SlideShare a Scribd company logo
1 of 13
Presented By-LIPSA PANIGRAHI
Roll No.-10CS08
Introduction
Security Background
 Commonly used Encryption Algorithms
 Traditional modes of operation
Confidential Data storage
 Software based Confidential Data Storage
 Hardware based Confidential Data Storage
Deletion
Conclusion
What is the need of storing the data in a confidential manner?
Cost of electronic storage declines rapidly.
 Theft of electronic storage occurred much more frequently.
Sensitive information stored in an insecure manner is vulnerable
to theft.
 Two major components exist to safeguard the privacy of data on
electronic storage media :
Data must be stored in a confidential manner to prevent
unauthorized access.
At the time of disposal, confidential data must be removed from
the storage media
The general concept of secure handling of data is composed of
three aspects:
Confidentiality- involves ensuring that information is not read by
unauthorized persons.
Using encryption- to store data or authenticating valid users are
example means by which confidentiality is achieved.
Integrity- ensures that the information is not altered by
unauthorized persons . To verify- Combine a message authentication
code with sensitive data. Many techniques of confidential storage
and deletion involve cryptography:
 Commonly Used Encryption Algorithms
 Traditional Modes of Operation
Encryption -used in cryptography “to scramble information so
that only someone knowing the appropriate secret can obtain the
original information (through decryption)”.
The secret is often a key of n random bits of zeros and ones.
Common symmetric key encryption algorithms : the Data
Encryption Standard (DES), Triple-DES (3DES), and the Advanced
Encryption Standard (AES).
 DES-a key size of 56 bits and a block size of 64 bits.Criticism-56-bit key
length is too short. With newer CPUs, the key space of 256 can be
enumerated.
3DES-built to enlarge the DES key space. Criticism-the key space to 2168,
but the strength of 3DES is only twice as strong as DES.
AES-block length of 128 bits and supports key lengths of 128, 192, and 256
bits.
Electronic Codebook(ECB)- is the simplest mode of operation, and does not
use an IV(initialization vector) .With a key, Pi as the ith block of plaintext, and Ci as
the ith block of cipher text, the encryption is performed as Ci = Ekey (Pi), and
decryption is performed as Pi = Dkey (Ci).


                              cipher-block-chaining (CBC)




Cipher-Block-Chaining (CBC)-slightly more complicated and uses an IV,
Encryption of the first block of plaintext is performed as C1 =Ekey (P1 Å IV), where
C1 is the 1st block of cipher text; IV is the random, non-secret initialization vector;
and P1 is the 1st block of plaintext. Subsequent blocks of plaintext are encrypted as
Ci = Ekey (Pi Å Ci-1). In the same manner, the first block of cipher text is decrypted
as P1 = Dkey (C1) Å IV, and the subsequent blocks of cipher text are decrypted as
Pi = Dkey (Ci) Å Ci-1.                                                   Contd…
Mode of     Encryption Performance                  Decryption performance
operation
ECB         Good: ECB do not depend on              Good: ECB do not depend on previous
            previous blocks. Multiple blocks        blocks. Multiple blocks can be encrypted
            can be encrypted and decrypted in       and decrypted in parallel.
            parallel

CBC         Poor: CBC ciphertext equires the        Good: CFB and CBC decryption of one block
            previous ciphertext block as input.     requires only one previous ciphertext block
            In the case of updates,CBC require      as input. Multiple blocks can be decrypted
            re-encrypting the remainder of a        in parallel.
            file, since all subsequent ciphertext
            blocks depend on the current
            ciphertext block. Thus, encryption
            is not parallized.
Confidential storage methods are difficult to implement for
reasons including complexity of method setup, difficulty of
conversion of prior methods to new secure methods, training, key
management, and password.

