SlideShare a Scribd company logo
1 of 13
Presented By-LIPSA PANIGRAHI
Roll No.-10CS08
Introduction
Security Background
 Commonly used Encryption Algorithms
 Traditional modes of operation
Confidential Data storage
 Software based Confidential Data Storage
 Hardware based Confidential Data Storage
Deletion
Conclusion
What is the need of storing the data in a confidential manner?
Cost of electronic storage declines rapidly.
 Theft of electronic storage occurred much more frequently.
Sensitive information stored in an insecure manner is vulnerable
to theft.
 Two major components exist to safeguard the privacy of data on
electronic storage media :
Data must be stored in a confidential manner to prevent
unauthorized access.
At the time of disposal, confidential data must be removed from
the storage media
The general concept of secure handling of data is composed of
three aspects:
Confidentiality- involves ensuring that information is not read by
unauthorized persons.
Using encryption- to store data or authenticating valid users are
example means by which confidentiality is achieved.
Integrity- ensures that the information is not altered by
unauthorized persons . To verify- Combine a message authentication
code with sensitive data. Many techniques of confidential storage
and deletion involve cryptography:
 Commonly Used Encryption Algorithms
 Traditional Modes of Operation
Encryption -used in cryptography “to scramble information so
that only someone knowing the appropriate secret can obtain the
original information (through decryption)”.
The secret is often a key of n random bits of zeros and ones.
Common symmetric key encryption algorithms : the Data
Encryption Standard (DES), Triple-DES (3DES), and the Advanced
Encryption Standard (AES).
 DES-a key size of 56 bits and a block size of 64 bits.Criticism-56-bit key
length is too short. With newer CPUs, the key space of 256 can be
enumerated.
3DES-built to enlarge the DES key space. Criticism-the key space to 2168,
but the strength of 3DES is only twice as strong as DES.
AES-block length of 128 bits and supports key lengths of 128, 192, and 256
bits.
Electronic Codebook(ECB)- is the simplest mode of operation, and does not
use an IV(initialization vector) .With a key, Pi as the ith block of plaintext, and Ci as
the ith block of cipher text, the encryption is performed as Ci = Ekey (Pi), and
decryption is performed as Pi = Dkey (Ci).


                              cipher-block-chaining (CBC)




Cipher-Block-Chaining (CBC)-slightly more complicated and uses an IV,
Encryption of the first block of plaintext is performed as C1 =Ekey (P1 Å IV), where
C1 is the 1st block of cipher text; IV is the random, non-secret initialization vector;
and P1 is the 1st block of plaintext. Subsequent blocks of plaintext are encrypted as
Ci = Ekey (Pi Å Ci-1). In the same manner, the first block of cipher text is decrypted
as P1 = Dkey (C1) Å IV, and the subsequent blocks of cipher text are decrypted as
Pi = Dkey (Ci) Å Ci-1.                                                   Contd…
Mode of     Encryption Performance                  Decryption performance
operation
ECB         Good: ECB do not depend on              Good: ECB do not depend on previous
            previous blocks. Multiple blocks        blocks. Multiple blocks can be encrypted
            can be encrypted and decrypted in       and decrypted in parallel.
            parallel

CBC         Poor: CBC ciphertext equires the        Good: CFB and CBC decryption of one block
            previous ciphertext block as input.     requires only one previous ciphertext block
            In the case of updates,CBC require      as input. Multiple blocks can be decrypted
            re-encrypting the remainder of a        in parallel.
            file, since all subsequent ciphertext
            blocks depend on the current
            ciphertext block. Thus, encryption
            is not parallized.
Confidential storage methods are difficult to implement for
reasons including complexity of method setup, difficulty of
conversion of prior methods to new secure methods, training, key
management, and password.

 Here it shows the storage path
 for UNIX –based and WINDOWS
 operating system.
 Both UNIX and WINDOWS
 share one-to-one mapping.
Requires no hardware.
Each solution has its strengths and limitations with regard to level
of confidentiality, ease-of-use, performance and the flexibility to
set policies. Example of Software based confidential data storage is :
Generalized Encryption Programs-can encrypt and decrypt
files using variety of ciphers and encryption modes.
Flexibility-Changing Security Polices.
User model-Invoke the programs with necessary key/password.
Performance-Slower because can’t take full advantage of VFS.
Differ from software ones :
Cryptographic functionality is either hard-coded into the hardware
or into an external specialty device.
More Rigid and User cannot change authentication mechanisms.
Much faster than any software.
Example : Secure Flash Drives.
Cannot be Reconfigured to meet changes in confidential policy.
A full secure data lifecycle implies that data is not only stored
     securely, but deleted in a secure manner as well.
     Confidential data deletion can be accomplished in 3 ways:
     Physical Destruction: Pulverization, Acid bath.
     Data Overwriting:
 software applications-Overwrite the contents of a file,delete the
file normally, and then overwrite all free space in the partition,erase
the entire partition or disk.
file systems-FoSgen [Joukov et al. 2006] and Purgefs [Joukov and
Zadok 2005], which are stackable file systems built in FiST [Zadok
and Nieh 2000].
     Encryption with key erasure : It is best to delete the encryption
     key(s) securely through physical destruction or overwriting
     methods
By compiling experiences and constraints of various
confidential storage and deletion techniques, we hope that
knowledge from research areas that have been evolving
independently can cross disseminate, to form solutions that are
tolerant to a broader range of constraints.
ANY QURIES?

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

What's hot (20)

Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Steganography
SteganographySteganography
Steganography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 

Viewers also liked

Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
snehal1010
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentation
errajagrawal
 
Wi Vi technology
Wi Vi technology Wi Vi technology
Wi Vi technology
Liju Thomas
 
Light tree
Light tree Light tree
Light tree
Priya K
 
Optical computing hardcopy
Optical computing hardcopyOptical computing hardcopy
Optical computing hardcopy
divyajyothi405
 
Opticalcomputing final
Opticalcomputing finalOpticalcomputing final
Opticalcomputing final
divyajyothi405
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 

Viewers also liked (19)

Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentation
 
Finger reader
Finger readerFinger reader
Finger reader
 
Rain technology
Rain technologyRain technology
Rain technology
 
Wi Vi technology
Wi Vi technology Wi Vi technology
Wi Vi technology
 
Light tree
Light tree Light tree
Light tree
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?
 
GIS and Mapping Software Introduction
GIS and Mapping Software IntroductionGIS and Mapping Software Introduction
GIS and Mapping Software Introduction
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
 
Optical computing hardcopy
Optical computing hardcopyOptical computing hardcopy
Optical computing hardcopy
 
Psychokinesis
PsychokinesisPsychokinesis
Psychokinesis
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Opticalcomputing final
Opticalcomputing finalOpticalcomputing final
Opticalcomputing final
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
Vlans
VlansVlans
Vlans
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 

Similar to Confidential data storage and deletion

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 

Similar to Confidential data storage and deletion (20)

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Phase1
Phase1Phase1
Phase1
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Abstract
AbstractAbstract
Abstract
 

Recently uploaded

Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
gajnagarg
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
ZurliaSoop
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
eqaqen
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Menggugurkan Kandungan 087776558899
 
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
nirzagarg
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 

Recently uploaded (20)

Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstings
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul Warshauer
 
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak Kumar
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jones
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Agartala [ 7014168258 ] Call Me For Genuine Models ...
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 

