Async: Secure File Synchronization
|
|
|
- Jacob Adrian Hamilton
- 9 years ago
- Views:
Transcription
1 Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, Darmstadt, Germany Abstract. The present paper presents and compares multiple products for file synchronization between devices. The focus is on the architecture of the products, their range of features, their usability and security aspects. Additionally, the development of the software Async is described, which is a secure cloud storage service that offers synchronization. Due to client-side encryption and a peer-to-peer architecture of the cloud, Async offers strong protection from unauthorized access. Blocks of files are placed in a chord network as key-value pairs. All devices involved detect changes in local files on the basis of changes in meta data and synchronize these with the cloud. Conflicting versions of files are detected reliably and displayed to the user. The interaction of parallel processses is coordinated by transactions and a compare-and-swap operation. Keywords: Cloud, Security, File Synchronization, Chord, Peer-to-Peer 1 Introduction For the past few years services that synchronize files between multiple devices have grown in popularity. They allow a user to access personal files anywhere with minimal effort. However, many of the available products have weaknesses in terms of privacy. They use server side encryption, meta data is transmitted unencrypted, they depend on a central server that offers a single point of attack and the source is not made public, which allows for hidden backdoors for the provider or public authorities. In order to provide better privacy, other services do not offer any cloud storage and synchronize directly between devices instead. This results in a drop in usability as the user has to operate a server. This situation leads to the goal of the present paper to design and implement a secure file synchronizer that offers cloud storage in a peer-to-peer network. In order to synchronize files between devices the following problems have to be solved: published at IS 2015 (The 11th International Conference on Interactive Systems, Ulyanovsk 2015)
2 2 V. Schaaber, A. Schuette 1. transfer files between devices, 2. detect changes in a file and propagate them to other devices, 3. decide which version of a file should be propagated, 4. coordinate parallel processes. The software Async consists of three components as illustrated in figure 1. The user can choose files for synchronization with the front end program Async. User input is transmitted to the Async daemon via HTTPS protocol. The Async daemon runs in the background and checks regularly which steps are necessary to synchronize files on the local device with the cloud and carries them out. The cloud is hosted in a peer-to-peer network with a Chord [2] architecture. The Async daemon communicates with the cloud via the achordfs protocol, which is described in section 3. Fig. 1. The interaction of the front end program Async, the Async daemon and the chord network The paper proceeds as follows: In section 2 an overview of the chord network is given. Section 3 describes how files are uploaded and downloaded from that network by means of the achordfs protocol. The synchronization is discussed in section 4. Section 5 addresses the coordination of concurrent processes and section 6 outlines how a user can share content with other users. Subsequently, a comparison of Async to other synchronizers follows. Finally, a conclusion is presented in section 8. 2 The Chord Network Every node in the Chord network is assigned an identifier (node id) with a fixed length of m bits. The identifier space is represented as a circle of numbers, ranging from 0 to 2 m 1. The identifier of a node represents its place on this circle, which is also called the Chord ring. Similar to a distributed hash table,
3 Async: Secure File Synchronization 3 data can be placed in the Chord network as key-value pairs, the key space being equal to the node id space. The key determines on which node the value will be saved. The value with key k will be placed at the first node whose identifier is equal to or follows k in the identifier space. On the ring this is the first node clockwise from k. A computer that is not part of the network has to have knowledge of the IP address of only one of the participants in order to use the key-value storage. The known participant is asked via a lookup operation which node is responsible for a certain key. The node will either return the responsible node or ask a node that is closer to the responsible node to perform the lookup. Each node in a Chord network of N nodes has to maintain information about O(logN) other nodes in order to perform the lookup with O(logN) messages. The finger table that stores the information on other nodes in the network is updated regularly. When a new node joins the Chord network, it is assigned a node id and thereby given a place on the Chord ring. As a consequence all stored values that the new node is responsible for are migrated there. Similarly, a node should migrate its values to its immediate successor, before leaving the Chord network. 3 The Achordfs Protocol In order to use the Chord network to store files, the achordfs protocol [1] divides files into blocks of fixed length. If the file size is not divisible by the block length the last block will be shorter than the others. For each block a 160 bit key is calculated as the sha1 hash function of the encrypted content of the block. The encrypted block is then stored in the Chord network under the corresponding key, which is also called score. Since the hash function is calculated on the basis of the encrypted block and a random number of 192 bits is involved in the encryption a key collision even of different files with the exact same content is very unlikely. The scores of all the blocks that make up one file are collected in a structure called stat, that also contains the meta data of the file. The stat is then encrypted and stored in the Chord network under a score as well. To keep track of all the files that belong to one user a structure called syncmessage is created. For each file a user wants to synchronize between devices the syncmessage contains the file s path name, its score and a version number. The syncmessage is similar to the stat, but scores in the syncmessage always address a stat, while scores in a stat alwas address a block of content. The syncmessage is encrypted and stored in the Chord network under a key that is derived from the user s public key. This enables a user to download and decrypt all files from the Chord network on a new device simply by entering his or her private and public key. The syncmessage provides all necessary information on where to find the stats, which in turn provide information on where to find the blocks for one file.
