SlideShare a Scribd company logo
Cloud Data Encryption

(Aluhut Edition)
flarp 2019/01 matthias@grawinkel.com / @meatz
2
What’s the problem?
- Store data from my computer(s) to untrusted machines

- aka backup to the cloud

- Sync and Share with friends

- Strong authenticated Encryption

- Encrypt content, directory and file names

- Encrypt directory structures and file sizes

- Simple to use

- Aluhut compatible
3
Crypto Buzzwords
- AES (GCM, CTR, CBC, CFB, XTS, …)

- SHA-256 / SHA-512

- Blake2

- Merkle Trees

- HMAC

- PBKDF2

- XSalsa20Poly1305

- Authenticated Encryption?
4
Backups,
Object Stores
Amazon S3 SSE
- S3 + Server Side encryption

- User maintains all crypto keys

- s3put

- via TLS

- here is my data, and please encrypt with this key…
6
tarsnap
• https://www.tarsnap.com

• inventors of scrypt
7
Duplicity
- Encrypted bandwidth-efficient backup using the
rsync algorithm

- Traditional backup scheme: Full backup +
incremental

- GnuPG for encryption
8
Déjà Dup
- Déjà Dup

Déjà Dup is a simple backup tool. It hides the complexity of backing up the
Right Way (encrypted, off-site, and regular) and uses duplicity as the backend.

Features:

 • Support for local, remote, or cloud backup locations such as Google Drive
and Nextcloud

 • Securely encrypts and compresses your data

 • Incrementally backs up, letting you restore from any particular backup

 • Schedules regular backups

 • Integrates well into your GNOME desktop
9
https://launchpad.net/deja-dup
Duplicati
- Inspired by duplicity. Rewrite in 2008.

- AES-256
10 https://www.duplicati.com
Restic - Backups done right
- Single go binary

- Backup to SFTP, REST, object stores (S3, B2, GC, Azure, … )

- Deduplication (Sliding Window with Rabin Fingerprints)

- AES-256 CTR, integrity by Poly1305-AES MAC

- Snapshots + Tags

- Simple setup, easy to use!

- Well documented!
11
https://restic.net
BorgBackup - Resistance is futile!
• Requires ssh target or Borg Server to host repository

• Encrypted: AES-256 CTR + HMAC-SHA256

• Follows the Horton Principle: A directed acyclic graph of
authentication from the manifest to the data chunks of individual files

• Deduplication over all client machines on same repo

• Compression (LZ4, zlib, LZMA, zstd)

• Mountable backups with FUSE

• Graphical Front End BorgWeb

• Well Documented
12 https://www.borgbackup.org
Arq Backup
• Closed source. macOS + Windows.

• Versioned file backups

• Bring-your-own-storage (sftp, *cloud drives, S3, …)

• https://www.arqbackup.com/arq_data_format.txt

• AES256/CBC
13
https://www.arqbackup.com
Backblaze
• Personal / Business Backup + Cheap cloud storage plans

• https://www.backblaze.com/blog/how-to-make-strong-
encryption-easy-to-use/

• AES-128 (2008)
14
Perkeep - "your personal storage system for life"
• Your data is entirely under your control

• Open Source

• Paranoid about privacy, everything private by default

• No SPOF: don't rely on any single party (including
yourself)

• Your data should be alive in 80 years, especially if you
are

• Append only blob store (max 16MB, content and data
blobs)

• Encryption: NaCl + Secretbox: XSalsa20 and
Poly1305
15
https://perkeep.org
Sync & Share
BDrive - Sync & Share
• Bundesdruckerei - Cloud Computing „Made in Germany“

• BSI zertifiziert: CC EAL 4+

• CloudRAID (erasure coded to multiple clouds)

• End-to-end encryption

• Multi-factor auth. Identity Management by
Bundesdruckerei

• Certificate galore
17
tresorit
• Closed Source. Payed plans for individuals and busninesses

