libchop,alibraryfordistributed storage&databackup

Size: px
Start display at page:

Download "libchop,alibraryfordistributed storage&databackup"

Transcription

1 libchop,alibraryfordistributed storage&databackup Ludovic Courtès GNU Hackers Meeting, Den Haag, 24 July 2010

2 The Basics - inception & rationale - storing to remote, untrusted sites - library & tools for data storage The Mechanics The Plan

3 inception& rationale PhD in , LAAS-CNRS, France cooperative backup for the people! flexible & self-managed distributed storage storage to remote (untrusted) sites

4 storing to remote, untrusted sites dissemination of data fragments guarantees for data integrity, confidentiality, & authenticity

5 library& tools for data storage content-addressable storage ("deduplication") encryption via content-hash keys file chopping compression

6 from the command line $ chop-archiver --archive holiday-pic.jpg tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:onx5ee $ chop-archiver --restore \ tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:onx5ee \ > restored-pic.jpg

7 fromc chop_indexer_t *indexer; chop_chopper_t *chopper; chop_block_indexer_t *block_indexer; chop_block_store_t *store; chop_index_handle_t *index; /* Instantiate these things */ err = chop_indexer_index_blocks (indexer, chopper, block_indexer, store, store, index);

8 from Guile Scheme (define (archive-file file store) ;; Chop FILE and write the blocks to STORE. ;; Return an ASCII string denoting its index. (let* ((f (file-stream-open file)) (c (anchor-based-chopper-open f)) (bi (hash-block-indexer-open hash-method/sha1)) (i (tree-indexer-open 100))) (let ((index (indexer-index-blocks i c bi store store))) (index-handle-ascii-serialize index))))

9 The Basics The Mechanics - the storage pipeline - block stores - fixed-size chopper - content-based chopper - filters - tradeoffs The Plan

10 the storage pipeline block indexer data stream filter chopper stream indexer filter block store

11 block stores put (key, data); ring, can get (key); a byte string, can be anything

12 block store implementations gdbm, tdb, bdb, etc. file system (à la Git) easily transferred over HTTP, FTP, rsync, etc. remote (chop-block-server) ONC RPC, over TLS discovery using Avahi (chop-store-discover)

13 block indexer: content-addressable storage $ chop-archiver -i hash_block_indexer -I sha1 \ --archive britney.mp3 tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:7c4 x7e/42 sub-classes of block_fetcher and index_handle hash algo to address blocks & check integrity root block hash

14 block indexer: content-hash keys clear text aes256 cipher text sha256 H $ chop-archiver -i chk_block_indexer \ -I aes256,cbc,sha256,sha1 \ --archive naked.jpg :chk_index_handle:64:aes256,cbc,sha1:7c4 x7e,et4 vek/8a sha256 aes256 cipher algo & integrity check H sha1(cipher-text) key = sha256(clear-text)

15 content-addressable storage& compression single-instance storage single-instance

16 fixed-size chopper The quick brown fox jumps over the quick lazy The quick brown wildebeest jumps over the quick la

17 content-based chopper The quick brown fox jumps over the quick lazy The quick brown wildebeest jumps over the quick

18 filters block indexer data stream zlib bzip2 lzo GPG(?) chopper stream indexer zlib bzip2 lzo GPG(?) block store

19 tradeoffs 0.3 (for content-addressed source code revisions) compression ratio content-defined blocks + zlib d blocks content-defined blocks + no compression 0.0 throughput

20 The Basics The Mechanics The Plan - (built-in) support for directories & versioning - a cooperative/p2p backup daemon - storage in GNU

21 (built-in) support for directories& versioning root root previous date previous date (head) /src/chbouib.c /src/chbouib.c /src/backup.scm /src/backup.scm /new-file.txt R 0 R 1 I 0 I 1 I 2 D 0 D 1 D 2 D 3 D 4

22 a cooperative/p2p backup daemon Backup directories versioning libchop Opportunistic Replication Service Discovery Avahi Storage Contribution put (key, data) Authentication GnuTLS Cooperation & Replication Policies File System Networking put

23 your idea here

24 storage in GNU tar cpio RCS? GNUnet Sharutils

25 Summary libchop is cool!

26 Summary mechanisms, not policy content-addressable storage, content-hash keys, etc. supports disseminated data blocks build distributed backup/storage tools!

