Aims and Motivation The goal of this project is to produce a secure and dependable way of distributing and storing data securely over a distributed system.

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Abstract HyFS: A Highly Available Distributed File System Jianqiang Luo, Mochan Shrestha, Lihao Xu Department of Computer Science, Wayne State University.
SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), Mohammed Bakhtawar Ahmed.
Software Testing and Quality Attributes Software Testing Module ( ) Dr. Samer Hanna.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
E-Transactions: End-to-End Reliability for Three-Tier Architectures Svend Frølund and Rachid Guerraoui.
Improving Robustness in Distributed Systems Jeremy Russell Software Engineering Honours Project.
KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.
Hermes: A Distributed Event- Based Middleware Architecture Peter Pietzuch and Jean Bacon 1st DEBS Workshop, Vienna,
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Wireless Sensor Network Security Anuj Nagar CS 590.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Efficient Proactive Security for Sensitive Data Storage Arun Subbiah Douglas M. Blough School of ECE, Georgia Tech {arun,
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Team CMD Distributed Systems Team Report 2 1/17/07 C:\>members Corey Andalora Mike Adams Darren Stanley.
MAFTIA concepts Yves Deswarte & David Powell LAAS-CNRS, France SRI International.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Web Security Basharat Mahmood, Department of Computer Science,CIIT,Islamabad, Pakistan. 1.
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Database Design – Lecture 16
Dependable Web Service Compositions usng a Semantic Replication Scheme LABORATÓRIO DE SISTEMAS DISTRIBUÍDOS – LASID DEPARTAMENTO DE CIÊNCIA DA COMPUTAÇÃO.
SENSOR NETWORK SECURITY Group Members Pardeep Kumar Md. Iftekhar Salam Ahmed Galib Reza 1 Presented by: Iftekhar Salam 1.
Data Analysis using Java Mobile Agents Mark Dönszelmann, Information, Process and Technology Group, IT, CERN ATLAS Software Workshop Analysis Tools Meeting,
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
ACM 511 Introduction to Computer Networks. Computer Networks.
Practical Byzantine Fault Tolerance
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Presented by: Sanketh Beerabbi University of Central Florida.
Survey of Adding Fault Tolerance to Service Oriented Architecture Ingrid Buckley 03/26/09.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Agile Survivable Store PIs: Mustaque Ahamad, Douglas M. Blough, Wenke Lee and H.Venkateswaran PhD Students: Prahlad Fogla, Lei Kong, Subbu Lakshmanan,
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Software Testing Definition Software Testing Module ( ) Dr. Samer Odeh Hanna.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
MAFTIA’s Interpretation of the IFIP 10.4 Terminology Yves Deswarte LAAS-CNRS Toulouse, France David Powell.
IEEE P Architecture Subcommittee Model Update and Discussion November 1, 2007.
Peer to Peer Network Design Discovery and Routing algorithms
1 VLDB - Data Management in Grids B. Del-Fabbro, D. Laiymani, J.M. Nicod and L. Philippe Laboratoire d’Informatique de l’Université de Franche-Comté Séoul,
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Seminar On Rain Technology
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
SEMINAR TOPIC ON “RAIN TECHNOLOGY”
“Designing Masking Fault Tolerance via Nonmasking Fault Tolerance“ Oğuzhan YILDIRIM – Erkin GÜVEL Boğaziçi University Computer Engineering Department
Intrusion Tolerant Architectures
Data Management on Opportunistic Grids
Sindhusha Doddapaneni
Chapter 19: Distributed Databases
Secure Electronic Transaction (SET) University of Windsor
The Secure Sockets Layer (SSL) Protocol
Install AD Certificate Services
Mehrdad Moradi Oct. 22, 2018 MSDL Research day
Presentation transcript:

Aims and Motivation The goal of this project is to produce a secure and dependable way of distributing and storing data securely over a distributed system while also being able to tolerate faults within the system. Faults should not affect the ability of the system to recover information previously distributed. Dependability of the system is based on the ability to avoid service failures that are more frequent and more severe than is acceptable to the operation of the system. Security is a composite of the attributes of confidentiality, integrity and availability [1]. Methods The distributed system contains both client and storage nodes while employing: a) Cryptographic hash functions or digests, like MD5 and SHA-1,are used in: the “unique” naming of fragments fragment data integrity checking b) Symmetric block-cipher algorithms, like Advanced Encryption Standard (AES) and Digital Encryption Standard (DES), to encrypt the raw data to be fragmented; c) Fragmentation Redundancy and Scattering (FRS) technique is used for distributing fragments redundantly within the system, improving the reliability and availability of the system. Computing Laboratory Implementation The Aglet System was used to implement and simulate the prototype FRS system. Aglets are the Java software instantiation of an agent. Each Aglet is a persistent object, that lives and interacts within the Aglet system and can travel to other Aglet systems, storing state and processing information until actively disposed of. A Message object infrastructure facilitates a multicasting service communication between aglets. Client Aglets requested services from Servers for the storage and retrieval of fragments. Server storage nodes stored the fragments. Results Preliminary results produced suggest that a large number of fragments created from the fragmentation of a large data source could overload or overwhelm the system. More results need to be produced to make a valid comment on how to change the present system to meet the requirements. Conclusion The system produced proposes the framework for a possible FRS-based distributed storage system. Dependability is ensured through the redundancy of fragments stored within the system. Security is achieved through the encryption, random scattering and random retrieval of fragments. The cost of the system is, however, the large communication overhead relating to the scattering and retrieval of fragments. Future Work Future work will aim mainly at tackling problems such as adding fault to the system and schemes for optimising the system. References 1.Avizienis, A., Laprie, J., Randell, B., Landwehr, C. (2004). "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol. 01, no. 1, pp , January-March, Y. Deswarte, L. Blain, J.-C. Fabre. “Intrusion Tolerance in Distributed Computing Systems”. Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California, USA. May pp R. Ball, V. Spurrett, R. de Lemos. “Dependable and Secure Storage for Multi-Agent Systems”. 5th International Workshop of Software Engineering for Large-scale Multi-Agent Systems (SELMAS). Shanghai, China. Submission February Tolerating Faults in a Distributed Storage System Rudi Ball, Computing Laboratory – University of Kent, UK Further Details Rudi Ball