SlideShare a Scribd company logo
1 of 19
Download to read offline
Cloud  Puzzle  Lock
Senad  ARUCH
SENIOR SECURITY SPECIALIST
Communication  Valley  -­ Reply
Davide Cioccia
Nicola  Gobbo
Alessandra  Pranzo
2
Why  we  are  using  the  cloud  drive  services?
• always  online,  backup,  redundancy.
• possibility  to  share  files  in  faster  way
• more  space  than  classic  email  services
• flexibility  and  easy  share
3
What  we  store  in  this  cloud  drives?
• to  store  our  documents,  photos  and  other  files
• to  backup  our  mobile  devices
• to  share  our  company  documents
• for  online  backup
and  more  …
4
How  we  protect  our  files:
• Encryptions.
• Hiding  somewhere
• Password  protection.
5
How  secure  is  this  cloud  drive?
• username  and  password  
• some  of  them  offers  2  way  authentication
• some  of  them  are  encrypted
6
Confirmed  hacks  until  today:
• NSA.
• Malware.
• Phishing  attacks.
7
Cloud  Puzzle  Lock
Communication  Valley  -­ Reply
Presents  
8
Why  we  build  and  our  aim  here….
Cloud Puzzle Lock helps users to use the cloud drives in
more secure way. NSA interceptions and industrial
espionage is main risk against todays privacy and
integrity. The biggest challenge in this project is to use
the technology that we have in our hands.
Why?
CPL use more than four security levels distributed
around the globe. Every file that users upload using the
CPL solution will became a real puzzle with multiple
encryptions.
How?
9
Why  we  build  and  our  aim  here….
How it works?
When we request a file stored on distributed system the CPL with collect the puzzles,
decrypt and build the whole puzzle “file” for us in full automatic way. CPL is also capable
to use Two-­‐man rule to encrypt and distribute a confidential data.
How secure is?
CPL security will be very hard to crack because all
well know cloud drives like DropBox and
GoogleDrive uses a two-­‐way authentication. And
the attacker must hack all four cloud drives to
retrieve the all encrypted puzzle pieces. This is like
impossible.
10
Why  we  build  and  our  aim  here….
Who is the target?
CPL can be sold like service or like appliance with preinstalled CPL based on Hadoop
clusters distributed around the globe for Government, Intelligence agencies and big
companies where they need to access and share files in easy and secure way.
…but why not you?
11
More  than  one  person  encryption  and  decryption  NATO standard.
How  secure  you  want  to  make  
your  files?
The two-­‐man  rule is  a  control  
mechanism  designed  to  achieve  a  
high  level  of  security  for  especially  
critical  material  or  operations.  
Under  this  rule  all  access  and  actions  requires  the  presence  of  two  authorized  people  at  
all  times.
For  Cloud  Puzzle  Lock  this  is  the  minimum.  It  can  simulate  the  N-­‐man  rule  option  to  
grant  more  protection.  If  you  want,  you  can  open  the  file  only  if  you  have  all  people  
acknowledgement.  
12
Classic  Way  of  stored  files  in  the  cloud  drives.
The  risk  in  this  case  is  that  the  files  are  in  
WHOLE so  if  your  login  details  get  
compromised  you  files  are  accessible.
secret.pdf
10.MB
File  Browser:
13
Classic  Way  of  stored  files  in  the  cloud  drives.
Even  if  your  files  are  encrypted  they  are  not  
in  safe  because  of  the  NSA,  we  all  know  that  
NSA  can  crack  any  type  of  encryption.  
secret.pdf.gpg
10.MB
File  Browser:
14
Classic  Way  of  stored  files  in  the  cloud  drives.
Without  the  Cloud  Puzzle  Lock  the  file  
structure  is  like  this.
secret.pdf
10.MB
File  Browser:
prototype.pdf
6.MB
Plan.docx
2.MB
15
Cloud  Puzzle  Lock  way  of  stored  files  in  the  cloud  drives:  process.
secret.pdf
10.MB
secret.pdf.pl4
2.5MB
secret.pdf.pl2
2.5MB
secret.pdf.pl3
2.5MB
secret.pdf.pl1
2.5MB
C.panel
secret.pdf
10.MB
secret.pdf.p1
2.5MB
secret.pdf.p4
2.5MB
secret.pdf.p3
2.5MB
secret.pdf.p2
2.5MB
drag&drop
Splitting  the  file  
multiple  to  how  
many  cloud  
drives  user  have.
secret.pdf.pl4
2.5MB
secret.pdf.pl2
2.5MB
secret.pdf.pl3
2.5MB
secret.pdf.pl1
2.5MB
Encrypting  the  
puzzle  piece  with  
1th  private  PGP  key
Encrypting  the  
puzzle  piece  with  
4th  private  PGP  
keyEncrypting  the  
puzzle  piece  with  
3th  private  PGP  key
Encrypting   the   puzzle  
piece   with  2nd   private  
PGP  key
1
2
3
3
3
3
4
4
4 4
16
File  Browser:
plan.docx.pl1
0.5.MB
Cloud  Puzzle  Lock  way  of  stored  files  in  the  cloud  drives:  Result.
secret.pdf.pl2
2.5.MB
File  Browser:
plan.docx.pl2
0.5.MB
secret.pdf.pl3
2.5.MB
File  Browser:
plan.docx.pl3
0.5.MB
secret.pdf.pl4
2.5.MB
File  Browser:
plan.docx.pl4
0.5.MB
prototype.pdf.pl1
1.5.MB
secret.pdf.pl1
2.5.MB
prototype.pdf.pl3
1.5.MB
prototype.pdf.pl2
1.5.MB
prototype.pdf.pl4
1.5.MB
17
…and  in  your  private  FTP  Server
FTP  server
You  can  store  one  puzzle  piece
in  your  private  FTP  Server.
With  this  solution  no-­‐one  who  hack  your  cloud  repository  
can  rebuild  your  private  file.
There  is  only  one-­‐way:  Hack  your  private  FTP  Server
18
Puzzle  lock  is  a  new  way  to  store  and  share  your  
TOP  Secret  files  with  unique  technology  against  the  
interceptions.
The  system  uses  the  storage  and  computing  power  
of  the  well  knows  cloud  drive  providers.
The  system  is  splitting  the  files  to  a  puzzle  on  the  
cloud  drives  its  like  a  HDFS  from  Hadoop.
Every  puzzle  piece  is  encrypted  with  different  private  key
Every  puzzle  piece  is  stored  on  separated  cloud  drive
But  you  will  see  one  file&one drive
Thanks.
Senad  ARUCH  s.aruch@reply.it