27 Thanks!

28 Copyright 2010 Ludovic Courtès You may copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is available at

CooperativeDataBackup formobiledevices

CooperativeDataBackup formobiledevices CooperativeDataBackup formobiledevices Ludovic Courtès Advisors: David Powell, Marc-Olivier Killijian 23 November 2007 2 Context Thesis at LAAS-CNRS, Dependable & Fault-Tolerant Computing Team The MoSAIC

More information

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main

More information

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer) FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.

More information

bup: the git-based backup system Avery Pennarun

bup: the git-based backup system Avery Pennarun bup: the git-based backup system Avery Pennarun 2010 10 25 The Challenge Back up entire filesystems (> 1TB) Including huge VM disk images (files >100GB) Lots of separate files (500k or more) Calculate/store

More information

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol) FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP file transfer protocols for Claims, POC, and Medical EDI transmissions. SFTP

More information

From bsdtar to tarsnap

From bsdtar to tarsnap Building an online backup service Colin Percival Tarsnap Backup Inc. cperciva@tarsnap.com September 28, 2013 Who am I? A computer scientist. Publications in computational mathematics, numerical analysis,

More information

Contents. WD Arkeia Page 2 of 14

Contents. WD Arkeia Page 2 of 14 Contents Contents...2 Executive Summary...3 What Is Data Deduplication?...4 Traditional Data Deduplication Strategies...5 Deduplication Challenges...5 Single-Instance Storage...5 Fixed-Block Deduplication...6

More information

Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder

Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder Emacs SMTP Library An Emacs package for sending mail via SMTP Simon Josefsson, Alex Schroeder Copyright c 2003, 2004 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify

More information

Veeam Best Practices with Exablox

Veeam Best Practices with Exablox Veeam Best Practices with Exablox Overview Exablox has worked closely with the team at Veeam to provide the best recommendations when using the the Veeam Backup & Replication software with OneBlox appliances.

More information

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute

More information

Availability Digest. www.availabilitydigest.com. Data Deduplication February 2011

Availability Digest. www.availabilitydigest.com. Data Deduplication February 2011 the Availability Digest Data Deduplication February 2011 What is Data Deduplication? Data deduplication is a technology that can reduce disk storage-capacity requirements and replication bandwidth requirements

More information

Encrypting and signing e-mail

Encrypting and signing e-mail Encrypting and signing e-mail V1.0 Developed by Gunnar Kreitz at CSC, KTH. V2.0 Developed by Pehr Söderman at ICT, KTH (Pehrs@kth.se) V3.0 Includes experiences from the 2009 course V3.1 Adaptation for

More information

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

File Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014

File Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014 File Transfer User Guide For Clients and Vendors Table of Contents File Transfer User Guide for Clients & Vendors... 3 Section 1: Overview... 3 Confidentiality... 3 Contact Information & Technical Support...

More information

Top 5 Reasons to Upgrade to edocs DM 5.3

Top 5 Reasons to Upgrade to edocs DM 5.3 Top 5 Reasons to Upgrade to edocs DM 5.3 Larry Roy Director edocs Product Management December 2 nd, 2010 Agenda Lowering Total Cost of Ownership Unleash the power of Microsoft Office 2010 Accelerate your

More information

NAS 259 Protecting Your Data with Remote Sync (Rsync)

NAS 259 Protecting Your Data with Remote Sync (Rsync) NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

922-280 Avamar Backup and Data De-duplication Exam

922-280 Avamar Backup and Data De-duplication Exam 922-280 Avamar Backup and Data De-duplication Exam Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free

More information

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security

More information

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data

More information

LDA, the new family of Lortu Data Appliances

LDA, the new family of Lortu Data Appliances LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology

More information

Linux System Administration. System Administration Tasks

Linux System Administration. System Administration Tasks System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,

More information

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors. www.oodrive.com

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors. www.oodrive.com BoardNox Secure file sharing solution for Executive Committees and Boards of Directors www.oodrive.com BoardNox Organize meetings (dates, participants, speakers, venues and subjects) Share documents on

More information

Security Ensured Redundant Data Management under Cloud Environment

Security Ensured Redundant Data Management under Cloud Environment Security Ensured Redundant Data Management under Cloud Environment K. Malathi 1 M. Saratha 2 1 PG Scholar, Dept. of CSE, Vivekanandha College of Technology for Women, Namakkal. 2 Assistant Professor, Dept.