• “Swiss Privacy + EU data centers”. ISO 27001, GDPR,
HIPAA

• Zero knowledge, end-to-end encryption, client-side integrity
protection

• AES256 CFB, HMAC-SHA512

• https://tresorit.com/security/encryption
18
KBFS
- By keybase.io , very alpha, 250GB for free

- Public, signed directories for everyone in the world

- /keybase/public/yourname

- end-to-end encrypted folders

- /keybase/private/yourname

- /keybase/private/yourname,meatz@twitter,fnord

- Crypto algo galore https://keybase.io/docs/crypto/kbfs
19
Nextcloud
20
• 📱☁💻 A safe home for all your data – community-driven,
free & open source 👏
• enterprise-grade encryption features. recovery, audit, …

• Client: end-to-end. Enabled per folder. Encrypts content,
file names, directory structure. Shareable.

• Server side encryption. Per file keys, encrypted by server
wide or per user-keys. Encrypts content only.
Authenticated Encrypted.

• Whitepapers available
Seafile
- Fast and reliable sync & share

- Open Source: Community & Professional Editions

- Multiple storage backends: local, Ceph, Swift, S3

- Clients for all Major platforms

- Webdav Server

- Client side & storage backend encryption

- AES 256 CBC

- Weak crypto!

- PBKDF with only 1000 iterations

- Client: Only content is encrypted

- Server: all objects will be encrypted with the same global key/iv pair
21
https://www.seafile.com
S3QL
• https://bitbucket.org/nikratio/s3ql/

• Fuse file system over object stores

• supports hardlinks, symlinks, standard unix permissions, extended attributes
and file sizes up to 2 TB

• Metadata stored in SQLite object -> Only usable by one computer at a time

• Compression, deduplication

• Authenticated encryption: AES256 CTR + SHA256 HMAC

• Immutable Trees, Copy-on-write / snapshotting

• Considered stable and suitable for production use. Linux only

22
SAFE Network
• The SAFE network ultimately wants to
“create a secure, autonomous, data-centric,
peer-to-peer network as an alternative to
the current server-centric model.”
23 https://safenetwork.tech
Safecoin
• All public/published data on the Network
will be immutable and available on the
Network in perpetuity

• “Farming”. Earn Coins by providing storage
space, CPU, bandwidth, online time

• Earn coins by running Applications

• Spend coins for resource accesses
24
https://coinmarketcap.com / 2019-01-03
https://safenetwork.tech/fundamentals
Tahoe-LAFS
• Key:Value Store

• Encrypt, erasure code (3 out of 10, 7 for happyness),
distribute shares to servers

• AES, SHA256, RSA, Merkle Trees

• Capabilities for mutable and immutable files

• File System Layer + Application Layer

• REST API, SFTP, FTP, “Magic Folder”
25
https://tahoe-lafs.org/
Tahoe-LAFS
26
https://tahoe-lafs.readthedocs.io/en/tahoe-lafs-1.12.1/about.html#what-is-provider-independent-security
MEGA
- Closed Source. Privacy by design.

- Master key, AES-CBC, per file keys

- public file and folder links

- Cheap! 1TB / 9,99EUR/month, 4TB 19,99EUR/month

- https://mega.nz/SecurityWhitepaper.pdf
27
Cryptomator + Cloud Storage
- Open Source

- Webdav Server + Crypto Engine for Linux, macOs, Windows

- iOS + Android

- Encrypts Data, Filenames (AES-CTR)
28 http://cryptomator.org/de/security/architecture/
BoxCryptor + Cloud Storage
- Proprietary alternative to Cryptomator

- “Dropbox premier partner”
29
https://www.boxcryptor.com/de/
Crypto Layer + Cloud Storage
30
https://www.cryfs.org
git-based
git-secret
- gpg encryption for files