4 4 V. Schaaber, A. Schuette 4 Synchronization The Async daemon regularly synchronizes the files on the device it is running on, with the files in the Chord network. It detects changes in local files by comparing the modification time of a file, with this file s modification time during the last synchronization. Changes in the Chord network are detected by comparing the version number of a remote file, which can be read in the syncmessage, with the last version number this device downloaded. If a local change is detected the changes in the affected file are uploaded to the Chord network together with a new stat structure. If there is a new version in the Chord network it is downloaded. If there are changes both in the Chord network and on the local device the user will be informed of a conflict. When all files are synchronized a new syncmessage that contains the new scores addressing the changed stats is uploaded to the Chord network to replace the old one. Afterwards the current modification time and the number of the latest downloaded version are stored on the local device for each file to assist in future synchronizations. 5 Coordination of Concurrent Processes Multiple devices accessing files in the Chord network create a need for coordination to avoid lost updates and other concurrency problems. Since blocks of data are addressed by a score that depends on their content and a random number, a changed block will not overwrite any old data. Instead it is uploaded under a unique new score. The syncmessage on the other hand is always stored under the same key for one user. To avoid data loss in the syncmessage a compareand-swap operation was implemented. It only allows to overwrite data if the responsible Chord node receives a hash of the current content of the syncmessage. The Chord network receives encrypted data only, so it is a hash of the encrypted syncmessage. Therefore a client needs to calculate this hash when downloading a syncmessage and before decrypting it. If a client is denied an overwrite it will download the current syncmessage and add its local changes to that, unless the new information in the current syncmessage leads to a conflict. The compare-and-swap operation like all other reads and writes on the Chord network is realized as an atomic transaction. 6 Share Content A user can use Async to share files or folders with friends. 1 The selected files will be encrypted with a new randomly generated key. A new shared syncmessage will be stored in the Chord network under a hash of this key. A synchronization of the shared files will be performed besides the normal synchronization. A link can be created that allows the person invited to a shared content to skip entering a long key. Secure transmission of the secret key or link is left to the user, which 1 This feature has not been implemented, yet.
5 Async: Secure File Synchronization 5 bears certain risks. Another way to share is to enter the public key of another user while specifying which files to share. The shared key is then calculated by means of Diffie-Hellman key exchange. This way only the public keys need to be exchanged manually by the user. 7 Comparison Async has a lot of advantages over some popular synchronization services. This section compares Async to three other products regarding key features and security. A comparison of more supplementary features may favour other products that have been in development over a longer period of time. The three products chosen are BitTorrent Sync [3], Dropbox [4] and Wuala [5]. Table 1 on page 6 summarises the comparison and classifies the properties as good (green), ok (yellow) and bad (red). Reasons for the classification can be found in the description of the corresponding property. 7.1 Encryption Dropbox is the only one of the compared products that uses server side encryption. Client and server negotiate a key for encryption during transmission. Afterwards the Server decrypts the data and encrypts it again with a different key for storage. This enables employees of Dropbox Inc. to access the user s data. With client side encryption the data is encrypted on the client machine with the user s private key, which is not available to the provider of the cloud or software. 7.2 Open Source The source code of Async has not been published yet, but it will be as soon as the development status allows it. We believe that publishing the source code is the only way to make sure there are no hidden backdoors. BitTorrent Sync is not open source, but is based on the BitTorrent Protocol, which is open source and well documented. 7.3 Architecture Most services use a classical client server architecture. For Async a peer-topeer architecture was chosen for its better security. Peer-to-peer services are not dependent on any central server and therefore do not include a single point of attack. 7.4 Cloud Storage and Limit of Data Volume Some synchronization services do not offer any cloud storage, but synchronize directly between devices. As a result the user has to have one device that is always online. This does not correspond to average user behaviour. It does however allow
