal

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition

OCS Virtual image. User guide. Version: 1.3.1 Viking Edition OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...

More information

Aspera Direct-to-Cloud Storage WHITE PAPER

Aspera Direct-to-Cloud Storage WHITE PAPER Transport Direct-to-Cloud Storage and Support for Third Party April 2014 WHITE PAPER TABLE OF CONTENTS OVERVIEW 3 1 - THE PROBLEM 3 2 - A FUNDAMENTAL SOLUTION - ASPERA DIRECT-TO-CLOUD TRANSPORT 5 3 - VALIDATION

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

GeoCloud Project Report GEOSS Clearinghouse

GeoCloud Project Report GEOSS Clearinghouse GeoCloud Project Report GEOSS Clearinghouse Qunying Huang, Doug Nebert, Chaowei Yang, Kai Liu 2011.12.06 Description of Application GEOSS clearinghouse is a FGDC, GEO, and NASA project that connects directly

More information

Vembu NetworkBackup v3.1.1 GA

Vembu NetworkBackup v3.1.1 GA Vembu NetworkBackup v3.1.1 GA VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES Vembu NetworkBackup v3.1.1 GA - Release Notes With enhanced features and fixes boosting stability and performance,

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,

More information

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks

More information

Pure Cloud Run all components of the Apica ProxySniffer product completely in the cloud.

Pure Cloud Run all components of the Apica ProxySniffer product completely in the cloud. Ingenieurbüro David Fischer AG A Company of the Apica Group www.proxy-sniffer.com Pure Cloud Run all components of the Apica ProxySniffer product completely in the cloud. 2012 Ingenieurbüro David Fischer

More information

ESPRESSO: An Encryption as a Service for Cloud Storage Systems

ESPRESSO: An Encryption as a Service for Cloud Storage Systems 8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014 Outline Introduction and

More information

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System

Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

Security of Cloud Storage: - Deduplication vs. Privacy

Security of Cloud Storage: - Deduplication vs. Privacy Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt

More information

Internet Storage Sync Problem Statement

Internet Storage Sync Problem Statement Internet Storage Sync Problem Statement draft-cui-iss-problem Zeqi Lai Tsinghua University 1 Outline Background Problem Statement Service Usability Protocol Capabili?es Our Explora?on on Protocol Capabili?es

More information

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS OpenStack Private Cloud Hosting in an Tier 3 Data Centre This is service provides a dedicated private cloud environment built on the open source technology, OpenStack. This is service provides a dedicated

More information

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client. DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number

More information

Scaling in the Cloud with AWS. By: Eli White (CTO & Co-Founder @ mojolive) eliw.com - @eliw - mojolive.com

Scaling in the Cloud with AWS. By: Eli White (CTO & Co-Founder @ mojolive) eliw.com - @eliw - mojolive.com Scaling in the Cloud with AWS By: Eli White (CTO & Co-Founder @ mojolive) eliw.com - @eliw - mojolive.com Welcome! Why is this guy talking to us? Please ask questions! 2 What is Scaling anyway? Enabling

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Paxata Security Overview

Paxata Security Overview Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products nenshad@paxata.com Table of Contents: Introduction...3 Secure Data

More information

Sentral servers provide a wide range of services to school networks.

Sentral servers provide a wide range of services to school networks. Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3

More information

Amazon Hosted ESRI GeoPortal Server. GeoCloud Project Report

Amazon Hosted ESRI GeoPortal Server. GeoCloud Project Report Amazon Hosted ESRI GeoPortal Server GeoCloud Project Report Description of Application Operating Organization The USDA participated in the FY 2011 Federal Geographic Data Committee (FGDC) GeoCloud Sandbox

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

AMAZON S3 AND EC2 PERFORMANCE REPORT

AMAZON S3 AND EC2 PERFORMANCE REPORT AMAZON S3 AND EC2 PERFORMANCE REPORT OVERVIEW A frequently asked question regarding the Amazon Web Services (AWS) cloud computing platform is how well their storage system (S3) performs with their computing

More information

Own your own Enterprise Cloud with. FlexCloud

Own your own Enterprise Cloud with. FlexCloud Own your own Enterprise Cloud with FlexCloud What Problem do we solve? Traditional Virtualization Stack Data protection software applications PDU Backup Servers + Virtualization Storage Switch HA shared

More information

PiCsMu: A Cloud Overlay to Store and Manage Data

PiCsMu: A Cloud Overlay to Store and Manage Data 35th NMRG meeting @ Windsor Atlântica Rio de Janeiro, Brazil, 17th November 2014 PiCsMu: A Cloud Overlay to Store and Manage Data Guilherme Sperb Machado, Burkhard Stiller Department of Informatics IFI,

