Today's forecast: cloudy with some rain Towards secure & reliable Cloud Computing
|
|
- Darren Sanders
- 5 years ago
- Views:
Transcription
1 Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Today's forecast: cloudy with some rain Towards secure & reliable Cloud Computing Dr.-Ing. Stephan Groß DESY Computing Seminar Hamburg, 16 January 2012
2 Faculty of Computer Science Chair for Computer Networks 26 professors 2300 students 9 post-docs 31 total staff and PhD candidates #2
3 Research Topics Applications Peer-to-Peer Internet Devices Access Technologies Large-Scale Computing #3
4 Flexible Service Architectures for Cloud Computing Mobile and Ubiquitous Computing Internet Information Retrieval Real-Time Collaboration Energy Lab Network Planing and Security Service & Cloud Computing EU-funded research group: 10/2010 9/2013 Dr.-Ing. Josef Spillner Dipl.-Medieninf. Marc Mosch Dr.-Ing. Stephan Groß Dipl.-Medieninf. Yvonne Thoß Dr.-Ing. Anja Strunk Exploring Cyber Physical Systems #4
5 Outline Cloud Computing What is it all about? Problems? π-box: Building your personal secure cloud Secure Cloud Storage Conclusion & Future Work #5
6 The shape of a cloud is in the eye of the beholder. #6
7 Definition Cloud Computing is On-demand self service Rapid elasticity the on-demand and pay-per-use application of virtualised IT services over the Internet. Broadband network access Measured service Resource pooling Adopted from the NIST Definition of Cloud Computing [MeGr2011] #7
8 What is it all about? Problems? π-box: Building your personal secure cloud Secure Cloud Storage Conclusion & Future Work #8
9 FlexCloud Objectives Unified Cloud Prevent Vendor-Lock-in + Integration of existing IT Secure Cloud Ensure data privacy and security Managed Cloud Keep the user in command Efficient Cloud Adapt to user preferences and cloud's vital signs #9
10 FlexCloud research topics Cloud Adaption and Optimization Strategies for the compensation of SLA violations Strategies for minimisation of energy consumption Mechanisms for the visualisation of comples Cloud Monitoring data Cloud Surveillance and Incident Detection Specification of monitoring targets and SLA violations Models for the proactive recognition of SLA violations and the evaluation of Cloud s energy efficiency Mechanisms for reliable distributed Monitoring Fine-grained Service Level Agreements Methods to determine fine-grained nonfunctional properties of Cloud Services Identification of assets and corresponding requirements Deduction of monitoring targets from SLAs Dynamic Provider Selection and Cloud Setup Flexible distribution mechanisms for Cloud Platforms Strategies for the performance optimization of Cloud Applications Reputation consideration to improve reliability and trustworthiness # 10
11 What is it all about? Problems? π -Box: Building your personal secure cloud Secure Cloud Storage Conclusion & Future Work # 11
12 FlexCloud's approach Subsume all end devices within a Personal Secure Cloud (π-cloud) controlled by the π-box. π-cloud π-box # 12
13 FlexCloud's approach π-box distinguishes between public and sensitive data and enforces security mechanisms for the later. π-cloud π-box # 13
14 Transparent encryption Analysis of structured, unstructured data and context information π-cloud PKI PKI?? # 14
15 Building a cloud of clouds by connecting several π-clouds. Propagation of data and services within one π-cloud and to others. π-cloud π-box # 15
16 π-box architecture User Interface / GUI Service execution wrt. to security and other non-functional requirements. Virtualisation Service Service Controller Controller Data Data Controller Controller Data storage & distribution wrt. to security and other non-functional requirements. Infrastructure management Resource ResourceManager Manager Peer2Peer Network private resources (trustworthy) public resources (not necessarily trustworthy) # 16
17 π-box deployment models π-box # 17
18 What is it all about? Problems? π-box: Building your personal secure cloud Secure Cloud Storage Conclusion & Future Work # 18
19 Increasing availability: From RAID to RAIC RAIC: Redundant Array of Independent Clouds RAID: Redundant Array of Independent Disks # 19
20 Secure Cloud Storage Integrator for Enterprises (SecCSIE) System Architecture [SGS11] # 20
21 Uploading files (1/5) # 21
22 Shared Folder Technology: FUSE (Filesystem in Userspace) CIFS/SMB network share on proxy file server Unified user interface for arbitrary cloud storage services Utilizing CIFS access control mechanisms # 22
23 Uploading files (2/5) # 23
24 File dispersion k n E.g. k=6, n=8 Ensure availability despite of unreliable cloud storage provides. # 24
25 Secret Sharing aka Threshold schemes Objective: Divide a secret s2s in n pieces s1,,sn with 1. Knowledge of any k or more si pieces makes s easily computable. 2. Knowledge of any k-1 or fewer si pieces leave s completely undetermined (in the sense that all its possible values are equally likely). Sharing Input: s Dealer Share holders s1 Share holders store Reconstruction s1 s2 s2 si1 sn si2 sik Reconstructor sn Output: s* # 25
