491 research outputs found

    To Share or Not to Share in Client-Side Encrypted Clouds

    Full text link
    With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations. SaaS (different than Software-as-a-Service in this context) refers to an architectural model in which a cloud provider provides digital storage on their own infrastructure. Three models exist amongst SaaS providers for protecting the confidentiality data stored in the cloud: 1) no encryption (data is stored in plain text), 2) server-side encryption (data is encrypted once uploaded), and 3) client-side encryption (data is encrypted prior to upload). This paper seeks to identify weaknesses in the third model, as it claims to offer 100% user data confidentiality throughout all data transactions (e.g., upload, download, sharing) through a combination of Network Traffic Analysis, Source Code Decompilation, and Source Code Disassembly. The weaknesses we uncovered primarily center around the fact that the cloud providers we evaluated were each operating in a Certificate Authority capacity to facilitate data sharing. In this capacity, they assume the role of both certificate issuer and certificate authorizer as denoted in a Public-Key Infrastructure (PKI) scheme - which gives them the ability to view user data contradicting their claims of 100% data confidentiality. We have collated our analysis and findings in this paper and explore some potential solutions to address these weaknesses in these sharing methods. The solutions proposed are a combination of best practices associated with the use of PKI and other cryptographic primitives generally accepted for protecting the confidentiality of shared information

    Recent Decision

    Get PDF
    The Fifth Circuit Court of Appeals has taken the instant opportunity to write an essay on the law of search and seizure on the high seas. Applying Ramsey, the majority found authority for the Coast Guard action, either under section 89(a) or through the consent of the Panamanian Government. Although both conclusions are open to dispute, the major question arises from the court\u27s analysis of the constitutionality of the Coast Guard action. While a firm resolution of the confusion engendered by previous conflicting Fifth Circuit decisions is certainly desirable, the instant court\u27s resolution fails to provide necessary analytical clarity. Judge Tjoflat concluded that the fourth amendment should be applied less rigorously when the action in question occurs at sea rather than on land, and he delineated the search and seizure standard to be used for actions occurring at sea. This attempt is analytically inconsistent. On one hand the court applied Ramsey\u27s two-part analysis utilizing a balancing test derived from land-based search and seizure law; on the other hand, the court substituted a more lenient test for the constitutionality of searches and seizures at sea

    QuPARA: Query-Driven Large-Scale Portfolio Aggregate Risk Analysis on MapReduce

    Full text link
    Stochastic simulation techniques are used for portfolio risk analysis. Risk portfolios may consist of thousands of reinsurance contracts covering millions of insured locations. To quantify risk each portfolio must be evaluated in up to a million simulation trials, each capturing a different possible sequence of catastrophic events over the course of a contractual year. In this paper, we explore the design of a flexible framework for portfolio risk analysis that facilitates answering a rich variety of catastrophic risk queries. Rather than aggregating simulation data in order to produce a small set of high-level risk metrics efficiently (as is often done in production risk management systems), the focus here is on allowing the user to pose queries on unaggregated or partially aggregated data. The goal is to provide a flexible framework that can be used by analysts to answer a wide variety of unanticipated but natural ad hoc queries. Such detailed queries can help actuaries or underwriters to better understand the multiple dimensions (e.g., spatial correlation, seasonality, peril features, construction features, and financial terms) that can impact portfolio risk. We implemented a prototype system, called QuPARA (Query-Driven Large-Scale Portfolio Aggregate Risk Analysis), using Hadoop, which is Apache's implementation of the MapReduce paradigm. This allows the user to take advantage of large parallel compute servers in order to answer ad hoc risk analysis queries efficiently even on very large data sets typically encountered in practice. We describe the design and implementation of QuPARA and present experimental results that demonstrate its feasibility. A full portfolio risk analysis run consisting of a 1,000,000 trial simulation, with 1,000 events per trial, and 3,200 risk transfer contracts can be completed on a 16-node Hadoop cluster in just over 20 minutes.Comment: 9 pages, IEEE International Conference on Big Data (BigData), Santa Clara, USA, 201

    TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTS

    Get PDF
    Although widely adopted, one of the biggest concerns with cloud computing is how to preserve the security and privacy of client data being processed and/or stored in a cloud computing environment. When it comes to cloud data protection, the methods employed can be very similar to protecting data within a traditional data center. Authentication and identity, access control, encryption, secure deletion, integrity checking, and data masking are all data protection methods that have applicability in cloud computing. Current research in cloud data protection primarily falls into three main categories: 1) Authentication & Access Control, 2) Encryption, and 3) Intrusion Detection. This thesis examines the various mechanisms that currently exist to protect data being stored in a public cloud computing environment. It also looks at the methods employed to detect intrusions targeting cloud data when and if data protection mechanisms fail. In response to these findings, we present three primary contributions that focus on enhancing the overall security of user data residing in a hosted environment such as the cloud. We first provide an analysis of Cloud Storage vendors that shows how data can be exposed when shared - even in the most `secure' environments. Secondly, we o er Pretty Good Privacy (PGP) as a method of securing data within this environment while enhancing PGP'sWeb of Trust validation mechanism using Bitcoin. Lastly, we provide a framework for protecting data exfiltration attempts in Software-as-a-Service (SaaS) Cloud Storage environments using Cyber Deception

    Reply to “Comment on ‘Accurate and fast numerical solution of Poisson\u27s equation for arbitrary, space-filling Voronoi polyhedra: Near-field corrections revisited’ ”

    Get PDF
    This is a Reply to the Comment by Gonis and Zhang on our recent paper. They discuss supposed issues with our “accurate and fast numerical solution of Poisson’s equation for arbitrary Voronoi polyhedra” (VP)

    Payroll Accounting and Procedures

    Get PDF

    Psalms and Work

    Get PDF
    Introduction to Psalms Book 1 (Psalms 1–41) Personal Integrity in Work (Psalm 1) Obedience to God (Psalm 2) Foes and opponents (Psalms 4, 6, 7, 17) Authority (Psalm 8) Business ethics (Psalms 15, 24, 34) Trusting God in the face of institutional pressure (Psalm 20) God’s presence in our struggles at work (Psalm 23) God’s guidance in our work (Psalm 25) Book 2 (Psalms 42–72) God’s presence in the midst of disaster (Psalm 46) Anxiety when unscrupulous people succeed (Psalms 49, 50, 52, 62) Book 3 (Psalms 73–89) The workplace consequences of personal failings (Psalm 73) The economic consequences of national wrongdoings (Psalm 81, 85) God’s grace in the midst of judgment (Psalm 86) Book 4 (Psalms 90–106) Working in a fallen world (Psalms 90, 101) Human creativity with God (Psalm 104) Book 5 (Psalms 107–150) God undergirds all work and productivity (Psalm 107) Virtues for those in business (Psalm 112) Participating in God’s work (Psalm 113) Producing true value at work (Psalms 127) The work of marriage, raising children, and caring for parents (Psalm 127, 128, 139) The right use of power (Psalm 136) God’s glory in all of creation (Psalm 146-150) Psalm 146 Psalm 147 Psalm 149 Psalm 148 Psalm 15
    corecore