SlideShare a Scribd company logo
1 of 15
Confidential Data Storage and
           Deletion

            PRESENTED
                By



          A.KIRAN KUMAR
                  (08581A0526)
C O N TEN TS
   Introd uction
   C onfid ential D ata Storage
   Techniques of confid ential storage
   Encryption
   Sym m etric and asym m etric encryption
   Ad vanced Encryption Stand ard (AES)
   H ard ware-based C onfid ential Storage techniques
   C onfid ential D ata Erasure
   Physical D estruction
   D ata O verwriting
   Encryption with K ey Erasure
                                                         2
   C onclusion
INTRODUC TION
   Many computers store data about personal finances, online transactions,
    tax records, passwords for bank accounts and emails.

   All these sensitive information are vulnerable to theft and also leaked
    accidentally due to improper disposal of storage media.

   To protect the secrecy of the entire data lifetime, we must have
    confidential ways to store and delete data.

   This seminar describes the most commonly used encryption
    algorithm, Advanced Encryption System (AES) which is used for
    many of the confidential data storage methods and also describes the
    confidential data erasure methods such as physical destruction, data
    overwriting methods and Key erasure.
                                                                              3
C ONFIDE NTIA L DA TA
                STORA GE
   Achieving confidentiality means storing data in a way that can be read
    only by authorized persons. No unauthorized persons should be able to
    read or otherwise obtain meaningful information from this data, even
    with physical access to the storage media.
                  UNIX Storage Path      Windows Storage Path
                       Application          Application         User

                                                                Kernel
                          VFS              I/O Manager



                        File System      File System Driver


                                           Storage Device
                       Block Layer         Drivers


                                                                             4
                        Storage             Storage
                        Media               Media
TECHNIQUES OF CONFIDENTIAL
                      STORAGE
   There are two basic techniques of confidential storage:
                 1. Software-based confidential storage techniques


                            I. Encryption
                           II. Advanced Encryption Standard (AES)


                2. Hardware-based confidential storage techniques

                           I. Secure Flash Drives
                           II. Enclosures and Extension Cards
                           III. Encrypted Hard Drives



                                                                     5
STO RAGE
                     E NC RYPTION
   Encryption is the process of transforming information (referred to
    as plaintext) using an algorithm (called cipher) to make it
    unreadable to anyone except those possessing special knowledge,
    usually referred to as a key.

   There are two basic techniques for encrypting information.


         1. Symmetric encryption (secret key encryption)
         2. Asymmetric encryption ( public key encryption).




                                                                         6
SYM M ETRIC AN D ASYM M ETRIC
        EN C RYPTIO N




                                7
A DVA NC E D E NC RYPTION
                       STA NDA RD (A E S)
   The Advanced Encryption Standard (AES)                      specifies a FIPS(Federal
    Information Processing Standard)-approved                    cryptographic algorithm
    that can be used to protect electronic data.                The AES algorithm is a
    symmetric block cipher that can encrypt                      (encipher) and decrypt
    (decipher) information.
         128 bit plain text
                                                            K
                                    Round Keys (128 Bits)
                                                            E
     Pre Round Transformation                               Y                     Cipher Key
                                            K0                               (128, 192 or 256 bits)

              Round 1
                                                            E
                                            K1              X
                                                                           Nr     Key Size
                                                            P
              Round 2
                                            K2              A              10     128
                  .                          .
                  .                          .
                                             .              N              12     192
     Round N (Slightly Different)
                                             .              S
                                           KNr              I              14     256
                                                            O                                     8
           128 bit cipher text
                                                            N
H ARD WARE-BASED C O N FID EN TIAL
           STO RAGE TEC H N IQ U ES
   Secure Flash Drives: Some secure flash drives provide only
    software encryption using block-based encryption methods as
    mentioned. Other flash drives protect data through cryptographic
    mechanisms provided on the flash drive itself.


   Enclosures and Extension Cards: Enclosures and extension
    cards can employ good encryption techniques and do not divulge any
    information about files or the structure of the file system on disk.


   Encrypted Hard Drives: Seagate [2006] is introducing “Drive
    Trust Technology” into their Momentus 5400 FDE series notebook
    hard drives, which implement full disk encryption. This technology is
    implemented in the hard drive firmware and provides encryption,
    decryption, hashing (for passwords), digital signature, and random-
                                                                            9
    number generation functions.
CONFIDENTIAL DATA ERASURE
   When confidential data have to be removed, we must be sure that once
    deleted, the data can no longer be restored. A full secure data lifecycle
    implies that data is not only stored securely, but deleted in a secure
    manner as well.

   CMRR scanning microscopes , Magnetic force microscopy and
    magnetic force scanning & tunneling microscopy analyze the polarity
    of the magnetic domains of the electronic storage medium and can
    recover data in minutes.

   Confidential data deletion can be accomplished in three ways:


                           1.Physical Destruction
                           2.Data Overwriting
                           3.Encryption with Key Erasure                        10
PH YSIC AL D ESTRU C TIO N
     The Department of Defense government document(DoD)states that
    classified material may be destroyed by numerous methods:


                           1. Smelting
                           2. Shredding
                           3. Sanding
                           4. Pulverization
                           5. Acid bath
                           6. Magnetic degaussing

   Physical destruction methods provide great confidentiality. we cannot
    securely delete only one file using these methods. Therefore, this
    method does not support flexible security policies.
   Since physical destruction can destroy large amounts of data in a         11
    relatively short amount of time, the performance in this sense is quite
    good.
DATA OVERWRITING
   Write new data on top of existing data and thus erase the
    previously existing data.
   The Department of Defense document suggests an overwrite with a
    character, its compliment, then a random character, as well as other
    software-based, overwrite methods that refer to non-volatile electronic
    storage as listed below:
ID                        ERASURE METHOD
    C   Overwrite all addressable locations with a character
    D   Overwrite all addressable locations with a             character,   its
        complement, then a random character and verify
    E   Overwrite all addressable locations        with   a    character,   its
        complement, then a random character
    H   Overwrite all locations with a random pattern, with binary zeros,
        and then with binary ones
                                                                                  12
ENCRYPTION WITH KEY
                     ERASURE
   The third way to delete data securely is to encrypt the data and then
    securely erase the key. The encryption key is often securely deleted
    using overwriting methods. This combination allows for much faster
    secure deletion in that only a small key is overwritten instead of the
    entire file (which could be very large).

   if the encryption key is protected by a password and the password is
    merely forgotten, the strength of the secure deletion is directly
    correlated to the strength of the password.

   It is best to delete the encryption key(s) securely through physical
    destruction or overwriting methods. The ease-of-use characteristic is
    degraded in that the user must destroy the key explicitly.

                                                                             13
C O N C L U SIO N
   This Seminar took a look at the methods, advantages, and limitations of
    confidential storage and deletion methods for electronic media in a non-
    distributed, single-user environment, with a dead forensic attack model.
   We compared confidential data handling methods using characteristics
    associated with confidentiality, policy, ease-of-use, and performance.
   By compiling experiences and constraints of various confidential storage
    and deletion techniques, we hope that knowledge from this Seminar is
    very helpful.t




                                                                               14
15

More Related Content

What's hot

Memory forensics
Memory forensicsMemory forensics
Memory forensics
Sunil Kumar
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 

What's hot (20)

Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
smart card
smart cardsmart card
smart card
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Smart card
Smart cardSmart card
Smart card
 
SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos
 
Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
 
SMART CARD
SMART CARDSMART CARD
SMART CARD
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)
 
Hard disk
Hard diskHard disk
Hard disk
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
IP Security
IP SecurityIP Security
IP Security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 