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe

How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe How to Store Data to the Cloud without giving the Cloud anything Jason Resch Cleversafe Topics Barriers to cloud storage adoption Reliability concerns Security concerns Conventional Solutions Replication,

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Research Data Storage, Sharing, and Transfer Options

Research Data Storage, Sharing, and Transfer Options Research Data Storage, Sharing, and Transfer Options Principal investigators should establish a research data management system for their projects including procedures for storing working data collected

More information

Receptionist-Small Business Administrator guide

Receptionist-Small Business Administrator guide Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

Secure information storage

Secure information storage Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

ArcGIS 10.3 Server on Amazon Web Services

ArcGIS 10.3 Server on Amazon Web Services ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick

More information

branddocs Technology edocument Solutions V.1.0.2013 V.11.0.2013

branddocs Technology edocument Solutions V.1.0.2013 V.11.0.2013 branddocs Technology V.1.0.2013 V.11.0.2013 edocument Solutions Contents 1.- Branddocs' Development Technology 03 2.- Development Technology Features 04 3.- Technical Architecture 05 4.- Description of

More information

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes

More information

Access your directories (home directory and shared directories) outside Tilburg University

Access your directories (home directory and shared directories) outside Tilburg University Access your directories (home directory and shared directories) outside Tilburg University FileZilla offers you the possibility to access your personal M-drive or other network locations through a secure

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Investigating the Pricing Impact on the QoS of a Server Farm Deployed on the Cloud

Investigating the Pricing Impact on the QoS of a Server Farm Deployed on the Cloud Investigating the Pricing Impact on the QoS of a Server Farm Deployed on the Cloud A.M.D Aljohani 1,2, D.R.W Holton 2 and Irfan Awan 2 1 Tabuk university, Saudi Arabia 2 university of Bradford, England

More information

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching 1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page

More information

Performance Evaluation of Online Backup Cloud Storage

Performance Evaluation of Online Backup Cloud Storage Performance Evaluation of Online Backup Cloud Storage Xiao Zhang School of Computer Science Northwestern Polytechnical University 127 Youyi xi Road, Xi an Shaanxi China zhangxiao@nwpu.edu.cn Wan Guo School

More information

Tertiary Backup objective is automated offsite backup of critical data

Tertiary Backup objective is automated offsite backup of critical data Tertiary Backups Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Tertiary Backup Tertiary Backup objective is automated

More information

Generating Load from the Cloud Handbook

Generating Load from the Cloud Handbook Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com Generating Load from the Cloud Handbook Version 5.0 English Edition 2011, 2012 December 6, 2012 Page 1 of 44 Table

More information

Cloud Sync White Paper. Based on DSM 6.0

Cloud Sync White Paper. Based on DSM 6.0 Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

FPGAs for Trusted Cloud Computing

FPGAs for Trusted Cloud Computing FPGAs for Trusted Cloud Computing Traditional Servers Datacenter Cloud Servers Datacenter Cloud Manager Client Client Control Client Client Control 2 Existing cloud systems cannot offer strong security

More information

Measurement Study of Wuala, a Distributed Social Storage Service

Measurement Study of Wuala, a Distributed Social Storage Service Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010

More information

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings

More information

Dynamic Resource allocation in Cloud

Dynamic Resource allocation in Cloud Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from

More information

What is WS_FTP? How WS_FTP Works

What is WS_FTP? How WS_FTP Works What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,

More information

Compatibility and Support Information Nasuni Corporation Natick, MA

Compatibility and Support Information Nasuni Corporation Natick, MA Information Nasuni Corporation Natick, MA Contents 1. Introduction... 1 2.... 1 2.1. Virtualization platforms... 1 3. Filers... 2 3.1. Filer properties... 2 3.2. Clients... 3 3.3. VSS... 7 3.4. Security...

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

A SHORT INTRODUCTION TO CYBERDUCK WITH CLOUD OBJECT STORAGE. Version 1.12 2014-07-01

A SHORT INTRODUCTION TO CYBERDUCK WITH CLOUD OBJECT STORAGE. Version 1.12 2014-07-01 A SHORT INTRODUCTION TO CYBERDUCK WITH CLOUD OBJECT STORAGE Version 1.12 2014-07-01 PAGE _ 2 TABLE OF CONTENTS 1. Introduction....Page 03 2. Access Cloud Object Storage using Cyberduck...Page 04 3. Create

