COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Wednesday Seminars - Department of Computer Science and Technology > How to Protect your Data by Eliminating Trusted Storage Infrastructure
How to Protect your Data by Eliminating Trusted Storage InfrastructureAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Mateja Jamnik. Storage systems typically trust some amount of infrastructure to behave correctly—the network, a file server, a certificate authority. Many interpret “protecting data” to mean building a security fence around this trusted infrastructure. Unfortunately, people frequently fail to build high enough fences. Moreover, even low fences inconvenience honest people by limiting the ways in which they can access, update, and manage data. An alternative is to design systems that cope with compromised infrastructure. This talk will present a set of techniques that progressively chip away at the security requirements of ordinary network file systems—eliminating the need to trust the network, eliminating the need to rely on certificate authorities, eliminating the need to trust replicas of popular data, mitigating the effects of compromised clients and passwords. Finally, I’ll show how clients can detect attempts to tamper with data even after an attacker completely compromises the file server. All of these techniques have been realized in usable systems, demonstrating that practical, strong data security need not come at the cost of high fences and their associated management constraints. This talk is part of the Wednesday Seminars - Department of Computer Science and Technology series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other lists'Expanding Horizons' - Cambridge MedSoc Talks International Cambridge University Eco RacingOther talksInvestigating the Functional Anatomy of Motion Processing Pathways in the Human Brain Modular Algorithm Analysis Frontiers in paediatric cancer research Arriva Trains Wales by Tom Joyner SciBarHealth: Heart Month Beacon Salon # 8 The Dawn of the Antibiotic Age The Digital Doctor: Hope, Hype, and Harm at the Dawn of Medicine’s Computer Age Graph Legendrians and SL2 local systems Fumarate hydratase and renal cancer: oncometabolites and beyond How to Deploy Psychometrics Successfully in an Organisation 'Cryptocurrency and BLOCKCHAIN – PAST, PRESENT AND FUTURE' |