26 Secret Sharing: An informal example [Source: Visual Cryptography [NaSh1994] # 26
27 Secret Sharing: More formalism e r u c e! s ic ent t e ci r o ffi e th e e n c o a i t sp a Shamir's scheme m ot r Idea: It takes k points n a polynomial of degree k-1. o to define f t Sharing: Be a :=s2s In where bus is an infinite field. Source: Wikipedia Blakley's scheme [Blakley1979] Idea: Any n nonparallel n-dimensional hyper-planes intersect at a specific point. Sharing: Encode the secret as any single coordinate of the point of intersection. Recovering: 1. Calculating the planes' point of intersection. 2. Take a specified coordinate of that intersection. [Shamir1979] 0 Randomly choose (k-1) coefficients a1,a2, ak-12s to build f(x):=æaiáxi. Calculate shares sj:=[j,f(j)] mit j2ℕn. Recovering: Use Lagrange interpolation to find coefficients of the polynomial including constant term a0. # 27
28 Information Dispersal: Computationally secure secret sharing Rabin's scheme [Rabin1989] Be ai:=s2s where i=1, k. Rest as with Shamir's secret sharing. With a polynomial and shares of the same size as before, we can now share a value k times as long as before. Length of each share is only 1/k-th of the length of the secret, and if k shares must be sufficient for reconstruction, one can obviously not get shorter. Space optimal However, one might gain some information if he gets access to several shares Computationally secure More efficient codes: Need to be maximum distance separable to use k arbitrary shares for reconstruction Examples: Cauchy-Reed-Solomon, Liberation, Blaum-Roth [PSS2008] # 28
29 Uploading files (3/5) # 29
30 Cryptography: Confidentiality & Integrity AES-CBC + SHA256 AES-CBC + SHA256 AES-CBC + SHA256 AES-CBC + SHA256 # 30
31 Uploading files (4/5) # 31
32 Uploading files (5/5) Met a dat a # 32
33 Downloading files (1/3) X X # 33
34 Downloading files (2/3) X X # 34
35 Downloading files (3/3) Met a X dat a X # 35
36 Prototype implementations SecCSIE: [SGS11] NubiSave:[SBM+11] # 36
37 Cloud Computing What is it all about? Problems? π-box: Building your personal secure cloud Secure Cloud Storage Conclusion & Future Work # 37
38 Results so far & Future work Integration of existing cloud storage services (Cloud-of-Clouds) Proxy server for transparent mediation easy to use for end-user common scheme for enterprises High security and data sovereignty for the user Good performance but space for improvement Collaboration scenarios, file sharing, access by external entities Securing the meta data database Automatic classification of data Improving performance, e.g. scheduling algorithms, Caching/Prefetching, parallelisation Data store for database system # 38
39 Tomorrow's forecast: still cloudy with sunny spots Contact: # 39
40 References & Credits References [Blakley1979] G. R. Blakley: Safeguarding cryptographic keys; AFIPS Conference Proceedings Vol. 48, National Computer Conference (NCC) 1979, [MeGr2011] P. Mell and T. Grace: The NIST Definition of Cloud Computing. NIST Special Publication , September [NaSh1994] M. Naor and A. Shamir, Visual Cryptography, Eurocrypt 94. [PSS2008] J. S. Plank, S. Simmerman, C. D. Schuman: Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications Version 1.2. Technical Report CS , University of Tennessee, [Rabin1989] M. O. Rabin: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance; Journal of the ACM 36/2 (1989) [SBM+2011] J. Spillner, G. Bombach, S. Matthischke, R. Tzschicholz, and A. Schill: Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users. In: IEEE International Conference on Utility and Cloud Computing. Melbourne, Australien, December [SGS2011] R. Seiger, S. Groß, and A. Schill: A Secure Cloud Storage Integrator for Enterprises. In: International Workshop on Clouds for Enterprises. Luxemburg, September [Shamir1979] A. Shamir: How to Share a Secret; Communications of the ACM 22/11 (1979) Credits Kudos to Ronny Seiger and Josef Spillner, both for providing slides and contributing to the research work. Furthermore, I would like to thank Marc Mosch for the best styled graphics. # 40
Attribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationFast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. Tianli Zhou & Chao Tian Texas A&M University
Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques Tianli Zhou & Chao Tian Texas A&M University 2 Contents Motivation Background and Review Evaluating Individual
More informationSharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
More informationSecret Image Sharing Scheme Based on a Boolean Operation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based
More informationPersonal Information in Strategic Data Sharing and Communication Protocols
Personal Information in Strategic Data Sharing and Communication Protocols Lidia Ogiela and Marek R. Ogiela Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology,
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationSecurityFirst DataKeep
