|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
How to Protect your Data by Eliminating Trusted Storage Infrastructure
If you have a question about this talk, please contact Mateja Jamnik.
Storage systems typically trust some amount of infrastructure to behave correctly—the network, a file server, a certificate authority. Many interpret “protecting data” to mean building a security fence around this trusted infrastructure. Unfortunately, people frequently fail to build high enough fences. Moreover, even low fences inconvenience honest people by limiting the ways in which they can access, update, and manage data.
An alternative is to design systems that cope with compromised infrastructure. This talk will present a set of techniques that progressively chip away at the security requirements of ordinary network file systems—eliminating the need to trust the network, eliminating the need to rely on certificate authorities, eliminating the need to trust replicas of popular data, mitigating the effects of compromised clients and passwords.
Finally, I’ll show how clients can detect attempts to tamper with data even after an attacker completely compromises the file server. All of these techniques have been realized in usable systems, demonstrating that practical, strong data security need not come at the cost of high fences and their associated management constraints.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsCentre of African Studies Michaelmas Seminars Creative Research at Museum of Archaeology & Anthropology dh539
Other talksCan Future Energy Needs be met Sustainably? Cell morphogenesis across scales: from molecular processes to cell-scale behaviour Vascular smooth muscle cell plasticity On reasonable doubt Post-war Politics in Southern Europe Evidence for lepton universality violation in semileptonic B decays