- git secret init

- git secret add <file>

- git secret tell <email>

- git secret killperson <email>

- git-secret-diff helper tool
32
http://git-secret.io
git-remote-gcrypt
- PGP-encrypted git remotes

- https://git.spwhitton.name/git-remote-gcrypt/

- git-annex encryption

- https://git-annex.branchable.com/tips/
fully_encrypted_git_repositories_with_gcrypt/#index5h2
33
Sparkle Share
- “inotify-git wrapper”

- https://www.sparkleshare.org

- https://github.com/hbons/SparkleShare/wiki/Client-Side-Encryption

- OpenSSL’s AES-256-CBC

- Only encrypts contents, not file names
34
Misc
dump
- spideroak - commercial, sync & share, backups

- Librevault - “Open source zero-knowledge peer-2-peer file
sync” - alpha, discontinued.

- RetroShare - a Free and Open Source cross-platform,
Friend-2-Friend and secure decentralised communication
platform.

- …
36
37 https://xkcd.com/538/
38
Questions?
Stories to share?
Food & Beer?!!
Slides & Feedback: matthias@grawinkel.com

More Related Content

What's hot

Divide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloudDivide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloud
Stephen Gordon
 
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix
 

What's hot (20)

Ceph c01
Ceph c01Ceph c01
Ceph c01
 
SQL on Azure
SQL on AzureSQL on Azure
SQL on Azure
 
Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...Cloud Computing Storage With CubeXS Weatherly...
Cloud Computing Storage With CubeXS Weatherly...
 
SUSE Enterprise Storage
SUSE Enterprise StorageSUSE Enterprise Storage
SUSE Enterprise Storage
 
Microservices and Cloud Native Apps Meetup with Diamanti and Nirmata
Microservices and Cloud Native Apps Meetup with Diamanti and NirmataMicroservices and Cloud Native Apps Meetup with Diamanti and Nirmata
Microservices and Cloud Native Apps Meetup with Diamanti and Nirmata
 
Red Hat Storage Day New York - Persistent Storage for Containers
Red Hat Storage Day New York - Persistent Storage for ContainersRed Hat Storage Day New York - Persistent Storage for Containers
Red Hat Storage Day New York - Persistent Storage for Containers
 
Divide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloudDivide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloud
 
Red Hat Ceph Storage: Past, Present and Future
Red Hat Ceph Storage: Past, Present and FutureRed Hat Ceph Storage: Past, Present and Future
Red Hat Ceph Storage: Past, Present and Future
 
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
 
Introduction to IBM Spectrum Scale and Its Use in Life Science
Introduction to IBM Spectrum Scale and Its Use in Life ScienceIntroduction to IBM Spectrum Scale and Its Use in Life Science
Introduction to IBM Spectrum Scale and Its Use in Life Science
 
Red Hat Storage Day Seattle: Stretching A Gluster Cluster for Resilient Messa...
Red Hat Storage Day Seattle: Stretching A Gluster Cluster for Resilient Messa...Red Hat Storage Day Seattle: Stretching A Gluster Cluster for Resilient Messa...
Red Hat Storage Day Seattle: Stretching A Gluster Cluster for Resilient Messa...
 
Marklogic rack proposal
Marklogic rack proposalMarklogic rack proposal
Marklogic rack proposal
 
Cisco UCS Integrated Infrastructure for Big Data with Cassandra
Cisco UCS Integrated Infrastructure for Big Data with CassandraCisco UCS Integrated Infrastructure for Big Data with Cassandra
Cisco UCS Integrated Infrastructure for Big Data with Cassandra
 
In Place Analytics For File and Object Data
In Place Analytics For File and Object DataIn Place Analytics For File and Object Data
In Place Analytics For File and Object Data
 
https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...
https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...
https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...
 