A Report on the Technical and Usability Advantages of SecurityFirst DataKeep 2017 September 23 Prepared by Avi Rubin, Ph.D. and Paul D. Martin, Ph.D. Page 2 Table of Contents I. Introduction... 3 II. Security
More informationComputing as a Service
Cloud Computing? Dipl. Ing. Abdelnasser Abdelhadi Islamic University Gaza Department of Computer Engineering April 2010 Computing as a Service Business Processes Collaboration Industry Applications Software
More informationForensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationECFS: A decentralized, distributed and faulttolerant FUSE filesystem for the LHCb online farm
Journal of Physics: Conference Series OPEN ACCESS ECFS: A decentralized, distributed and faulttolerant FUSE filesystem for the LHCb online farm To cite this article: Tomasz Rybczynski et al 2014 J. Phys.:
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationSecret Sharing. See: Shamir, How to Share a Secret, CACM, Vol. 22, No. 11, November 1979, pp c Eli Biham - June 2, Secret Sharing
Secret Sharing See: Shamir, How to Share a Secret, CACM, Vol. 22, No. 11, November 1979, pp. 612 613 c Eli Biham - June 2, 2011 464 Secret Sharing How to Keep a Secret Key Securely Information can be secured
More informationData Store and Multi-Keyword Search on Encrypted Cloud Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationPeer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Cryptography in a Nutshelf Symmetric Cryptography - AES - Affine Cryptosystems
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationSecure Distributed Storage System
1 Secure Distributed Storage System Snehil Suresh Wakchaure, Simrit Kaur Arora Abstract Secure Distributed Storage techniques are gaining importance with the increase of data centers, mobile devices and
More informationDEEP DIVE INTO CLOUD COMPUTING
International Journal of Research in Engineering, Technology and Science, Volume VI, Special Issue, July 2016 www.ijrets.com, editor@ijrets.com, ISSN 2454-1915 DEEP DIVE INTO CLOUD COMPUTING Ranvir Gorai
More informationDATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS
DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationCloud Computing introduction
Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica
More informationOnline data storage service strategy for the CERN computer Centre G. Cancio, D. Duellmann, M. Lamanna, A. Pace CERN, Geneva, Switzerland
Online data storage service strategy for the CERN computer Centre G. Cancio, D. Duellmann, M. Lamanna, A. Pace CERN, Geneva, Switzerland Abstract. The Data and Storage Services group at CERN is conducting
More informationZero private information leak using multi-level security and privileged access for designated authorities on demand
Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of
More informationLecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena
Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson Course Admin HW/Lab 3
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationVblock Architecture Accelerating Deployment of the Private Cloud
Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product
More informationThreshold Paillier and Naccache-Stern Cryptosystems Based on Asmuth-Bloom Secret Sharing
Threshold Paillier and Naccache-Stern Cryptosystems Based on Asmuth-Bloom Secret Sharing Kamer Kaya 1, Baha Güçlü Dündar 2, Said Kalkan 1, and Ali Aydın Selçuk 1 1 Department of Computer Engineering Bilkent
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More informationProviding File Services using a Distributed Hash Table
Providing File Services using a Distributed Hash Table Lars Seipel, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany lars.seipel@stud.h-da.de
More informationManagement of Symmetric Cryptographic Keys in Cloud Based Environment
Management of Symmetric Cryptographic Keys in Cloud Based Environment Faiza Fakhar*, Muhammad Awais Shibli *School of Electrical Engineering & Computer Science, National University of Science & Technology,
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationA New Group-based Secret Function Sharing with Variate Threshold
Int'l Conf. Security and Management SAM'16 313 A New Group-based Secret Function Sharing with Variate Threshold Anneke Soraya Hidayat, Dae-Soo Kim, Eun-Jun Yoon and Kee-Young Yoo School of Computer Science
More informationIMPROVING SECURITY AND EFFICIENCY OF ENTERPRISE DIGITAL RIGHTS MANAGEMENT
Helwan University From the SelectedWorks of Maged Ibrahim July, 2015 IMPROVING SECURITY AND EFFICIENCY OF ENTERPRISE DIGITAL RIGHTS MANAGEMENT Ahmed Soliman Maged Ibrahim, Helwan University Adel El-Hennawy
More informationHow can the Future Internet
How can the Future Internet enable Smart Energy? Presented by Werner Mohr (Coordinator), Nokia Siemens Networks on behalf of the FINSENY project Smart Energy enabled by Future Internet Workshop FINSENY
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationWindows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.