More Related Content

What's hot

PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01Qaisar Ayub
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptbarysteyn
 
Mo and Tao 魔与道
Mo and Tao 魔与道Mo and Tao 魔与道
Mo and Tao 魔与道Austin Chou
 
Collecting user-data-socially-responsibly
Collecting user-data-socially-responsiblyCollecting user-data-socially-responsibly
Collecting user-data-socially-responsiblyKonark modi
 
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGAnkit Mehta
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2Olle E Johansson
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersGökhan Şengün
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Keynote - Closing the TLS Authentication Gap
Keynote - Closing the TLS Authentication GapKeynote - Closing the TLS Authentication Gap
Keynote - Closing the TLS Authentication GapSecurityTube.Net
 
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPR
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPRMongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPR
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPRMongoDB
 
Cryptography
CryptographyCryptography
CryptographyMilap Oza
 
Defense in Depth: Lessons Learned Securing 200,000 Sites
Defense in Depth: Lessons Learned Securing 200,000 SitesDefense in Depth: Lessons Learned Securing 200,000 Sites
Defense in Depth: Lessons Learned Securing 200,000 SitesPantheon
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...SecuRing
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
THOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesTHOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesJohn Bambenek
 
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSThotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSJohn Bambenek
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 

What's hot (20)

PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
Cryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScriptCryptography In The Browser Using JavaScript
Cryptography In The Browser Using JavaScript
 
Mo and Tao 魔与道
Mo and Tao 魔与道Mo and Tao 魔与道
Mo and Tao 魔与道
 
Collecting user-data-socially-responsibly
Collecting user-data-socially-responsiblyCollecting user-data-socially-responsibly
Collecting user-data-socially-responsibly
 
Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPG
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
Practical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for DevelopersPractical Cryptography and Security Concepts for Developers
Practical Cryptography and Security Concepts for Developers
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Keynote - Closing the TLS Authentication Gap
Keynote - Closing the TLS Authentication GapKeynote - Closing the TLS Authentication Gap
Keynote - Closing the TLS Authentication Gap
 
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPR
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPRMongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPR
MongoDB World 2019: MongoDB Cluster Design: From Redundancy to GDPR
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Cryptography
CryptographyCryptography
Cryptography
 
