|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
How to Protect your Data by Eliminating Trusted Storage Infrastructure
If you have a question about this talk, please contact Mateja Jamnik.
Storage systems typically trust some amount of infrastructure to behave correctly—the network, a file server, a certificate authority. Many interpret “protecting data” to mean building a security fence around this trusted infrastructure. Unfortunately, people frequently fail to build high enough fences. Moreover, even low fences inconvenience honest people by limiting the ways in which they can access, update, and manage data.
An alternative is to design systems that cope with compromised infrastructure. This talk will present a set of techniques that progressively chip away at the security requirements of ordinary network file systems—eliminating the need to trust the network, eliminating the need to rely on certificate authorities, eliminating the need to trust replicas of popular data, mitigating the effects of compromised clients and passwords.
Finally, I’ll show how clients can detect attempts to tamper with data even after an attacker completely compromises the file server. All of these techniques have been realized in usable systems, demonstrating that practical, strong data security need not come at the cost of high fences and their associated management constraints.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsLaw Related Talks at Hughes Hall Qualitative Research Forum - Open meetings Centre of African Studies and the Department of the History and Philosophy of Science
Other talksTo be confirmed Leadership for Engineers - How to become an effective and valued leader Autoimmune encephalitis for psychiatrists Plenary Lecture 2: Theoretical principles of virus-host population dynamics The changing genome: signatures of mutagenesis in human cells Stability of de Sitter space under Lorentzian constant mean curvature flow