Windows Server 2012 20412: Configuring Advanced Windows Server 2012 Services R2 Gain the skills and knowledge necessary to perform advanced management and provisioning of services within Windows Server
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationErasure coding and AONT algorithm selection for Secure Distributed Storage. Alem Abreha Sowmya Shetty
Erasure coding and AONT algorithm selection for Secure Distributed Storage Alem Abreha Sowmya Shetty Secure Distributed Storage AONT(All-Or-Nothing Transform) unkeyed transformation φ mapping a sequence
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationSIP-Based Multimedia Services Provision in Ad Hoc Networks
SIP-Based Multimedia Services Provision in Ad Hoc Networks Y. Rebahi, D. Sisalem, U. Depirianto Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 31 10589 Berlin, Germany {rebahi, sisalem, depirianto}@fokus.fraunhofer.de
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationPrivacy Preserving Data Mining Technique and Their Implementation
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 4, Issue 2, 2017, PP 14-19 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0402003
More informationSecure Multi-Party Computation of Probabilistic Threat Propagation
Secure Multi-Party Computation of Probabilistic Threat Propagation Emily Shen Nabil Schear, Ellen Vitercik, Arkady Yerukhimovich Graph Exploitation Symposium 216 DISTRIBUTION STATEMENT A. Approved for
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationWhere are you with your Cloud or Clouds? Simon Kaye Dr Cloud
Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud 15 th September, 2011 2 3 Cloud Computing definitions are varying, but a common set of attributes can be identified 4 Organizations need to
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationNon-uniform memory access machine or (NUMA) is a system where the memory access time to any region of memory is not the same for all processors.
CS 320 Ch. 17 Parallel Processing Multiple Processor Organization The author makes the statement: "Processors execute programs by executing machine instructions in a sequence one at a time." He also says
More informationSEEM3450 Engineering Innovation and Entrepreneurship
SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast
21 ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards
More informationA Self-healing Key Distribution Scheme with Novel Properties
International Journal of Network Security, Vol7, No1, PP114 119, July 2008 114 A Self-healing Key Distribution Scheme with Novel Properties Biming Tian and Mingxing He (Corresponding author: Biming Tian)
More informationBiomedical Security. Some Security News 10/5/2018. Erwin M. Bakker
Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationSoftware-defined Storage: Fast, Safe and Efficient
Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about
More informationA Cryptographic Analysis of Google s Cloud Service. Cody Jenkins Krystal Carlton ECE 646 Fall 2013
A Cryptographic Analysis of Google s Cloud Service Cody Jenkins Krystal Carlton ECE 646 Fall 2013 Cloud CompuKng Threats Google Storage Google Key Management Google Access Control Conclusions OUTLINE 2
More informationEPC Tag Authentication with Randomized Characteristics for Strong Privacy
182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.9B, September 2006 EPC Tag Authentication with Randomized Characteristics for Strong Privacy Soohyun Oh, and Jin Kwak,
More informationGeneva, 6-7 December 2010 Addressing security challenges on a global scale
Geneva, 6-7 December 2010 Addressing security challenges on a global scale 1 Privacy & security issues for cloud computing services Heung Youl YOUM, PhD Vice-chair, ITU-T SG 17 Soonchunhyang University,
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid
More informationMULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY
ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology
More information(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
Wireless Pers Commun DOI 10.1007/s11277-016-3862-z (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial Lein Harn 1 Ching-Fang Hsu 1,2 Springer Science+Business Media New York 2016 Abstract
More informationKeep your fingers off my keys today & tomorrow
SIGS SE February 2017 Keep your fingers off my keys today & tomorrow Marcel Dasen VP Engineering Securosys SA Keys? Encryption keys asymmetric e.g. RSA, ECC public/private key pairs for wrapping symmetric
More informationCompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]
s@lm@n CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] Topic break down Topic No. of Questions Topic 1: Volume A 117 Topic 2: Volume B 122 Topic
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust
More informationAdministering Windows Server 2012