6 6 V. Schaaber, A. Schuette for synchronization of an unlimited amount of data, since the software vendor does not provide any storage and does not bear the costs for it. The indicated data limits for services with cloud storage equate to the amount a user gets for free and without any bonuses. 7.5 Conflict Resolution Most synchronizers notify the user if a conflict arises. BitTorrent Sync on the other hand does not. It resolves conflicts by choosing the newest version of a file as the correct one. The newest is defined as the one with the highest modification time. This can lead to old versions being overwritten without the user being informed. Old versions can however be recovered because BitTorrent Sync offers version control. 7.6 Multiple Paths Async offers the possibility to add any file or folder on a device to synchronization. Other services synchronize only one folder with an unlimited amount of files and subfolders. As a consequence users have to move all files they want to synchronize into this folder. With Async no moving of files is necessary. A user can simply add multiple paths to synchronization. This also allows a user to have one file in a folder synchronized, without affecting the other files in the same folder. Async BitTorrent Sync Dropbox Wuala encryption client side client side server side client side open source yes (planned) in parts no no architecture peer-to-peer peer-to-peer client-server client-server cloud storage yes no yes yes data limit n/a unlimited 2 Gb 0 Gb conflict resolution user newest user user multiple paths yes no no no Table 1. Comparison of file synchronizers 8 Conclusion In the present paper a secure file synchronizer that offers cloud storage in a peerto-peer network was presented. All data and meta data is transmitted encrypted and can only be decrypted with the user s private key, which is not available to the software or server provider. The decentralized architecture of the cloud does not offer a single point of attack because it is not dependant on any central server. The source code will be published soon in order to assure users that there are no hidden backdoors. Users do not need to operate a server or an always-online-device. The result is a usable and secure synchronizer.
7 Async: Secure File Synchronization 7 References 1. Seipel, L., Schuette, A.: Providing File Services using a Distributed Hash Table. In: Proceedings of the 11th International Conference on Interactive Systems, Ulyanovsk, Russia (2015) 2. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M. F., Dabek, F. and Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. In: IEEE/ACM Transactions on Networking 11 (2003), p BitTorrent Sync, BitTorrent Inc., 4. Dropbox, 5. Wuala, LaCie AG
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Chord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Decentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.
DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
Made Easy Windows Sync App Tutorial
Investor Storage Newsletter Made Easy Windows Sync App Tutorial The aim of this tutorial is simply to demonstrate how to set up Synchronization using the Storage Made Easy Sync App that is installed as
PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER
PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER 1. General This agreement / product description ("Product description") hereby states the terms and conditions for the services provided by Ipeer such
Colligo Contributor File Manager 4.6. User Guide
Colligo Contributor File Manager 4.6 User Guide Contents Colligo Contributor File Manager Introduction... 2 Benefits... 2 Features... 2 Platforms Supported... 2 Installing and Activating Contributor File
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Page 2 of 18 TABLE OF CONTENTS INTRODUCTION 3 Safe European Storage How does this really work? 3 3 GETTING STARTED 4 Setting up an account Setting up a company account
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
i>clicker integrate for Canvas v1.1 Instructor Guide
i>clicker integrate for Canvas v1.1 Instructor Guide July 2013 Table of Contents Overview... 3 Step 1: Copy your integrate Wizard Files... 4 Step 2: Configure your i>clicker Software... 5 Step 3: Create
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH. COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu 1 Abstract CHORD/DHash is a very useful algorithm for uploading data and
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
The most comprehensive review and comparison of cloud storage services
DriveHQ Dropbox The most comprehensive review and comparison of cloud storage services 2003-2013, Drive Headquarters, Inc. Table of Contents 1. Introduction... 4 2. Summary... 4 2.1 How did Dropbox become
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Optimization in a Secure Windows Environment
WHITE PAPER Optimization in a Secure Windows Environment A guide to the preparation, configuration and troubleshooting of Riverbed Steelhead appliances for Signed SMB and Encrypted MAPI September 2013
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt [email protected] Laurent Viennot INRIA Rocquencourt
Egnyte for Power and Standard Users. User Guide
Egnyte for Power and Standard Users User Guide Egnyte Inc. 1350 West Middlefield Road. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) Revised June 2015 Table of Contents Chapter 1: Getting
Cloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing
Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal ([email protected]) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer
Cloud Sync White Paper. Based on DSM 6.0
Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change
ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.
ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. Overview of ShareSync Easy, intuitive sharing and syncing ShareSync
Methods & Tools Peer-to-Peer Jakob Jenkov
Methods & Tools Peer-to-Peer Jakob Jenkov Peer-to-Peer (P2P) Definition(s) Potential Routing and Locating Proxy through firewalls and NAT Searching Security Pure P2P There is no central server or router.
ASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
Install Guide for Time Matters and Billing Matters 11.0
Install Guide for Time Matters and Billing Matters 11.0 Copyright and Trademark Notice LexisNexis, the Knowledge Burst logo, Lexis, lexis.com, Shepard's, Shepardize, martindale.com and Martindale-Hubbell
McAfee Advanced Threat Defense 3.6.0
Release Notes McAfee Advanced Threat Defense 3.6.0 Revision C Contents About this release New Features Enhancements Resolved issues Installation and upgrade notes Known issues Product documentation About
www.egnyte.com The Hybrid Cloud Advantage White Paper
www.egnyte.com The Hybrid Cloud Advantage White Paper www.egnyte.com 2012 by Egnyte Inc. All rights reserved. Revised June 21, 2012 Why Hybrid is the Enterprise Cloud of Tomorrow All but the smallest of
Help. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
Leonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
TestManager Administration Guide
TestManager Administration Guide RedRat Ltd July 2015 For TestManager Version 4.57-1 - Contents 1. Introduction... 3 2. TestManager Setup Overview... 3 3. TestManager Roles... 4 4. Connection to the TestManager
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Chief Architect X6. Download & Installation Instructions. Chief Architect, Inc. 6500 N. Mineral Dr. Coeur d Alene, Idaho 83815 www.chiefarchitect.
Chief Architect X6 Download & Installation Instructions Chief Architect, Inc. 6500 N. Mineral Dr. Coeur d Alene, Idaho 83815 www.chiefarchitect.com Contents Chapter 1: Installation What s Included with
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Stellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
IBM i Version 7.3. Security Digital Certificate Manager IBM
IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner
Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Voichiţa Almăşan and Iosif Ignat Technical University of Cluj-Napoca Computer Science
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Secret Server Installation Windows Server 2012
Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
SOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Subversion Integration for Visual Studio
Subversion Integration for Visual Studio VisualSVN Team VisualSVN: Subversion Integration for Visual Studio VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft
VPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
Calto: A Self Sufficient Presence System for Autonomous Networks
Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
What is Windows Intune? The Windows Intune Administrator Console. System Overview
What is Windows Intune? Windows Intune helps you manage and secure computers in your environment through a combination of Windows cloud services and upgrade licensing. Windows Intune delivers cloud-based
Welcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
CISC 275: Introduction to Software Engineering. Lab 5: Introduction to Revision Control with. Charlie Greenbacker University of Delaware Fall 2011
CISC 275: Introduction to Software Engineering Lab 5: Introduction to Revision Control with Charlie Greenbacker University of Delaware Fall 2011 Overview Revision Control Systems in general Subversion
12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise
WHITE PAPER 12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise Cloud storage companies invented a better way to manage information that allows files to be automatically synced
DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
Setting Up Dreamweaver for FTP and Site Management
518 442-3608 Setting Up Dreamweaver for FTP and Site Management This document explains how to set up Dreamweaver CS5.5 so that you can transfer your files to a hosting server. The information is applicable
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
Setting Up and Using the Funambol Outlook Plug-in v7
Setting Up and Using the Funambol Outlook Plug-in v7 Contents Introduction.......................................... 2 Requirements for Plug-In Use........................... 2 Installing the Funambol
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science [email protected]
IFS CLOUD UPLINK INSTALLATION GUIDE
IFS CLOUD UPLINK INSTALLATION GUIDE ABSTRACT This guide describes how to install IFS Cloud Uplink. UPLINK VERSION 4.13 PREPARE THE WEB SERVER THAT SERVES IFS EXTENDED SERVER Since the user credentials
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
Secure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate
ReadyNAS Replicate. User Manual. July 2013 202-10774-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual July 2013 202-10774-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the label
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
