|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
How to Protect your Data by Eliminating Trusted Storage Infrastructure
If you have a question about this talk, please contact Mateja Jamnik.
Storage systems typically trust some amount of infrastructure to behave correctly—the network, a file server, a certificate authority. Many interpret “protecting data” to mean building a security fence around this trusted infrastructure. Unfortunately, people frequently fail to build high enough fences. Moreover, even low fences inconvenience honest people by limiting the ways in which they can access, update, and manage data.
An alternative is to design systems that cope with compromised infrastructure. This talk will present a set of techniques that progressively chip away at the security requirements of ordinary network file systems—eliminating the need to trust the network, eliminating the need to rely on certificate authorities, eliminating the need to trust replicas of popular data, mitigating the effects of compromised clients and passwords.
Finally, I’ll show how clients can detect attempts to tamper with data even after an attacker completely compromises the file server. All of these techniques have been realized in usable systems, demonstrating that practical, strong data security need not come at the cost of high fences and their associated management constraints.
This talk is part of the Computer Laboratory Wednesday Seminars series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsEarly Modern British and Irish History Seminar talks Information Structure
Other talksRisk prediction using common genetic variants The 2015 Vaccine Summit Angela Leighton, poet The 2015 Controlling Cancer Summit What is to be done about community violence? A Micro-Historical Approach to Global China: The Daily Life of Europeans in Beijing in the Long 18th Century