Confidential data storage and deletion

  • 2. Introduction Security Background  Commonly used Encryption Algorithms  Traditional modes of operation Confidential Data storage  Software based Confidential Data Storage  Hardware based Confidential Data Storage Deletion Conclusion
  • 3. What is the need of storing the data in a confidential manner? Cost of electronic storage declines rapidly.  Theft of electronic storage occurred much more frequently. Sensitive information stored in an insecure manner is vulnerable to theft.  Two major components exist to safeguard the privacy of data on electronic storage media : Data must be stored in a confidential manner to prevent unauthorized access. At the time of disposal, confidential data must be removed from the storage media
  • 4. The general concept of secure handling of data is composed of three aspects: Confidentiality- involves ensuring that information is not read by unauthorized persons. Using encryption- to store data or authenticating valid users are example means by which confidentiality is achieved. Integrity- ensures that the information is not altered by unauthorized persons . To verify- Combine a message authentication code with sensitive data. Many techniques of confidential storage and deletion involve cryptography:  Commonly Used Encryption Algorithms  Traditional Modes of Operation
  • 5. Encryption -used in cryptography “to scramble information so that only someone knowing the appropriate secret can obtain the original information (through decryption)”. The secret is often a key of n random bits of zeros and ones. Common symmetric key encryption algorithms : the Data Encryption Standard (DES), Triple-DES (3DES), and the Advanced Encryption Standard (AES).  DES-a key size of 56 bits and a block size of 64 bits.Criticism-56-bit key length is too short. With newer CPUs, the key space of 256 can be enumerated. 3DES-built to enlarge the DES key space. Criticism-the key space to 2168, but the strength of 3DES is only twice as strong as DES. AES-block length of 128 bits and supports key lengths of 128, 192, and 256 bits.
  • 6. Electronic Codebook(ECB)- is the simplest mode of operation, and does not use an IV(initialization vector) .With a key, Pi as the ith block of plaintext, and Ci as the ith block of cipher text, the encryption is performed as Ci = Ekey (Pi), and decryption is performed as Pi = Dkey (Ci). cipher-block-chaining (CBC) Cipher-Block-Chaining (CBC)-slightly more complicated and uses an IV, Encryption of the first block of plaintext is performed as C1 =Ekey (P1 Å IV), where C1 is the 1st block of cipher text; IV is the random, non-secret initialization vector; and P1 is the 1st block of plaintext. Subsequent blocks of plaintext are encrypted as Ci = Ekey (Pi Å Ci-1). In the same manner, the first block of cipher text is decrypted as P1 = Dkey (C1) Å IV, and the subsequent blocks of cipher text are decrypted as Pi = Dkey (Ci) Å Ci-1. Contd…
  • 7. Mode of Encryption Performance Decryption performance operation ECB Good: ECB do not depend on Good: ECB do not depend on previous previous blocks. Multiple blocks blocks. Multiple blocks can be encrypted can be encrypted and decrypted in and decrypted in parallel. parallel CBC Poor: CBC ciphertext equires the Good: CFB and CBC decryption of one block previous ciphertext block as input. requires only one previous ciphertext block In the case of updates,CBC require as input. Multiple blocks can be decrypted re-encrypting the remainder of a in parallel. file, since all subsequent ciphertext blocks depend on the current ciphertext block. Thus, encryption is not parallized.
  • 8. Confidential storage methods are difficult to implement for reasons including complexity of method setup, difficulty of conversion of prior methods to new secure methods, training, key management, and password. Here it shows the storage path for UNIX –based and WINDOWS operating system. Both UNIX and WINDOWS share one-to-one mapping.
  • 9. Requires no hardware. Each solution has its strengths and limitations with regard to level of confidentiality, ease-of-use, performance and the flexibility to set policies. Example of Software based confidential data storage is : Generalized Encryption Programs-can encrypt and decrypt files using variety of ciphers and encryption modes. Flexibility-Changing Security Polices. User model-Invoke the programs with necessary key/password. Performance-Slower because can’t take full advantage of VFS.
  • 10. Differ from software ones : Cryptographic functionality is either hard-coded into the hardware or into an external specialty device. More Rigid and User cannot change authentication mechanisms. Much faster than any software. Example : Secure Flash Drives. Cannot be Reconfigured to meet changes in confidential policy.
  • 11. A full secure data lifecycle implies that data is not only stored securely, but deleted in a secure manner as well. Confidential data deletion can be accomplished in 3 ways: Physical Destruction: Pulverization, Acid bath. Data Overwriting:  software applications-Overwrite the contents of a file,delete the file normally, and then overwrite all free space in the partition,erase the entire partition or disk. file systems-FoSgen [Joukov et al. 2006] and Purgefs [Joukov and Zadok 2005], which are stackable file systems built in FiST [Zadok and Nieh 2000]. Encryption with key erasure : It is best to delete the encryption key(s) securely through physical destruction or overwriting methods
  • 12. By compiling experiences and constraints of various confidential storage and deletion techniques, we hope that knowledge from research areas that have been evolving independently can cross disseminate, to form solutions that are tolerant to a broader range of constraints.