Administering Windows Server 2012 20411D; 5 days, Instructor-led Course Description Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day
More informationVisual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.07-14 Visual Cryptography Scheme with Authentication Using
More informationSignature schemes variations
Signature schemes variations Multisignatures: several signers create a signature on a single message, that is shorter and faster to verify than when a standard signature scheme is used in a straightforward
More informationConfiguring and Troubleshooting a Windows Server 2008 Network Infrastructure
Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course 6421B; 5 Days, Instructor-led Course Description: This five-day instructor-led course provides students with the knowledge
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationEfficient integrity checking technique for securing client data in cloud computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationIntroduction and Datacenter Topology For Your System
Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,
More information2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationTowards User Centric Data Governance and Control in the Cloud
Towards User Centric Data Governance and Control in the Cloud Stephan Groß, Alexander Schill To cite this version: Stephan Groß, Alexander Schill. Towards User Centric Data Governance and Control in the
More informationInternet Governance and the World Summit on the Information Society (WSIS)
Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationConfiguring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure
Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure Course No. 6421B 5 Days Instructor-led, Hands-on Introduction This five-day instructor-led co urse provides students with the
More informationMOC Configuring Advanced Windows Server 2012 Services
Windows Server Course - 20412 MOC 20412 - Configuring Advanced Windows Server 2012 Services Length 5 days Prerequisites Before attending this course, students must have: Experience working with Windows
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationSecret Sharing With Trusted Third Parties Using Piggy Bank Protocol
Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Adnan Memon Abstract This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security
More informationGroup Authentication Using The Naccache-Stern Public-Key Cryptosystem
Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationTech Talk #11. Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11
Tech Talk #11 Public Cloud UNIVERSITY OF COLORADO AT BOULDER 12/14/16 CU TECH TALK #11 Who is this idiot speaking? Orrie Gartner Deputy Director of Operations Where is the Tech in this Tech Talk? For those
More informationHigh-Availability Practice of ZTE Cloud-Based Core Network
High-Availability Practice of ZTE Cloud-Based Core Network The Network Function Virtualization (NFV) technology provides telecommunications software functions on the universal COTS servers, for example,
More informationCIS : Computational Reproducibility
CIS 602-01: Computational Reproducibility Containers Dr. David Koop Virtual Machines Software Abstraction - Behaves like hardware - Encapsulates all OS and application state Virtualization Layer - Extra
More informationGoogle Cloud Whitepaper September Data deletion on Google Cloud Platform
Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion
More informationService Oriented Architectures (ENCS 691K Chapter 2)
Service Oriented Architectures (ENCS 691K Chapter 2) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud
More informationAutomate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds
EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationSecret Sharing in Audio Steganography
Secret Sharing in Audio Steganography Ka Fai Peter Chan Defence, Peace, Safety & Security (DPSS) Council for Scientific and Industrial Research Pretoria, South Africa kchan@csir.co.za Abstract This paper
More informationAccess Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions
Access Governance in a Cloudy Environment Nabeel Nizar VP Worldwide Solutions Engineering @nabeelnizar Nabeel.Nizar@saviynt.com How do I manage multiple cloud instances from a single place? Is my sensitive
More informationA Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme G. Lakshmeeswari *, D. Rajya Lakshmi, Y. Srinivas, and G. Hima Bindu GIT, GITAM University, Visakhapatnam, Andhra Pradesh {lak_pr,rdavuluri}@yahoo.com,
More informationDesign and Performance Evaluation of Boolean based Secret Image Sharing Scheme
Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme Javvaji V.K. Ratnam 1, T. Sreenivasulu Reddy 2 and P. Ramana Reddy 3 1 Research Scholar, Faculty of Electronics and Communication
More information