 Here it shows the storage path
 for UNIX –based and WINDOWS
 operating system.
 Both UNIX and WINDOWS
 share one-to-one mapping.
Requires no hardware.
Each solution has its strengths and limitations with regard to level
of confidentiality, ease-of-use, performance and the flexibility to
set policies. Example of Software based confidential data storage is :
Generalized Encryption Programs-can encrypt and decrypt
files using variety of ciphers and encryption modes.
Flexibility-Changing Security Polices.
User model-Invoke the programs with necessary key/password.
Performance-Slower because can’t take full advantage of VFS.
Differ from software ones :
Cryptographic functionality is either hard-coded into the hardware
or into an external specialty device.
More Rigid and User cannot change authentication mechanisms.
Much faster than any software.
Example : Secure Flash Drives.
Cannot be Reconfigured to meet changes in confidential policy.
A full secure data lifecycle implies that data is not only stored
     securely, but deleted in a secure manner as well.
     Confidential data deletion can be accomplished in 3 ways:
     Physical Destruction: Pulverization, Acid bath.
     Data Overwriting:
 software applications-Overwrite the contents of a file,delete the
file normally, and then overwrite all free space in the partition,erase
the entire partition or disk.
file systems-FoSgen [Joukov et al. 2006] and Purgefs [Joukov and
Zadok 2005], which are stackable file systems built in FiST [Zadok
and Nieh 2000].
     Encryption with key erasure : It is best to delete the encryption
     key(s) securely through physical destruction or overwriting
     methods
By compiling experiences and constraints of various
confidential storage and deletion techniques, we hope that
knowledge from research areas that have been evolving
independently can cross disseminate, to form solutions that are
tolerant to a broader range of constraints.
ANY QURIES?

More Related Content

What's hot

What's hot (20)

steganography
steganographysteganography
steganography
 
Smart eye
Smart eyeSmart eye
Smart eye
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Cryptography
CryptographyCryptography
Cryptography
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Network Security
Network Security Network Security
Network Security
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 

Viewers also liked

Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)maheshh1947
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionsnehal1010
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentationerrajagrawal
 
Wi Vi technology
Wi Vi technology Wi Vi technology
Wi Vi technology Liju Thomas
 
Light tree
Light tree Light tree
Light tree Priya K
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Blancco
 
How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?Western Digital
 
GIS and Mapping Software Introduction
GIS and Mapping Software IntroductionGIS and Mapping Software Introduction
GIS and Mapping Software IntroductionMEASURE Evaluation
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentationguestac67362
 
Optical computing hardcopy
Optical computing hardcopyOptical computing hardcopy
Optical computing hardcopydivyajyothi405
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentationguestac67362
 
Opticalcomputing final
Opticalcomputing finalOpticalcomputing final
Opticalcomputing finaldivyajyothi405
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesakhila immadisetty
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYVikram raja
 

Viewers also liked (20)

Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Wi vi presentation
Wi vi presentationWi vi presentation
Wi vi presentation
 
Finger reader
Finger readerFinger reader
Finger reader
 
Rain technology
Rain technologyRain technology
Rain technology
 
Wi Vi technology
Wi Vi technology Wi Vi technology
Wi Vi technology
 
Light tree
Light tree Light tree
Light tree
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?How Does Erasure Coding Protect Data?
How Does Erasure Coding Protect Data?
 
GIS and Mapping Software Introduction
GIS and Mapping Software IntroductionGIS and Mapping Software Introduction
GIS and Mapping Software Introduction
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
 
Optical computing hardcopy
Optical computing hardcopyOptical computing hardcopy
Optical computing hardcopy
 
Psychokinesis
PsychokinesisPsychokinesis
Psychokinesis
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Opticalcomputing final
Opticalcomputing finalOpticalcomputing final
Opticalcomputing final
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
Vlans
VlansVlans
Vlans
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
EYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGYEYE TRACKING TECHNOLOGY
EYE TRACKING TECHNOLOGY
 

Similar to Confidential data storage and deletion

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storagechennaijp
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMcscpconf
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 

Similar to Confidential data storage and deletion (20)

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Phase1
Phase1Phase1
Phase1
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Abstract
AbstractAbstract
Abstract
 

Recently uploaded

Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 

Recently uploaded (20)

Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 

Confidential data storage and deletion

  • 2. Introduction Security Background  Commonly used Encryption Algorithms  Traditional modes of operation Confidential Data storage  Software based Confidential Data Storage  Hardware based Confidential Data Storage Deletion Conclusion
  • 3. What is the need of storing the data in a confidential manner? Cost of electronic storage declines rapidly.  Theft of electronic storage occurred much more frequently. Sensitive information stored in an insecure manner is vulnerable to theft.  Two major components exist to safeguard the privacy of data on electronic storage media : Data must be stored in a confidential manner to prevent unauthorized access. At the time of disposal, confidential data must be removed from the storage media
  • 4. The general concept of secure handling of data is composed of three aspects: Confidentiality- involves ensuring that information is not read by unauthorized persons. Using encryption- to store data or authenticating valid users are example means by which confidentiality is achieved. Integrity- ensures that the information is not altered by unauthorized persons . To verify- Combine a message authentication code with sensitive data. Many techniques of confidential storage and deletion involve cryptography:  Commonly Used Encryption Algorithms  Traditional Modes of Operation
  • 5. Encryption -used in cryptography “to scramble information so that only someone knowing the appropriate secret can obtain the original information (through decryption)”. The secret is often a key of n random bits of zeros and ones. Common symmetric key encryption algorithms : the Data Encryption Standard (DES), Triple-DES (3DES), and the Advanced Encryption Standard (AES).  DES-a key size of 56 bits and a block size of 64 bits.Criticism-56-bit key length is too short. With newer CPUs, the key space of 256 can be enumerated. 3DES-built to enlarge the DES key space. Criticism-the key space to 2168, but the strength of 3DES is only twice as strong as DES. AES-block length of 128 bits and supports key lengths of 128, 192, and 256 bits.
  • 6. Electronic Codebook(ECB)- is the simplest mode of operation, and does not use an IV(initialization vector) .With a key, Pi as the ith block of plaintext, and Ci as the ith block of cipher text, the encryption is performed as Ci = Ekey (Pi), and decryption is performed as Pi = Dkey (Ci). cipher-block-chaining (CBC) Cipher-Block-Chaining (CBC)-slightly more complicated and uses an IV, Encryption of the first block of plaintext is performed as C1 =Ekey (P1 Å IV), where C1 is the 1st block of cipher text; IV is the random, non-secret initialization vector; and P1 is the 1st block of plaintext. Subsequent blocks of plaintext are encrypted as Ci = Ekey (Pi Å Ci-1). In the same manner, the first block of cipher text is decrypted as P1 = Dkey (C1) Å IV, and the subsequent blocks of cipher text are decrypted as Pi = Dkey (Ci) Å Ci-1. Contd…
  • 7. Mode of Encryption Performance Decryption performance operation ECB Good: ECB do not depend on Good: ECB do not depend on previous previous blocks. Multiple blocks blocks. Multiple blocks can be encrypted can be encrypted and decrypted in and decrypted in parallel. parallel CBC Poor: CBC ciphertext equires the Good: CFB and CBC decryption of one block previous ciphertext block as input. requires only one previous ciphertext block In the case of updates,CBC require as input. Multiple blocks can be decrypted re-encrypting the remainder of a in parallel. file, since all subsequent ciphertext blocks depend on the current ciphertext block. Thus, encryption is not parallized.
  • 8. Confidential storage methods are difficult to implement for reasons including complexity of method setup, difficulty of conversion of prior methods to new secure methods, training, key management, and password. Here it shows the storage path for UNIX –based and WINDOWS operating system. Both UNIX and WINDOWS share one-to-one mapping.
  • 9. Requires no hardware. Each solution has its strengths and limitations with regard to level of confidentiality, ease-of-use, performance and the flexibility to set policies. Example of Software based confidential data storage is : Generalized Encryption Programs-can encrypt and decrypt files using variety of ciphers and encryption modes. Flexibility-Changing Security Polices. User model-Invoke the programs with necessary key/password. Performance-Slower because can’t take full advantage of VFS.
  • 10. Differ from software ones : Cryptographic functionality is either hard-coded into the hardware or into an external specialty device. More Rigid and User cannot change authentication mechanisms. Much faster than any software. Example : Secure Flash Drives. Cannot be Reconfigured to meet changes in confidential policy.
  • 11. A full secure data lifecycle implies that data is not only stored securely, but deleted in a secure manner as well. Confidential data deletion can be accomplished in 3 ways: Physical Destruction: Pulverization, Acid bath. Data Overwriting:  software applications-Overwrite the contents of a file,delete the file normally, and then overwrite all free space in the partition,erase the entire partition or disk. file systems-FoSgen [Joukov et al. 2006] and Purgefs [Joukov and Zadok 2005], which are stackable file systems built in FiST [Zadok and Nieh 2000]. Encryption with key erasure : It is best to delete the encryption key(s) securely through physical destruction or overwriting methods
  • 12. By compiling experiences and constraints of various confidential storage and deletion techniques, we hope that knowledge from research areas that have been evolving independently can cross disseminate, to form solutions that are tolerant to a broader range of constraints.