Red Hat Storage Day Dallas - Defiance of the Appliance
Red Hat Storage Day Dallas - Defiance of the Appliance Red Hat Storage Day Dallas - Defiance of the Appliance
Red Hat Storage Day Dallas - Defiance of the Appliance
 
Red Hat Storage Day Dallas - Gluster Storage in Containerized Application
Red Hat Storage Day Dallas - Gluster Storage in Containerized Application Red Hat Storage Day Dallas - Gluster Storage in Containerized Application
Red Hat Storage Day Dallas - Gluster Storage in Containerized Application
 
HBaseConAsia2018 Track3-6: HBase at Meituan
HBaseConAsia2018 Track3-6: HBase at MeituanHBaseConAsia2018 Track3-6: HBase at Meituan
HBaseConAsia2018 Track3-6: HBase at Meituan
 
Azure storage
Azure storageAzure storage
Azure storage
 
Scalable POSIX File Systems in the Cloud
Scalable POSIX File Systems in the CloudScalable POSIX File Systems in the Cloud
Scalable POSIX File Systems in the Cloud
 

Similar to Cloud Data Encryption (Aluhut Edition) - 2019

Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit
 
A Storage Story #ChefConf2013
A Storage Story #ChefConf2013A Storage Story #ChefConf2013
A Storage Story #ChefConf2013
Kyle Bader
 
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR complianceOzone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
Dinesh Chitlangia
 

Similar to Cloud Data Encryption (Aluhut Edition) - 2019 (20)

The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017
 
Securing Spark Applications
Securing Spark ApplicationsSecuring Spark Applications
Securing Spark Applications
 
Hive spark-s3acommitter-hbase-nfs
Hive spark-s3acommitter-hbase-nfsHive spark-s3acommitter-hbase-nfs
Hive spark-s3acommitter-hbase-nfs
 
Risk Management for Data: Secured and Governed
Risk Management for Data: Secured and GovernedRisk Management for Data: Secured and Governed
Risk Management for Data: Secured and Governed
 
Containerized Data Persistence on Mesos
Containerized Data Persistence on MesosContainerized Data Persistence on Mesos
Containerized Data Persistence on Mesos
 
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache AccumuloReal-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
Real-Time Distributed and Reactive Systems with Apache Kafka and Apache Accumulo
 
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
 
Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)Building Storage for Clouds (ONUG Spring 2015)
Building Storage for Clouds (ONUG Spring 2015)
 
A Storage Story #ChefConf2013
A Storage Story #ChefConf2013A Storage Story #ChefConf2013
A Storage Story #ChefConf2013
 
Multitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINEMultitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINE
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
 
DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...
DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...
DataStax | DSE: Bring Your Own Spark (with Enterprise Security) (Artem Aliev)...
 
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR complianceOzone: Evolution of HDFS scalability & built-in GDPR compliance
Ozone: Evolution of HDFS scalability & built-in GDPR compliance
 
Ozone: Evolution of HDFS
Ozone: Evolution of HDFSOzone: Evolution of HDFS
Ozone: Evolution of HDFS
 
Oracle RAC and Docker: The Why and How
Oracle RAC and Docker: The Why and HowOracle RAC and Docker: The Why and How
Oracle RAC and Docker: The Why and How
 
Kfs presentation
Kfs presentationKfs presentation
Kfs presentation
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN Caching
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 