Viewers also liked

Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
snehal1010
 
Stored-Procedures-Presentation
Stored-Procedures-PresentationStored-Procedures-Presentation
Stored-Procedures-Presentation
Chuck Walker
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
akhila immadisetty
 
Debit and credit card
Debit and credit cardDebit and credit card
Debit and credit card
17791
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentation
errajagrawal
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
asmita tarar
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology ppt
Hema Agali
 

Viewers also liked (20)

Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Finger reader
Finger readerFinger reader
Finger reader
 
Ch24
Ch24Ch24
Ch24
 
Dependable Systems -Dependability Threats (2/16)
Dependable Systems -Dependability Threats (2/16)Dependable Systems -Dependability Threats (2/16)
Dependable Systems -Dependability Threats (2/16)
 
Dependable Systems -Fault Tolerance Patterns (4/16)
Dependable Systems -Fault Tolerance Patterns (4/16)Dependable Systems -Fault Tolerance Patterns (4/16)
Dependable Systems -Fault Tolerance Patterns (4/16)
 
2014 Cloud Computing Survey
2014 Cloud Computing Survey2014 Cloud Computing Survey
2014 Cloud Computing Survey
 
Stored-Procedures-Presentation
Stored-Procedures-PresentationStored-Procedures-Presentation
Stored-Procedures-Presentation
 
CIOs Vs CTOs
CIOs Vs CTOsCIOs Vs CTOs
CIOs Vs CTOs
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Debit Cards
Debit CardsDebit Cards
Debit Cards
 
Debit and credit card
Debit and credit cardDebit and credit card
Debit and credit card
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentation
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost Mobile
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
 
Records Management
Records ManagementRecords Management
Records Management
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology ppt
 
Banking technology
Banking technologyBanking technology
Banking technology
 

Similar to Cofidential data storage and deletion 2003 (2)

ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
Ulf Mattsson
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 

Similar to Cofidential data storage and deletion 2003 (2) (20)

IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review
 
Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
CNS team 6.pptx
CNS team 6.pptxCNS team 6.pptx
CNS team 6.pptx
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrix
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppt
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Cofidential data storage and deletion 2003 (2)