Defense in Depth: Lessons Learned Securing 200,000 Sites
Defense in Depth: Lessons Learned Securing 200,000 SitesDefense in Depth: Lessons Learned Securing 200,000 Sites
Defense in Depth: Lessons Learned Securing 200,000 Sites
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
 
Pgp
PgpPgp
Pgp
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
THOTCON - The War over your DNS Queries
THOTCON - The War over your DNS QueriesTHOTCON - The War over your DNS Queries
THOTCON - The War over your DNS Queries
 
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSThotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 

Similar to Securely store files with Cloud Puzzle Lock

Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computingJuber Mangure
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Future Insights
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Why is a Cloud Backup Better?
Why is a Cloud Backup Better? Why is a Cloud Backup Better?
Why is a Cloud Backup Better? Chris Bilodeau
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 

Similar to Securely store files with Cloud Puzzle Lock (20)

Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Final cloud computing
Final cloud computingFinal cloud computing
Final cloud computing
 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
NIDHI KULKARNI.pptx
NIDHI KULKARNI.pptxNIDHI KULKARNI.pptx
NIDHI KULKARNI.pptx
 
Why is a Cloud Backup Better?
Why is a Cloud Backup Better? Why is a Cloud Backup Better?
Why is a Cloud Backup Better?
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
G044053337
G044053337G044053337
G044053337
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 

More from Senad Aruc

Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Senad Aruc
 
Revealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C ServerRevealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C ServerSenad Aruc
 
Target List of Hesper-BOT Malware
Target List of Hesper-BOT MalwareTarget List of Hesper-BOT Malware
Target List of Hesper-BOT MalwareSenad Aruc
 
State of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards RevealedState of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards RevealedSenad Aruc
 
Infostealer Botnet Reveal
Infostealer Botnet RevealInfostealer Botnet Reveal
Infostealer Botnet RevealSenad Aruc
 
One Shot Eight Bank
One Shot Eight BankOne Shot Eight Bank
One Shot Eight BankSenad Aruc
 
Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.Senad Aruc
 

More from Senad Aruc (7)

Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
 
Revealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C ServerRevealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C Server
 
Target List of Hesper-BOT Malware
Target List of Hesper-BOT MalwareTarget List of Hesper-BOT Malware
Target List of Hesper-BOT Malware
 
State of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards RevealedState of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards Revealed
 
Infostealer Botnet Reveal
Infostealer Botnet RevealInfostealer Botnet Reveal
Infostealer Botnet Reveal
 
One Shot Eight Bank
One Shot Eight BankOne Shot Eight Bank
One Shot Eight Bank
 
Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.
 