Cloud Data Encryption (Aluhut Edition) - 2019

  • 1. Cloud Data Encryption (Aluhut Edition) flarp 2019/01 matthias@grawinkel.com / @meatz
  • 2. 2
  • 3. What’s the problem? - Store data from my computer(s) to untrusted machines - aka backup to the cloud - Sync and Share with friends - Strong authenticated Encryption - Encrypt content, directory and file names - Encrypt directory structures and file sizes - Simple to use - Aluhut compatible 3
  • 4. Crypto Buzzwords - AES (GCM, CTR, CBC, CFB, XTS, …) - SHA-256 / SHA-512 - Blake2 - Merkle Trees - HMAC - PBKDF2 - XSalsa20Poly1305 - Authenticated Encryption? 4
  • 6. Amazon S3 SSE - S3 + Server Side encryption - User maintains all crypto keys - s3put - via TLS - here is my data, and please encrypt with this key… 6
  • 8. Duplicity - Encrypted bandwidth-efficient backup using the rsync algorithm - Traditional backup scheme: Full backup + incremental - GnuPG for encryption 8
  • 9. Déjà Dup - Déjà Dup Déjà Dup is a simple backup tool. It hides the complexity of backing up the Right Way (encrypted, off-site, and regular) and uses duplicity as the backend. Features:  • Support for local, remote, or cloud backup locations such as Google Drive and Nextcloud  • Securely encrypts and compresses your data  • Incrementally backs up, letting you restore from any particular backup  • Schedules regular backups  • Integrates well into your GNOME desktop 9 https://launchpad.net/deja-dup
  • 10. Duplicati - Inspired by duplicity. Rewrite in 2008. - AES-256 10 https://www.duplicati.com
  • 11. Restic - Backups done right - Single go binary - Backup to SFTP, REST, object stores (S3, B2, GC, Azure, … ) - Deduplication (Sliding Window with Rabin Fingerprints) - AES-256 CTR, integrity by Poly1305-AES MAC - Snapshots + Tags - Simple setup, easy to use! - Well documented! 11 https://restic.net
  • 12. BorgBackup - Resistance is futile! • Requires ssh target or Borg Server to host repository • Encrypted: AES-256 CTR + HMAC-SHA256 • Follows the Horton Principle: A directed acyclic graph of authentication from the manifest to the data chunks of individual files • Deduplication over all client machines on same repo • Compression (LZ4, zlib, LZMA, zstd) • Mountable backups with FUSE • Graphical Front End BorgWeb • Well Documented 12 https://www.borgbackup.org
  • 13. Arq Backup • Closed source. macOS + Windows. • Versioned file backups • Bring-your-own-storage (sftp, *cloud drives, S3, …) • https://www.arqbackup.com/arq_data_format.txt • AES256/CBC 13 https://www.arqbackup.com
  • 14. Backblaze • Personal / Business Backup + Cheap cloud storage plans • https://www.backblaze.com/blog/how-to-make-strong- encryption-easy-to-use/ • AES-128 (2008) 14
  • 15. Perkeep - "your personal storage system for life" • Your data is entirely under your control • Open Source • Paranoid about privacy, everything private by default • No SPOF: don't rely on any single party (including yourself) • Your data should be alive in 80 years, especially if you are • Append only blob store (max 16MB, content and data blobs) • Encryption: NaCl + Secretbox: XSalsa20 and Poly1305 15 https://perkeep.org
  • 17. BDrive - Sync & Share • Bundesdruckerei - Cloud Computing „Made in Germany“ • BSI zertifiziert: CC EAL 4+ • CloudRAID (erasure coded to multiple clouds) • End-to-end encryption • Multi-factor auth. Identity Management by Bundesdruckerei • Certificate galore 17
  • 18. tresorit • Closed Source. Payed plans for individuals and busninesses • “Swiss Privacy + EU data centers”. ISO 27001, GDPR, HIPAA • Zero knowledge, end-to-end encryption, client-side integrity protection • AES256 CFB, HMAC-SHA512 • https://tresorit.com/security/encryption 18
  • 19. KBFS - By keybase.io , very alpha, 250GB for free - Public, signed directories for everyone in the world - /keybase/public/yourname - end-to-end encrypted folders - /keybase/private/yourname - /keybase/private/yourname,meatz@twitter,fnord - Crypto algo galore https://keybase.io/docs/crypto/kbfs 19