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

Cloud n Service Presentation. NTT Communications Corporation Cloud Services

Cloud n Service Presentation. NTT Communications Corporation Cloud Services Cloud n Service Presentation NTT Communications Corporation Cloud Services 1 Overview of Global Public Cloud Services Cloud n offeres datacenters in U.S. and Japan Global standard service architecture

More information

Cloud Utilization for Online Price Intelligence

Cloud Utilization for Online Price Intelligence Lohnt sich Cloud Computing? Anwendungsbeispiele aus der Praxis Cloud Utilization for Online Price Intelligence 22.6.2010 OCG Competence Circle About Lixto Lixto extracts specific and precise data from

More information

How to use FTP Commander

How to use FTP Commander FTP (File Transfer Protocol) software can be used to upload files and complete folders to your web server. On the web, there are a number of free FTP programs that can be downloaded and installed onto

More information

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3 JAMF Software Server Installation and Configuration Guide for Windows Version 9.3 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this

More information

GATE Mímir and cloud services. Multi-paradigm indexing and search tool Pay-as-you-go large-scale annotation

GATE Mímir and cloud services. Multi-paradigm indexing and search tool Pay-as-you-go large-scale annotation GATE Mímir and cloud services Multi-paradigm indexing and search tool Pay-as-you-go large-scale annotation GATE Mímir GATE Mímir is an indexing system for GATE documents. Mímir can index: Text: the original

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Vembu VMBackup v3.1.0 BETA

Vembu VMBackup v3.1.0 BETA Vembu VMBackup v3.1.0 BETA Release Notes With enhanced features and fixes boosting stability and performance, Vembu VMBackup v3.1.0 BETA is now available for user evaluation. The all in one Vembu VMBackup

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

A Service for Data-Intensive Computations on Virtual Clusters

A Service for Data-Intensive Computations on Virtual Clusters A Service for Data-Intensive Computations on Virtual Clusters Executing Preservation Strategies at Scale Rainer Schmidt, Christian Sadilek, and Ross King rainer.schmidt@arcs.ac.at Planets Project Permanent

More information

STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS

STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD Cloud Backup is an affordable backup and recovery solution for all your mission critical business information on all devices

More information

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Problem. Solution. Quatrix is professional, secure and easy to use file sharing. Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities

More information

A Distributed Storage Architecture based on a Hybrid Cloud Deployment Model

A Distributed Storage Architecture based on a Hybrid Cloud Deployment Model A Distributed Storage Architecture based on a Hybrid Cloud Deployment Model Emigdio M. Hernandez-Ramirez, Victor J. Sosa-Sosa, Ivan Lopez-Arevalo Information Technology Laboratory Center of Research and

More information

Alliance Key Manager Cloud HSM Frequently Asked Questions

Alliance Key Manager Cloud HSM Frequently Asked Questions Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Dynamic Resource Allocation and Data Security for Cloud

Dynamic Resource Allocation and Data Security for Cloud Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Annasaheb Dange College of Engg. & Technology, Ashta, Maharashtra, India. Amol B. Rajmane Ashokrao Mane Group of Institutions,

More information

Online Backup - Installation and Setup

Online Backup - Installation and Setup The following guide will assist you in installing the Attix5 Backup Professional Server Edition on your Admin Server. You will have received your Group Name and Group Create Key from the Schools Broadband

More information

Sheepdog: distributed storage system for QEMU

Sheepdog: distributed storage system for QEMU Sheepdog: distributed storage system for QEMU Kazutaka Morita NTT Cyber Space Labs. 9 August, 2010 Motivation There is no open source storage system which fits for IaaS environment like Amazon EBS IaaS

More information

FREE computing using Amazon EC2

FREE computing using Amazon EC2 FREE computing using Amazon EC2 Seong-Hwan Jun 1 1 Department of Statistics Univ of British Columbia Nov 1st, 2012 / Student seminar Outline Basics of servers Amazon EC2 Setup R on an EC2 instance Stat

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform

On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform Page 1 of 16 Table of Contents Table of Contents... 2 Introduction... 3 NoSQL Databases... 3 CumuLogic NoSQL Database Service...

More information

MySQL and Virtualization Guide

MySQL and Virtualization Guide MySQL and Virtualization Guide Abstract This is the MySQL and Virtualization extract from the MySQL Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit

More information

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...

More information

CLOUD STORAGE USING HADOOP AND PLAY

CLOUD STORAGE USING HADOOP AND PLAY 27 CLOUD STORAGE USING HADOOP AND PLAY Devateja G 1, Kashyap P V B 2, Suraj C 3, Harshavardhan C 4, Impana Appaji 5 1234 Computer Science & Engineering, Academy for Technical and Management Excellence

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information