3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi ABDUL-MOHSIN AL-FARAJ (201081340) Hamed Al-Mehdhar (200925210)

Slides:



Advertisements
Similar presentations
TO A USB DEVICE. DATA CAN BE LOST DUE TO POWER SURGES MANUFACTURING DEFECTS HURRICANES/LIGHTENING STRIKES.
Advertisements

DE2-115 Control Panel - Part I
Manual Software Upgrade Guide ◆ Notice 1. Use the full model name of TV when manually downloading software updates. Ex) 47LX9500-UA : The Full model name.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi Abdul-Mohsin AL-Faraj ( ) Hamed Al-Mehdhar ( )
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
VME2000 USB Token. The USB Token is a hardware device that plugs into a USB port (or a USB cable) on a laptop or PC. It can be used instead of a pass.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Team Wolf Distributed, Consistent and Secure USB Hub Sean Busch Matt Dube Eddie Lai Zhou Zheng.
Team Wolf Distributed, Consistent and Secure USB Storage Final Project Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Intro Test 2 – Chapters 3,4 & Word Sample Questions SPRING 2005.
HiberSnail Portable home directory with environment retrieval.
Team Wolf Distributed, Consistent and Secure USB Storage Midyear Design Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Team Wolf Distributed, Consistent and Secure USB Storage Comprehensive Design Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Using the USB Mass Storage Device Presented by Frank H. Osborne, Ph. D. © 2006 Bio 2900 Computer Applications in Biology.
USB Mass-Storage Implementation on an Embedded System (D0113) Supervisor: Dimitry Sokolik Performed by: Yoav Gershoni Shachar Faigenblat Final Presentation.
SM3121 Software Technology Mark Green School of Creative Media.
This is a Flash Drive. It is also known as a: Key Drive, Thumb Drive, Jump Drive, USB Drive, Pen Drive.
Transferring Data from XL-30 PC to Dell PC Using Link Maven.
Networking Components Chad Benedict – LTEC
Linux Basics. What is an Operating System (OS)? An Operating System (OS) is an interface between hardware and user which is responsible for the management.
One World Technology DIY Flash Array System Provides Using High Capacity Flash Storage At USB 3.0 Speed Availability, Expandability,
New Data Regulation Law 201 CMR TJX Video.
Managing Local and Network Printer Chapter 11 powered by dj.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Internal components, Backing Storage, Operating Systems Software
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
About Safend ► Venture capital backed by: ► Experienced management team ► Top talent researchers and security experts ► Customers in the forefront of security.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Introduction Purpose This course describes the process of installing the KPIT GNU toolchain on your PC. Objective Learn how easy it is to get information.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
CHAPTER FOUR COMPUTER SOFTWARE.
Introduction Characteristics of USB System Model What needs to be done Platform Issues Conceptual Issues Timeline USB Monitoring 2 nd Update – 7 th February.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
1.9 Production Wizard The Lumio Production Wizard is a suite including three applications, providing the following features: Creation of a set of configuration.
Team: Justin Audley, Blake Brown, Christopher Dean, Andrew Russell, Andrew Saunders Advisor: Dr. Richard A. Messner Sponsors: Dr. Richard A. Messner, UNH.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
CIS111 PC Literacy Understanding File Management Understanding File Management.
Saving Computer Files to a USB Flash Drive By Karen Dietz Grann.
Accuracy In Your Back Pocket Mid-Semester Presentation March 26, 2015.
Networking  Networking is of linking two or more computing devices together for the purpose of sharing data.
Computer main parts HARDWARE It corresponds to all physical and tangible parts of a computer: your electrical, electronic, electromechanical and mechanical.
Team 2: Bluetooth Mass Storage Device By Yuri Kubo Theory of Operation 1 Yucel ParsakYuri Kubo Scott PillowRyan Weaver.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Presented By Amarjit Datta
Start with loading the picture Locate your camera’s USB cable –it looks something like this:
Now what? 1.  I have short-listed projects I am interested in  I know the types of projects I would like to pursue  I have an idea of the resources.
Simoo Sipili Ionatana Sipili Anthony Mickens Lizardo Buleje 3/19/2012 Design an electronic system to track the distance of an object using Bluetooth.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Computer Basics Just How Does a Computer Work?. A computer is made up of many parts. Let’s explore the parts to see if you know what they are called!
OFL2Go Utility to copy OTDR trace files from an OFL250 or OFL280 to a PC, with fiber folders removed. Quick Reference Guide.
Implementation Method Linux-USB Gadget Framework –The Linux-USB Gadget Framework makes it easy for peripherals and other devices embedding GNU/Linux system.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
Dr. Kyung Eun Park Summer 2017
Chapter 3 Installing and Learning Software
Cyber Security Awareness Workshop
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Outline Overview Development Tools
A mobile single sign-on system
Interaction of Hardware
PREPARED BY: RIDDHI PATEL (09CE085)
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Arduino म्हणजे काय?.
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi ABDUL-MOHSIN AL-FARAJ ( ) Hamed Al-Mehdhar ( )

Outline Why do we need 3WSDS? Why do we need 3WSDS? What is 3WSDS? What is 3WSDS? Project Specifications: User requirements. Technical specifications. Proposed design so far. Completed Tasks. Tasks to do.

Why do we need 3WSDS? Nowadays everyone has secrets that need to be saved securely where they can’t be exposed. Encrypting secrets will secure them using a key, if known then the secret can be known too. What if three people want to share a secret in the sense that no one of them alone can determine the secret with a probability better than guessing?

What is 3WSDS? 3WSDS is based on (2 out of 3) secret sharing scheme. (2 out of 3) secret sharing scheme drives from the fact that two points determine a line. The secret!

Project Specifications: User requirements: 1- Device connects to PC through USB port USB ports to connect the flash drives. 3- The device appears on the PC as a single flash drive. 4- When a file is transferred to the device, 3 different secret shares are constructed and distributed among 3 connected flash drives (following a 2 out of 3 secret share scheme). 5- Secret shares will automatically be taken from each flash and the original file will be constructed and viewed in the PC. 6- Only the secret shared files are viewed by the PC when the device is connected.

Project Specifications: Technical specifications: 1- The device connects to the PC (USB host) and act as a USB device. 2-we need 3 different USB ports which are used to connect the flash drives to the device. 3- the device should interact with the PC as if it is a single flash drive. 4- the size of the flash drive seen by the PC as the minimum available size in the 3 different flash drives. 5- the device should detect the availability of secret shares in the connected flash drives and construct the original file using the embedded microcontroller. 6- When a file is copied to the device, 3 different secret shares are created and copied to the attached flash drives. 7- When the pc asks for the available files in the device, the device will respond with information about the secret shared files only.

Proposed design so far. What we have decided on: chose to design the device using Arduino mega microcontroller chose to use USB host shields to connect between the microcontroller and the 3 flash drives Currently working on communication between pc and microcontroller (how can the microcontroller act as a flash drive when viewed by the PC)

Completed Tasks. we did a literature survey about USB and USB hubs to understand how they work. We did some research to decide on a design whether using microcontrollers or FPGA. Research on how to communicate with flash drives through USB ports using an Arduino microcontroller and USB host shields.

To do. We need to do some research on how to communicate with the PC (USB Host) using the device and make it act as a flash drive. (in progress) Write the code to establish successful communication with the PC and the flash drives (USB shields). Write the code for the device to perform the right functionality and to meet all requirements. Testing and debugging.

Questions?