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

3Gen Data Deduplication Technical

3Gen Data Deduplication Technical 3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and

More information

Creating a Cloud Backup Service. Deon George

Creating a Cloud Backup Service. Deon George Creating a Cloud Backup Service Deon George Agenda TSM Cloud Service features Cloud Service Customer, providing a internal backup service Internal Backup Cloud Service Service Provider, providing a backup

More information

DeltaStor Data Deduplication: A Technical Review

DeltaStor Data Deduplication: A Technical Review White Paper DeltaStor Data Deduplication: A Technical Review DeltaStor software is a next-generation data deduplication application for the SEPATON S2100 -ES2 virtual tape library that enables enterprises

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Security Rationale for a Cooperative Backup Service for Mobile Devices

Security Rationale for a Cooperative Backup Service for Mobile Devices Security Rationale for a Cooperative Backup Service for Mobile Devices Ludovic Courtès, Marc-Olivier Killijian, and David Powell LAAS-CNRS, Université de Toulouse, France Abstract. Mobile devices (e.g.,

More information

Byte-index Chunking Algorithm for Data Deduplication System

Byte-index Chunking Algorithm for Data Deduplication System , pp.415-424 http://dx.doi.org/10.14257/ijsia.2013.7.5.38 Byte-index Chunking Algorithm for Data Deduplication System Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2 and Young Woong Ko

More information

, ) I Transport Layer Security

, ) I Transport Layer Security Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent

More information

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE

More information

How To Use Portlock Storage Manager Client On A Netware System (Netware) With A Virtual Disk (Veeam) On A Windows 7.4.4 (Vheeam) Or Veeam Veea (Vfree

How To Use Portlock Storage Manager Client On A Netware System (Netware) With A Virtual Disk (Veeam) On A Windows 7.4.4 (Vheeam) Or Veeam Veea (Vfree Portlock Storage Manager Client Working with Veeam Backup & Replication May 29, 2012 Version 0.94 Copyright 2000-2012 Portlock Corporation Copyright 2000-2012 Portlock Corporation Page 1 of 13 The Portlock

More information

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com Improving, accelerating and simplifying the sharing of sensitive information. www.oodrive.com Securing, accelerating and simplifying the sharing and viewing of sensitive or confidential documents. WHEN

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

VERITAS NetBackup 6.0 Encryption

VERITAS NetBackup 6.0 Encryption VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Setting up Remote Replication on SNC NAS Series

Setting up Remote Replication on SNC NAS Series Setting up Remote Replication on SNC NAS Series Application Note Abstract This application note describes how to set up remote replication on SNC NAS systems. Table of Contents Product Models Covered by

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

K-Backup: Automatic Network Backup solution

K-Backup: Automatic Network Backup solution K-Backup: Automatic Network Backup solution Monday, November 4, 2013 KernSafe Technologies,Inc www.kernsafe.com Copyright KernSafe Technologies 2006-2013.All right reserved. Table of contents Overview...

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview Hervey Allen Network Startup Resource Center PacNOG 6: Nadi, Fiji Security Overview Security: A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other Server Client

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Theoretical Aspects of Storage Systems Autumn 2009

Theoretical Aspects of Storage Systems Autumn 2009 Theoretical Aspects of Storage Systems Autumn 2009 Chapter 3: Data Deduplication André Brinkmann News Outline Data Deduplication Compare-by-hash strategies Delta-encoding based strategies Measurements

More information

How to Send Stealth Text From Your Cell Phone

How to Send Stealth Text From Your Cell Phone anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

A Deduplication-based Data Archiving System

A Deduplication-based Data Archiving System 2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System

More information

Fundamentals of Computer Security

Fundamentals of Computer Security Fundamentals of Computer Security Spring 2015 Radu Sion Intro Encryption Hash Functions A Message From Our Sponsors Fundamentals System/Network Security, crypto How do things work Why How to design secure

More information

Secured Communications using Linphone & Flexisip

Secured Communications using Linphone & Flexisip Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation Objectives Outline the features of common compression utilities Compress and decompress

More information

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved. Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations

More information

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department

More information

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng School of Computer, Huazhong University of Science and Technology,

More information

ESCAPE ALL LIMITATIONS. Protecting Windows Microsoft. Growth in data for Microsoft Exchange is expanding at. Exchange Server

ESCAPE ALL LIMITATIONS. Protecting Windows Microsoft. Growth in data for Microsoft Exchange is expanding at. Exchange Server Strong Data Protection Protecting for Microsoft Windows Server Microsoft 2012: Unitrends Enterprise Exchange Backup Server ESCAPE ALL LIMITATIONS Protecting Windows Microsoft Growth in data for Microsoft

More information

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents

More information

EISOO AnyBackup Family 5.0 All-in-One Protection

EISOO AnyBackup Family 5.0 All-in-One Protection EISOO AnyBackup Family 5.0 All-in-One Protection ESSENTIALS Simplifies data backup by integrating software, hardware, server and storage in one product Provides comprehensive backup for files, emails,

More information

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

ZFS Backup Platform. ZFS Backup Platform. Senior Systems Analyst TalkTalk Group. http://milek.blogspot.com. Robert Milkowski.