Securely store files with Cloud Puzzle Lock

  • 1. Cloud  Puzzle  Lock Senad  ARUCH SENIOR SECURITY SPECIALIST Communication  Valley  -­ Reply Davide Cioccia Nicola  Gobbo Alessandra  Pranzo
  • 2. 2 Why  we  are  using  the  cloud  drive  services? • always  online,  backup,  redundancy. • possibility  to  share  files  in  faster  way • more  space  than  classic  email  services • flexibility  and  easy  share
  • 3. 3 What  we  store  in  this  cloud  drives? • to  store  our  documents,  photos  and  other  files • to  backup  our  mobile  devices • to  share  our  company  documents • for  online  backup and  more  …
  • 4. 4 How  we  protect  our  files: • Encryptions. • Hiding  somewhere • Password  protection.
  • 5. 5 How  secure  is  this  cloud  drive? • username  and  password   • some  of  them  offers  2  way  authentication • some  of  them  are  encrypted
  • 6. 6 Confirmed  hacks  until  today: • NSA. • Malware. • Phishing  attacks.
  • 7. 7 Cloud  Puzzle  Lock Communication  Valley  -­ Reply Presents  
  • 8. 8 Why  we  build  and  our  aim  here…. Cloud Puzzle Lock helps users to use the cloud drives in more secure way. NSA interceptions and industrial espionage is main risk against todays privacy and integrity. The biggest challenge in this project is to use the technology that we have in our hands. Why? CPL use more than four security levels distributed around the globe. Every file that users upload using the CPL solution will became a real puzzle with multiple encryptions. How?
  • 9. 9 Why  we  build  and  our  aim  here…. How it works? When we request a file stored on distributed system the CPL with collect the puzzles, decrypt and build the whole puzzle “file” for us in full automatic way. CPL is also capable to use Two-­‐man rule to encrypt and distribute a confidential data. How secure is? CPL security will be very hard to crack because all well know cloud drives like DropBox and GoogleDrive uses a two-­‐way authentication. And the attacker must hack all four cloud drives to retrieve the all encrypted puzzle pieces. This is like impossible.
  • 10. 10 Why  we  build  and  our  aim  here…. Who is the target? CPL can be sold like service or like appliance with preinstalled CPL based on Hadoop clusters distributed around the globe for Government, Intelligence agencies and big companies where they need to access and share files in easy and secure way. …but why not you?
  • 11. 11 More  than  one  person  encryption  and  decryption  NATO standard. How  secure  you  want  to  make   your  files? The two-­‐man  rule is  a  control   mechanism  designed  to  achieve  a   high  level  of  security  for  especially   critical  material  or  operations.   Under  this  rule  all  access  and  actions  requires  the  presence  of  two  authorized  people  at   all  times. For  Cloud  Puzzle  Lock  this  is  the  minimum.  It  can  simulate  the  N-­‐man  rule  option  to   grant  more  protection.  If  you  want,  you  can  open  the  file  only  if  you  have  all  people   acknowledgement.  
  • 12. 12 Classic  Way  of  stored  files  in  the  cloud  drives. The  risk  in  this  case  is  that  the  files  are  in   WHOLE so  if  your  login  details  get   compromised  you  files  are  accessible. secret.pdf 10.MB File  Browser:
  • 13. 13 Classic  Way  of  stored  files  in  the  cloud  drives. Even  if  your  files  are  encrypted  they  are  not   in  safe  because  of  the  NSA,  we  all  know  that   NSA  can  crack  any  type  of  encryption.   secret.pdf.gpg 10.MB File  Browser:
  • 14. 14 Classic  Way  of  stored  files  in  the  cloud  drives. Without  the  Cloud  Puzzle  Lock  the  file   structure  is  like  this. secret.pdf 10.MB File  Browser: prototype.pdf 6.MB Plan.docx 2.MB
  • 15. 15 Cloud  Puzzle  Lock  way  of  stored  files  in  the  cloud  drives:  process. secret.pdf 10.MB secret.pdf.pl4 2.5MB secret.pdf.pl2 2.5MB secret.pdf.pl3 2.5MB secret.pdf.pl1 2.5MB C.panel secret.pdf 10.MB secret.pdf.p1 2.5MB secret.pdf.p4 2.5MB secret.pdf.p3 2.5MB secret.pdf.p2 2.5MB drag&drop Splitting  the  file   multiple  to  how   many  cloud   drives  user  have. secret.pdf.pl4 2.5MB secret.pdf.pl2 2.5MB secret.pdf.pl3 2.5MB secret.pdf.pl1 2.5MB Encrypting  the   puzzle  piece  with   1th  private  PGP  key Encrypting  the   puzzle  piece  with   4th  private  PGP   keyEncrypting  the   puzzle  piece  with   3th  private  PGP  key Encrypting   the   puzzle   piece   with  2nd   private   PGP  key 1 2 3 3 3 3 4 4 4 4
  • 16. 16 File  Browser: plan.docx.pl1 0.5.MB Cloud  Puzzle  Lock  way  of  stored  files  in  the  cloud  drives:  Result. secret.pdf.pl2 2.5.MB File  Browser: plan.docx.pl2 0.5.MB secret.pdf.pl3 2.5.MB File  Browser: plan.docx.pl3 0.5.MB secret.pdf.pl4 2.5.MB File  Browser: plan.docx.pl4 0.5.MB prototype.pdf.pl1 1.5.MB secret.pdf.pl1 2.5.MB prototype.pdf.pl3 1.5.MB prototype.pdf.pl2 1.5.MB prototype.pdf.pl4 1.5.MB
  • 17. 17 …and  in  your  private  FTP  Server FTP  server You  can  store  one  puzzle  piece in  your  private  FTP  Server. With  this  solution  no-­‐one  who  hack  your  cloud  repository   can  rebuild  your  private  file. There  is  only  one-­‐way:  Hack  your  private  FTP  Server
  • 18. 18 Puzzle  lock  is  a  new  way  to  store  and  share  your   TOP  Secret  files  with  unique  technology  against  the   interceptions. The  system  uses  the  storage  and  computing  power   of  the  well  knows  cloud  drive  providers. The  system  is  splitting  the  files  to  a  puzzle  on  the   cloud  drives  its  like  a  HDFS  from  Hadoop. Every  puzzle  piece  is  encrypted  with  different  private  key Every  puzzle  piece  is  stored  on  separated  cloud  drive But  you  will  see  one  file&one drive