  • 20. Nextcloud 20 • 📱☁💻 A safe home for all your data – community-driven, free & open source 👏 • enterprise-grade encryption features. recovery, audit, … • Client: end-to-end. Enabled per folder. Encrypts content, file names, directory structure. Shareable. • Server side encryption. Per file keys, encrypted by server wide or per user-keys. Encrypts content only. Authenticated Encrypted. • Whitepapers available
  • 21. Seafile - Fast and reliable sync & share - Open Source: Community & Professional Editions - Multiple storage backends: local, Ceph, Swift, S3 - Clients for all Major platforms - Webdav Server - Client side & storage backend encryption - AES 256 CBC - Weak crypto! - PBKDF with only 1000 iterations - Client: Only content is encrypted - Server: all objects will be encrypted with the same global key/iv pair 21 https://www.seafile.com
  • 22. S3QL • https://bitbucket.org/nikratio/s3ql/ • Fuse file system over object stores • supports hardlinks, symlinks, standard unix permissions, extended attributes and file sizes up to 2 TB • Metadata stored in SQLite object -> Only usable by one computer at a time • Compression, deduplication • Authenticated encryption: AES256 CTR + SHA256 HMAC • Immutable Trees, Copy-on-write / snapshotting • Considered stable and suitable for production use. Linux only 22
  • 23. SAFE Network • The SAFE network ultimately wants to “create a secure, autonomous, data-centric, peer-to-peer network as an alternative to the current server-centric model.” 23 https://safenetwork.tech
  • 24. Safecoin • All public/published data on the Network will be immutable and available on the Network in perpetuity • “Farming”. Earn Coins by providing storage space, CPU, bandwidth, online time • Earn coins by running Applications • Spend coins for resource accesses 24 https://coinmarketcap.com / 2019-01-03 https://safenetwork.tech/fundamentals
  • 25. Tahoe-LAFS • Key:Value Store • Encrypt, erasure code (3 out of 10, 7 for happyness), distribute shares to servers • AES, SHA256, RSA, Merkle Trees • Capabilities for mutable and immutable files • File System Layer + Application Layer • REST API, SFTP, FTP, “Magic Folder” 25 https://tahoe-lafs.org/
  • 27. MEGA - Closed Source. Privacy by design. - Master key, AES-CBC, per file keys - public file and folder links - Cheap! 1TB / 9,99EUR/month, 4TB 19,99EUR/month - https://mega.nz/SecurityWhitepaper.pdf 27
  • 28. Cryptomator + Cloud Storage - Open Source - Webdav Server + Crypto Engine for Linux, macOs, Windows - iOS + Android - Encrypts Data, Filenames (AES-CTR) 28 http://cryptomator.org/de/security/architecture/
  • 29. BoxCryptor + Cloud Storage - Proprietary alternative to Cryptomator - “Dropbox premier partner” 29 https://www.boxcryptor.com/de/
  • 30. Crypto Layer + Cloud Storage 30 https://www.cryfs.org
  • 32. git-secret - gpg encryption for files - git secret init - git secret add <file> - git secret tell <email> - git secret killperson <email> - git-secret-diff helper tool 32 http://git-secret.io
  • 33. git-remote-gcrypt - PGP-encrypted git remotes - https://git.spwhitton.name/git-remote-gcrypt/ - git-annex encryption - https://git-annex.branchable.com/tips/ fully_encrypted_git_repositories_with_gcrypt/#index5h2 33
  • 34. Sparkle Share - “inotify-git wrapper” - https://www.sparkleshare.org - https://github.com/hbons/SparkleShare/wiki/Client-Side-Encryption - OpenSSL’s AES-256-CBC - Only encrypts contents, not file names 34
  • 35. Misc
  • 36. dump - spideroak - commercial, sync & share, backups - Librevault - “Open source zero-knowledge peer-2-peer file sync” - alpha, discontinued. - RetroShare - a Free and Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform. - … 36
  • 38. 38
  • 39. Questions? Stories to share? Food & Beer?!! Slides & Feedback: matthias@grawinkel.com