ZFS Backup Platform. ZFS Backup Platform. Senior Systems Analyst TalkTalk Group. http://milek.blogspot.com. Robert Milkowski. ZFS Backup Platform Senior Systems Analyst TalkTalk Group http://milek.blogspot.com The Problem Needed to add 100's new clients to backup But already run out of client licenses No spare capacity left (tapes,

More information

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April 2006. Copyright 2006 Zmanda, Inc. All rights reserved.

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April 2006. Copyright 2006 Zmanda, Inc. All rights reserved. Amanda The Open Source Backup & Archiving Software Ian Turner ian@zmanda.com 11 April 2006 Copyright 2006 Zmanda, Inc. All rights reserved. 1 Agenda What is Amanda? Amanda features Configuration Administration

More information

Chakchai So-In, Ph.D.

Chakchai So-In, Ph.D. Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon

More information

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx Passwordstate Upgrade Instructions to V7 from V5.xx This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,

More information

HathiTrust Digital Assets Agreement

HathiTrust Digital Assets Agreement HathiTrust Digital Assets Agreement Complete the Agreement form below for submission of digital assets to the HathiTrust Digital Library ( HathiTrust ). Print two copies of the completed form and have

More information

File Protection using rsync. Setup guide

File Protection using rsync. Setup guide File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...

More information

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. info@sepusa.com www.sepusa.com Copyright 2014 SEP

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. info@sepusa.com www.sepusa.com Copyright 2014 SEP Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP

More information

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

5 ways to make money on backup

5 ways to make money on backup 5 ways to make money on backup An action plan for service providers Doug Hazelman Chief Evangelist and Vice President of Product Strategy Veeam #1: Stop selling backup It just works with Kaseya! Rationale

More information

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer

More information

Cumulus: Filesystem Backup to the Cloud

Cumulus: Filesystem Backup to the Cloud Cumulus: Filesystem Backup to the Cloud Michael Vrable, Stefan Savage, and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego Abstract In this paper

More information

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

File Transfer Protocol. What is Anonymous FTP? What is FTP?

File Transfer Protocol. What is Anonymous FTP? What is FTP? File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.

More information

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols

More information

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/ Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

PGP - Pretty Good Privacy

PGP - Pretty Good Privacy I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format

More information

WHAT S THE DIFFERENCE? JENNIFER RICKER DIGITAL COLLECTIONS MANAGER STATE LIBRARY OF NORTH CAROLINA

WHAT S THE DIFFERENCE? JENNIFER RICKER DIGITAL COLLECTIONS MANAGER STATE LIBRARY OF NORTH CAROLINA Archival Storage vs. Data Backup WHAT S THE DIFFERENCE? JENNIFER RICKER DIGITAL COLLECTIONS MANAGER STATE LIBRARY OF NORTH CAROLINA Overview Why store at all? What IS the difference? General differences

More information

Linux Backups. Russell Adams <rladams@adamsinfoserv.com> Linux Backups p. 1

Linux Backups. Russell Adams <rladams@adamsinfoserv.com> Linux Backups p. 1 Linux Backups Russell Adams Linux Backups p. 1 Linux Backup Discuss a variety of backup software & methods Recommendations for backup HOWTO for Rsnapshot Demonstration Linux

More information

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions 4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression Philip Shilane, Mark Huang, Grant Wallace, and Windsor Hsu Backup Recovery Systems Division EMC Corporation Abstract

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn

More information

Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.

Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr. Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance

More information

Presents. Attix5 Technology. An Introduction

Presents. Attix5 Technology. An Introduction Presents Attix5 Technology An Introduction January 2013 1. Global Block Level Deduplication. Attix5 Feature Top 10 Things That Matter When Attix5 is first installed on a target server a full backup is

More information

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Deduplication has been around for several

Deduplication has been around for several Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding

More information

WebPublish User s Manual

WebPublish User s Manual WebPublish User s Manual Documentation for WebPublish Version 0.1.0. Charles Henry Schoonover i Table of Contents 1 Introduction............................... 1 2 Installation................................

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information