custos
play

Custos A Flexibly Secure Key-Value Storage Platform Andy Sayler - PowerPoint PPT Presentation

Custos A Flexibly Secure Key-Value Storage Platform Andy Sayler www.andysayler.com University of Colorado, Boulder Masters of Science Computer Science Trust Who do we trust with our data? Today... Feature Provider Features Feature


  1. Custos A Flexibly Secure Key-Value Storage Platform Andy Sayler www.andysayler.com University of Colorado, Boulder Masters of Science Computer Science

  2. Trust

  3. Who do we trust with our data?

  4. Today...

  5. Feature Provider Features

  6. Feature Provider Features Trust

  7. Feature Provider User Data Features Trust

  8. Feature Provider User Data Unrestricted Access Features Trust

  9. Conflicts of Interest Lack of Control Absence of Oversight

  10. So you don’t use cloud services...

  11. How can we control and protect our data?

  12. Encryption

  13. Encrypt “My Secret” TXkgU2VjcmV0 Decrypt

  14. How does it help us?

  15. X

  16. But what about the keys?

  17. ? X

  18. X

  19. Key Management Challenges

  20. Multi-Device Sync

  21. X

  22. Out-of-Band Sharing

  23. X

  24. Autonomous Access

  25. X X

  26. The Cloud

  27. Feature Provider User Data Unrestricted Access Features Trust

  28. Feature Provider Encrypted User Data Features

  29. Feature Provider Encrypted User Data X No Access Features

  30. Feature Provider Encrypted User Data X No Access

  31. Encryption is broken

  32. Lack of key access

  33. X

  34. X

  35. Feature Provider Encrypted User Data X No Access Features

  36. Lack of flexibility

  37. X X

  38. Security Accessibility

  39. Security Accessibility Fixed Point Traditional Encryption Systems

  40. Ill-suited for Modern Application Difficult to Use Doesn’t Solve the Real Problem

  41. Encryption is broken

  42. Encryption is fine

  43. Encryption is fine Key storage is broken

  44. To fix key storage...

  45. Flexibility Centralization

  46. Flexibility

  47. Security Accessibility Flexible Points Flexible Encryption Systems

  48. X X

  49. Centralization

  50. Feature Provider User Data Unrestricted Access Features Trust

  51. Feature Provider User Data Features Trust

  52. Feature Provider User Data Trust Provider Features Trust

  53. Feature Provider Encrypted User Data Trust Provider Encryption Keys Features Trust

  54. Feature Provider Encrypted User Data Trust Provider Encryption Keys Controlled Access Features Trust

  55. Feature Provider Encrypted User Data Trust Provider Controlled Access Encryption By Proxy Keys Controlled Access Features Trust

  56. Data Host Encrypted User Data Trust Provider Controlled Feature Provider Encryption Access Keys Features Trust

  57. Custos

  58. “Secret Storage as a Service”

  59. “Key Storage as a Service”

  60. Central Key:Value Storage Flexible Access Control Access Auditing

  61. Custos Server

  62. Custos Server Key:Value Store

  63. Custos Server Key:Value Store Management Auditing Data Subsystem Subsystem Subsystem

  64. Custos Server Key:Value Store Authentication Management Auditing Data Subsystem Subsystem Subsystem Subsystem

  65. Custos Server Key:Value Store Authentication Management Auditing Data Subsystem Subsystem Subsystem Subsystem Auth Plugins

  66. Custos Server Key:Value Store Authentication Management Auditing Data Subsystem Subsystem Subsystem Subsystem Access Control Subsystem Auth Plugins

  67. Custos Server Key:Value Store Authentication Management Auditing Data Subsystem Subsystem Subsystem Subsystem Access Control Subsystem API Auth Plugins

  68. Custos Server Key:Value Store Authentication Management Auditing Data Subsystem Subsystem Subsystem Subsystem Access Control Subsystem API Auth Plugins SSL Custos API Custos API Custos API Application Application Application System A System B System C

  69. Application Domains

  70. File Systems

  71. Mail Trusted Alice Bob Daemon Collaborators X Password Auth Password Password Auth Auth X X Msg A Doc B Msg A Doc B Encrypted Encrypted Local Local File System File System Key Key Store Store Networked or Cloud File System System A System B

  72. Mail Trusted Alice Bob Daemon Collaborators Password P a s s w o r d Auth A u t h Contextual Auth Msg A Doc B Msg A Doc B Custos Encrypted Encrypted Key Store File System File System Networked or Cloud File System Trust Provider System A System B

  73. Data Centers

  74. User Server SSH Verification Login Server Users SSH VM Instance A

  75. User Server SSH Verification Login Server Users Server Users Destroy SSH SSH VM Instance A VM Instance A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend