IEEE 2014-2015: Attribute Based Encryption with Privacy Preserving In Clouds – Video


IEEE 2014-2015: Attribute Based Encryption with Privacy Preserving In Clouds
Title: Attribute Based Encryption with Privacy Preserving In Clouds Domain: Cloud Computing Abstract: Security and privacy are very important issues in cloud...

By: InnovationAdsOfIndia

Read more:
IEEE 2014-2015: Attribute Based Encryption with Privacy Preserving In Clouds - Video

VPD System provides cloud key management security.

August 6, 2014 - Combining data encryption with split-key encryption and homomorphic key management technologies, Porticor Virtual Private Data System protects critical data in public, private, and hybrid cloud environments. By supporting Microsoft SQL Server Transparent Data Encryption, product secures Microsoft's database in cloud infrastructures. Software-defined key management solution eliminates risks of storing SQL Database Encryption Keys on database server, where they can be compromised or stolen. Porticor 10 Yirmiyahu St. Ramat Hasharon, Israel Press release date: August 5, 2014

Porticor Virtual Private Data System Leverages Software-Defined Key Management to Eliminate Complexities and Risks Found in Traditional Hardware Encryption Security Modules

CAMPBELL, Calif. Porticor, a leading cloud data security company delivering the only cloud-based data encryption and key management solution that infuses trust into the cloud and keeps cloud data confidential, today announced that it supports Microsoft SQL Server Transparent Data Encryption (TDE), securing Microsofts database in cloud infrastructures with its Porticor Virtual Private Data (VPD).

Porticors software-defined key management solution eliminates risks surrounding storing SQL Database Encryption Keys (DEK) on the database server, where they can be compromised or stolen. Porticor integrated with Microsofts Transparent Data Encryption secures data through strong encryption, and also protects it from root access by administrators. The Porticor solution supports virtual systems, and private and public clouds.

Storing the data encryption keys in Porticors key management service, Porticors MS SQL Server plugin is a small installable package that can be added to a running SQL Server database with minimal configuration through normal SQL statements. The Porticor appliance is set up in minutes, and since it is a generic key management system it does not need to be configured to enable integration with a SQL Server. Uniquely, due to Homomorphic Key Management and Split Key Encryption technologies, the solution provides both secure key storage and secure key caching with no hardware needed, combining high security with top performance.

Since SQL servers often hold an organizations most important information, they are a favorite target for attacks, said Gilad Parann-Nissany, Porticor founder and CEO. Microsofts Transparent Data Encryption feature encrypts the database, but in cloud computing the question of encryption key management comes into play. With Porticor, the DEKs are never stored on the SQL Server disk, are protected by a split key method, and remain under control of the customer, eliminating the chance of the keys getting stolen or hacked.

Microsoft created the Extensible Key Management (EKM) API to provide integration between the SQL Server and a Hardware Security Module (HSM) key management system or a software-defined key management solution, such as Porticor. EKM supports Transparent Data Encryption to protect SQL Server data. With Porticors EKM integration, the DEK is encrypted by an asymmetric key that never leaves the key management system, and is itself protected through Homomorphic Split Key Encryption. When the database is started, it authenticates into the Porticor virtual appliance and retrieves the DEK. Since the DEK is never stored on the SQL Servers disk, if the disk is ever removed and discarded, its encrypted tables cannot be decrypted. In addition to wholesale database encryption, EKM and Porticors advanced API enable fine granular encryption of specific tables, database row, columns and records.

The Porticor Virtual Private Data system is the industrys only solution combining data encryption with patented split-key encryption and homomorphic key management technologies to protect critical data in public, private and hybrid cloud environments. Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticors split-key encryption and homomorphic key management system is offered as the industrys first cloud data protection service of its kind, delivering true confidentiality of data in the cloud by ensuring customer encryption keys are not exposed.

While other solutions require encryption keys to be manually managed for every disk, distributed storage or database record, or to be owned by a cloud provider, Porticors homomorphic split-key encryption technology eliminates both complexity and compromises. Porticor restores key ownership to customers while automatically managing customer encryption keys with maximum security. With homomorphic key management, the keys are protected at all times even while they are in use. Porticor protects the entire data layer stack, including virtual disks, distributed storage, databases, and applications. It dynamically encrypts and decrypts virtual data whenever the application needs access, and delivers a key management system that is fully hosted in the cloud, yet offers the confidentiality, security and trust of a system that is hosted inside the datacenter. Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm. For product release notes see https://pvkm.porticor.com/porticor-setup/release-notes.php.

About Porticor Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud data encryption and key management. The Porticor Virtual Private Data (VPD) system is the industrys first solution combining data encryption with patented split-key encryption and homomorphic key management to protect critical data in public, private and hybrid cloud environments. Using breakthrough split-key encryption and homomorphic key management, the Porticor VPD is the only system available that offers the ease-of-use of cloud-based key management without sacrificing trust. Porticor is an Amazon Web Services Technology Partner, a VMware Technology Alliance Partner, and an HP technology partner. The company is headquartered in Tel Aviv, Israel, with offices in Silicon Valley, and is venture backed. For more information, visit: http://www.porticor.com/.

Go here to see the original:
VPD System provides cloud key management security.

Matias Secure Pro wireless keyboard review: A power tool for the paranoid

Matias Secure Pro wireless keyboard $170.00

This quiet, portable, wireless mechanical keyboard boasts an over-the-top security feature. Our reviewer didn't like the feel of its switches, though, and it's very expensive.

The wireless Matias Secure Pro keyboards number-one claim to fame is its 128-bit AES encryption. Ill get into that later. My favorite feature is that its quiet. Youd hardly know this was a mechanical keyboard from the sound it makes. Its close to the volume level of a typical membrane keyboard, if a little sharper or clickier at times. You could use this board in any office or in a bedroom without disturbing a soul.

Be that as it may, Im not a huge fan of typing on it.

Far from the ergonomic relief I expect from a mechanical keyboard, the Matias switches inside the Secure Pro made my fingers exhausted. And thats saying something, considering I type on Cherry Blues on a daily basis. Those switches are known for their abnormally high resistance.

Activating a key on the Secure Pro reminds me of a rubber-dome keyboard. Significant resistance at the top begins to yield as you push past that initial hurdlealmost exactly like a membrane keyboard.

As a result, the Secure Pro scuttles most of the benefits of a mechanical keyboard. Its too easy to bottom-out its keys, which is bad for your fingers and wrists. This keyboard isnt pleasant to type on unless you prefer extremely high resistance. Even then, youd probably be better served by a buckling-spring switch, which spreads resistance out over the path of the entire keystroke.

The Matias Secure Pro has two USB ports. You can use one to store its USB receiver while traveling, and the other can charge a USB device (but you'll need a supplemental power supply for the keyboard, which defeats its wireless feature).

I appreciated the muted click of the Secure Pros keys, as that provided a bit of tactile feedback, but this isnt the sort of keyboard Id pick up for my own day-to-day use. Keyboard preferences are a matter of highly individual taste, of course, so your perception could be very different.

More troubling is that I found myself constantly making typos with the Secure Pro. I dont know whether its because the activation point is so high or because theres so much resistance, but I dropped letters from my words semi-constantly. The space bar was particularly temperamental.

Go here to read the rest:
Matias Secure Pro wireless keyboard review: A power tool for the paranoid

Is Open Source Software (Such as WordPress) The Best Choice for my Business – Video


Is Open Source Software (Such as WordPress) The Best Choice for my Business
Choosing the correct website and online presence technology for a business can be a frustrating and uniquely upsetting challenge. Understanding options and t...

By: w3developing, LLC

Original post:
Is Open Source Software (Such as WordPress) The Best Choice for my Business - Video

What Immigration did with just $1m and open source software

The Department of Immigration has showed what a cash-strapped government agency can do with just $1 million, some open source software, and a bit of free thinking.

Speaking at the Technology in Government forum in Canberra yesterday, the Department's chief risk officer Gavin McCairns explained how his team rolled an application based on the 'R' language into productionto filter through millions of incoming visitors to Australia every year.

Despiteworking forone of the largest bodies in Canberra - and one of the most security conscious - McCairns put his endorsement firmlybehind the use of open source.

'R'is a software languagedesigned for for statistical computing and graphicsthat runs on a wide variety of UNIX platforms, Windows and MacOS.

The systematic risk alert system that McCairns oversaw is nowin full production in every airport in Australia. The whole project took just $1 million and12 months.

"We developed an approach based on phases of prototype, pilot and production. It was based on the idea of trying stuff for nothing or very cheap, McCairns said

Our first pilot cost just $50,000. That was to get a consultant to teach us how to drive the open source software."

The application works towards the department's ultimate goal of having less passengersqueueing for an immigration official in an airport and more being processed to come into Australia quickly and easily, by trawling through thousands of visa applications for suspect anomalies.

Australia's working holiday visa scheme receives some 290,000 applications each year.In 12 monthsthe R-developed system threw uproughly 1000 anomalous applications, McCairns said, leadingeventually to 69 visas being declined or cancelled on further investigation.

The system also helps withthe identification of drug mules and their contacts using email IP addresses and data matching.

Read more:
What Immigration did with just $1m and open source software

Bitcoin trades slump as cryptocurrency’s rise stalls

The currency has been useful as a rival to traditional payments processors, as transfers made in Bitcoin can be near instantaneous and performed at very low cost compared with conventional services.

Preston Byrne, a fellow of the Adam Smith Institute and a commercial lawyer specialising in securitisation and cryptocurrency in the City of London, says that speculative investment in the currency has pushed up its price.

The Bitcoin protocol employs a built-in transaction fee of 0.1pc per transaction. Many users also choose to pay additional rewards so as to receive their orders more quickly. And as the currency has appreciated, so have the fees.

Mr Byrne suggests that while lower than late last year, historically elevated prices and equivalently high fees have been enough to put off many new buyers. As such, daily transaction volumes have slumped, falling to levels typical for 2012 - when Bitcoin was relatively unknown.

That has meant that many of the currency's immediate benefits such as lower transaction costs have been "significantly reduced", says Mr Byrne.

Higher nominal values have driven many users to trade exclusively within private exchanges, which do not show up publicly, as bitcoins are not moved about.

Account balances at these exchanges are merely updated, allowing users to avoid being stung by transaction fees.

Mr Byrne says that Bitcoins trading volume to date has consistently represented a very small number of the total tokens outstanding some estimates place it at less than 1pc of bitcoins in existence.

A study published last December - "A Fistful of Bitcoins: Characterizing Payments Among Men with No Names" - estimated that 64 to 75pc of the dominant cryptocurrency has never been spent.

View original post here:
Bitcoin trades slump as cryptocurrency's rise stalls

As evidence mounts, it’s getting harder to defend Edward …

By Stewart Baker August 3

The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance. In May, Recorded Future, a predictive analyticsweb intelligence firm, publisheda persuasive timelineshowing that Snowdens revelations about NSAs capabilities were followed quickly by a burst of new, robust encryption tools from al-Qaeda and its affiliates:

This is hardly a surprise for those who live in the real world. But it was an affront to Snowdens defenders, whove long insisted that journalists handled the NSA leaks so responsibly that no one can identify any damage that they have caused.

In damage control mode, Snowdens defenders first responded to the Recorded Future analysis by pooh-poohing the terrorists push fornew encryption tools. Bruce Schneierdeclared that the change might actually hurt al Qaeda: I think this will help US intelligence efforts. Cryptography is hard, and the odds that a home-brew encryption product is better than a well-studied open-source tool is slight.

Schneier is usually smarter than this. In fact, the product al Qaeda had been recommending until the leaks, Mujahidin Secrets,probably didqualify ashome-brew encryption.Indeed, Bruce Schneier dissedMujahidin Secretsin 2008 on precisely that ground, saying No one has explained why a terrorist would use this instead ofPGP.

But as a secondRecorded Future postshowed,the products that replacedMujahidin Secretsrelied heavily on open-source and proven encryption software.Indeed, one of them uses Schneiers own, well-tested encryption algorithm, Twofish.

