Vanish Technology
Overview
Computing and act through the net make it virtually not possible to go away the past behind. School Facebook posts or footage will resurface during employment interview; a lost or taken pc (portable computer) will expose personal photos or messages; or a legal investigation will subpoena the whole contents of a home or work computer, uncovering incriminating or simply embarrassing details from the past.
Our analysis seeks to safeguard the privacy of past, archived knowledge — like copies of emails maintained by associate email supplier — against accidental, malicious, and legal attacks. Specifically, we tend to would like to confirm that all copies of certain knowledge become undecipherable when a user-specified time, with none specific action on the a part of a user, without having to trust any single third party to perform the deletion, Associate in Nursing although an offender obtains each a cached copy of that information and therefore the user's scientific discipline keys and password
Vanish could be a research aimed at meeting this challenge through a completely unique integration of scientific discipline techniques with distributed systems. we have a tendency to at the start enforced a proof-of-concept Vanish model that uses the million-node Vuze Bit Torrent DHT to make self-destructing information. For an outline of our Vuze-based self-destructing system, please check with our paper.
Computing and act through the net make it virtually not possible to go away the past behind. School Facebook posts or footage will resurface during employment interview; a lost or taken pc (portable computer) will expose personal photos or messages; or a legal investigation will subpoena the whole contents of a home or work computer, uncovering incriminating or simply embarrassing details from the past.
Our analysis seeks to safeguard the privacy of past, archived knowledge — like copies of emails maintained by associate email supplier — against accidental, malicious, and legal attacks. Specifically, we tend to would like to confirm that all copies of certain knowledge become undecipherable when a user-specified time, with none specific action on the a part of a user, without having to trust any single third party to perform the deletion, Associate in Nursing although an offender obtains each a cached copy of that information and therefore the user's scientific discipline keys and password
Vanish could be a research aimed at meeting this challenge through a completely unique integration of scientific discipline techniques with distributed systems. we have a tendency to at the start enforced a proof-of-concept Vanish model that uses the million-node Vuze Bit Torrent DHT to make self-destructing information. For an outline of our Vuze-based self-destructing system, please check with our paper.
Research Contributions
- Overall, we've so far created many important contributions to the self-destructing knowledge drawback and beyond; a number of these contributions are already revealed, whereas others are still in the works:
We outlined an ambitious analysis agenda for self-destructing knowledge within the cloud. a major demand during this agenda is deletion while not trusting any single party. This agenda is introduced in an exceedingly paper that appeared at USENIX Security '09. - We designed and designed a model distributed-trust self-destructing information system based on the Vuze DHT. an outline and preliminary analysis of our example is enclosed in our USENIX Security '09 paper
- Following the demonstration of Vuze's status to Sybil data-crawling attacks, we tend to designed, enforced and deployed security-enhancing options to the live million-node Vuze DHT. we have a tendency to are presently acting on a paper that demonstrates these options.
- We designed new different structures for self-destructing knowledge supported geographically distributed servers and hierarchal secret sharing. Our next paper also will embody descriptions of those new structures.
- Inspired by our efforts to form the Vuze DHT mildew Vanish higher, we have a tendency to design a next-generation "active" DHT, referred to them as the extraterrestrial object, that expands the appliance house for key-value storage systems by building support for application-specific customizations into these systems. A paper describing estraterrestrial body can seem at OSDI '10.
Read More:
- What Are The Stages And Technology Drivers Of IT Infrastructure Evolution?
- Internet Security: 10 Effective Ways to Keep Personal Data Safe from Peepers.
- What are the Challenges of Managing IT Infrastructure and Management Solutions?
- Which Features Of Organizations Managers Need To Know About Building And To Use Information Systems Successfully? What Is The Impact Of Information Systems On Organizations?
0 comments:
Post a Comment