  • 1. Confidential Data Storage and Deletion PRESENTED By A.KIRAN KUMAR (08581A0526)
  • 2. C O N TEN TS  Introd uction  C onfid ential D ata Storage  Techniques of confid ential storage  Encryption  Sym m etric and asym m etric encryption  Ad vanced Encryption Stand ard (AES)  H ard ware-based C onfid ential Storage techniques  C onfid ential D ata Erasure  Physical D estruction  D ata O verwriting  Encryption with K ey Erasure 2  C onclusion
  • 3. INTRODUC TION  Many computers store data about personal finances, online transactions, tax records, passwords for bank accounts and emails.  All these sensitive information are vulnerable to theft and also leaked accidentally due to improper disposal of storage media.  To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data.  This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods and also describes the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure. 3
  • 4. C ONFIDE NTIA L DA TA STORA GE  Achieving confidentiality means storing data in a way that can be read only by authorized persons. No unauthorized persons should be able to read or otherwise obtain meaningful information from this data, even with physical access to the storage media. UNIX Storage Path Windows Storage Path Application Application User Kernel VFS I/O Manager File System File System Driver Storage Device Block Layer Drivers 4 Storage Storage Media Media
  • 5. TECHNIQUES OF CONFIDENTIAL STORAGE  There are two basic techniques of confidential storage: 1. Software-based confidential storage techniques I. Encryption II. Advanced Encryption Standard (AES) 2. Hardware-based confidential storage techniques I. Secure Flash Drives II. Enclosures and Extension Cards III. Encrypted Hard Drives 5
  • 6. STO RAGE E NC RYPTION  Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  There are two basic techniques for encrypting information. 1. Symmetric encryption (secret key encryption) 2. Asymmetric encryption ( public key encryption). 6
  • 7. SYM M ETRIC AN D ASYM M ETRIC EN C RYPTIO N 7
  • 8. A DVA NC E D E NC RYPTION STA NDA RD (A E S)  The Advanced Encryption Standard (AES) specifies a FIPS(Federal Information Processing Standard)-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. 128 bit plain text K Round Keys (128 Bits) E Pre Round Transformation Y Cipher Key K0 (128, 192 or 256 bits) Round 1 E K1 X Nr Key Size P Round 2 K2 A 10 128 . . . . . N 12 192 Round N (Slightly Different) . S KNr I 14 256 O 8 128 bit cipher text N
  • 9. H ARD WARE-BASED C O N FID EN TIAL STO RAGE TEC H N IQ U ES  Secure Flash Drives: Some secure flash drives provide only software encryption using block-based encryption methods as mentioned. Other flash drives protect data through cryptographic mechanisms provided on the flash drive itself.  Enclosures and Extension Cards: Enclosures and extension cards can employ good encryption techniques and do not divulge any information about files or the structure of the file system on disk.  Encrypted Hard Drives: Seagate [2006] is introducing “Drive Trust Technology” into their Momentus 5400 FDE series notebook hard drives, which implement full disk encryption. This technology is implemented in the hard drive firmware and provides encryption, decryption, hashing (for passwords), digital signature, and random- 9 number generation functions.
  • 10. CONFIDENTIAL DATA ERASURE  When confidential data have to be removed, we must be sure that once deleted, the data can no longer be restored. A full secure data lifecycle implies that data is not only stored securely, but deleted in a secure manner as well.  CMRR scanning microscopes , Magnetic force microscopy and magnetic force scanning & tunneling microscopy analyze the polarity of the magnetic domains of the electronic storage medium and can recover data in minutes.  Confidential data deletion can be accomplished in three ways: 1.Physical Destruction 2.Data Overwriting 3.Encryption with Key Erasure 10
  • 11. PH YSIC AL D ESTRU C TIO N  The Department of Defense government document(DoD)states that classified material may be destroyed by numerous methods: 1. Smelting 2. Shredding 3. Sanding 4. Pulverization 5. Acid bath 6. Magnetic degaussing  Physical destruction methods provide great confidentiality. we cannot securely delete only one file using these methods. Therefore, this method does not support flexible security policies.  Since physical destruction can destroy large amounts of data in a 11 relatively short amount of time, the performance in this sense is quite good.
  • 12. DATA OVERWRITING  Write new data on top of existing data and thus erase the previously existing data.  The Department of Defense document suggests an overwrite with a character, its compliment, then a random character, as well as other software-based, overwrite methods that refer to non-volatile electronic storage as listed below: ID ERASURE METHOD C Overwrite all addressable locations with a character D Overwrite all addressable locations with a character, its complement, then a random character and verify E Overwrite all addressable locations with a character, its complement, then a random character H Overwrite all locations with a random pattern, with binary zeros, and then with binary ones 12
  • 13. ENCRYPTION WITH KEY ERASURE  The third way to delete data securely is to encrypt the data and then securely erase the key. The encryption key is often securely deleted using overwriting methods. This combination allows for much faster secure deletion in that only a small key is overwritten instead of the entire file (which could be very large).  if the encryption key is protected by a password and the password is merely forgotten, the strength of the secure deletion is directly correlated to the strength of the password.  It is best to delete the encryption key(s) securely through physical destruction or overwriting methods. The ease-of-use characteristic is degraded in that the user must destroy the key explicitly. 13
  • 14. C O N C L U SIO N  This Seminar took a look at the methods, advantages, and limitations of confidential storage and deletion methods for electronic media in a non- distributed, single-user environment, with a dead forensic attack model.  We compared confidential data handling methods using characteristics associated with confidentiality, policy, ease-of-use, and performance.  By compiling experiences and constraints of various confidential storage and deletion techniques, we hope that knowledge from this Seminar is very helpful.t 14
  • 15. 15