Faced with facts thatcontradicted his original defense of Snowden, Schneier was quick tooffer a new reason why Snowdensleaks and al Qaedas response to them still wouldnt make any difference:

Whatever the reason, Schneier says, al-Qaidas new encryption program wont necessarily keep communications secret, and the only way to ensure that nothing gets picked up is to not send anything electronically. Osama bin Laden understood that. Thats why he ended up resorting to couriers. Upgrading encryption software might mask communications for al-Qaida temporarily, but probably not for long, Schneier said.It is relatively easy to find vulnerabilities in software, he added. This is why cybercriminals do so well stealing our credit cards. And it is also going to be why intelligence agencies are going to be able to break whatever software these al-Qaida operatives are using.

So, if you were starting to think that Snowden and his band of journalist allies might actually be helping the terrorists, theres no need to worry, according to Schneier, becauseall encryption software is so bad that NSA will still be able to break the terrorists communications and protect us. Oddly, though, thats not what he says when he isnt on the front lines with the Snowden Defense Corps. Ina 2013 Guardian articleentitled NSA surveillance: A guide to staying secure, for example, he offers very different advice, quoting Snowden:

Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.

Read the original post:
As evidence mounts, it’s getting harder to defend Edward ...

WikiLeaks publishes Australian suppression order

(on 2014-07-29)

Today, 29 July 2014, WikiLeaks releases an unprecedented Australian censorship order concerning a multi-million dollar corruption case explicitly naming the current and past heads of state of Indonesia, Malaysia and Vietnam, their relatives and other senior officials. The super-injunction invokes national security grounds to prevent reporting about the case, by anyone, in order to prevent damage to Australia's international relations. The court-issued gag order follows the secret 19 June 2014 indictment of seven senior executives from subsidiaries of Australia's central bank, the Reserve Bank of Australia (RBA). The case concerns allegations of multi-million dollar inducements made by agents of the RBA subsidiaries Securency and Note Printing Australia in order to secure contracts for the supply of Australian-style polymer bank notes to the governments of Malaysia, Indonesia, Vietnam and other countries.

The suppression order lists 17 individuals, including "any current or former Prime Minister of Malaysia", Truong Tan San, currently President of Vietnam", "Susilo Bambang Yudhoyono (also known as SBY), currently President of Indonesia (since 2004)", "Megawati Sukarnoputri (also known as Mega), a former President of Indonesia (20012004) and current leader of the PDI-P political party" and 14 other senior officials and relatives from those countries, who specifically may not be named in connection with the corruption investigation.

The document also specifically bans the publication of the order itself as well as an affidavit affirmed last month by Australia's representative to ASEAN Gillian Bird, who has just been appointed as Australia's Permanent Representative to the United Nations. The gag order effectively blacks out the largest high-level corruption case in Australia and the region.

The last known blanket suppression order of this nature was granted in 1995 and concerned the joint US-Australian intelligence spying operation against the Chinese Embassy in Canberra.

WikiLeaks' publisher Julian Assange said about the order:

Keywords: Australia, Malaysia, Indonesia, Vietnam, Supreme Court of Victoria, Justice Hollingworth, DFAT, AFP, DPP, Thomas Brady, Peter Sinclair Hutchinson, John Leckenby, Steven Kim Wong, Christian Boillot, Clifford John Gerathy, Myles Andrew Curtis, Mohammad Najib Abdul Razak, Abdullah Ahmad Badawi, Pak Lah, Puan Noni, Mahathir Mohamed, Daim Zainuddin, Rafidah Aziz, Hamid Albar, Susilo Bambang Yudhoyono, SBY, Megawati Sukarnoputri, Laksamana Sukardi, Truong Tan San, Nguyen Tan Dung, Le Duc Thuy, Nong Duc Manh, Note Printing Australia Pty Ltd, Securency, Gillian Elizabeth Bird, Reserve Bank of Australia, super-injunction, suppression order, censorship, corruption, bribery

Read the Australia-wide censorship order for corruption case involving Malaysia, Indonesia and Vietnam.

See the original post here:
WikiLeaks publishes Australian suppression order