final presentation edited final

27
Secure Deletion Of Data On The Cloud By : Bhanu Priya Supervisor : Dr.Richard Sinnott

Transcript of final presentation edited final

Page 1: final presentation edited final

Secure Deletion Of Data On The Cloud

By : Bhanu Priya Supervisor : Dr.Richard

Sinnott

Page 2: final presentation edited final

Cloud Nectar

Page 3: final presentation edited final

The Need For Secure Deletion Of Data On The

Cloud1) Used In Banks

Page 4: final presentation edited final

Need For Secure Deletion Of Data On The Cloud

3) Cloud Used In Business

Page 5: final presentation edited final

Need For Secure Deletion Of Data On The Cloud

Multiple Copies Of Data On The Cloud

Page 6: final presentation edited final

Research Work :• Test Various Linux Based Secure Deletion Of Data

Tools .Test the basic linux utilities like (rm , rmdir etc).

• Test whether data can be recovered using linux based data recovery tools .

• Find the optimal solution for the use of secure deletion of data tools

• If Data is Removed from a single machine , the copies of that data should be removed from other virtual machines as well.The aim is to achieve parallel synchronisation of all the servers.

Page 7: final presentation edited final

Secure Deletion Of Data Tools Used • Wipe wipe <filename>

• SRM sudo srm /path/to/file

• SHRED shred -u -z -n filename

• RM rm <filename>• SMEM smem [-f][-l][-l][-v]• SFILL sfill -f -v -ll

/path/to/directory• SSWAP cat /proc/swaps

Page 8: final presentation edited final

Video Files :Video

File Size WIPE SHRED SRM RM RM -RF

1 kb 1 SEC 1 SEC 1 SEC I SEC 1 SEC10kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC

100kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC1Mb 1 MINUTE 1 SEC 2 SEC 1 SEC 1 SEC

100 Mb 3 MIN 53 S 1 MIN 5 MIN 1 SEC 1 SEC

1 Gb 1 HR 11 M 7 MIN 1 HR 10

M 1 SEC 1 SEC

10Gb 2 HR 45 M

1 HR 12 M > 3 HRS 1 SEC 1 SEC

10 Mb 2 MIN 1 MIN 1 MIN 1 SEC 1 SEC280.4 Mb 13 MIN 2 MIN 18 MIN 1 SEC 1 SEC

base 64 /dev/urandom | head -c <byte> > <filename>

Page 9: final presentation edited final

IMAGE FILES :IMAGE FILE WIPE SHRED SRM

1 KB 1 SEC 1 SEC 1 SEC10 KB 1 SEC 1 SEC 1 SEC

100 KB 1 SEC 1 SEC 1 SEC1 MB 2 SEC 1 SEC 2 SEC

10 MB 13 SEC 2 SEC 1 MIN100 MB 4 MIN 1 MIN 6 MIN

1 GB 53 MIN 7 MIN 1 HR 20 MIN10 GB 2 HR 45 MIN 1 HR 12 MIN > 3 HOURS

Page 10: final presentation edited final

TEXT FILES :

TEXT FILES WIPE SHRED SRM

1 KB 1 SEC 1 SEC 1 SEC

10KB 1 SEC 1 SEC 1 SEC

100 KB 1 SEC 1 SEC 1 SEC

1 MB 2 SEC 1 SEC 3 SEC

10 MB 13 SEC 3 SEC 39 SEC

100 MB 5 MIN 1 MIN 7 MIN

1 GB 54 MIN 9 MIN 1 HR 21 M

Page 11: final presentation edited final

SMEM (Secure Memory)

• An Open source Tool To see , the users and the processors that are using the physical memory.

• It has three options.view the system wide memory usage , view the memory usage by each user,to view the memory usage by mapping .

Page 12: final presentation edited final
Page 13: final presentation edited final

smem -w

Page 14: final presentation edited final

smem -u

Page 15: final presentation edited final

sswap:

cat /proc/swaps

Page 16: final presentation edited final

SFILL

• One Of The Secure-Delete Tools.

• It searches for free space in the specified partition and fills it up with some data to avoid recovery of data from the free space .

• syntax : sudo sfill /home.

Page 17: final presentation edited final

photorec :1) Choose the partition to recover from

Page 18: final presentation edited final

Photorec:

2) choose the file system to recover from

Page 19: final presentation edited final

PhotoRec:

3) Select the type of file you want to recover

Page 20: final presentation edited final

Photorec:

4) Select the file system again

Page 21: final presentation edited final

Photorec :

5) select whether you want to recover the free space or the entire partition

Page 22: final presentation edited final

Photorec6) select the destination of the recovered files

Page 23: final presentation edited final

Photorec:

7) Recovery starts

Page 24: final presentation edited final

Photorec:8) Recovery completed

Page 25: final presentation edited final

Cluster SSH :

Page 26: final presentation edited final

Comparison Of The Secure Deletion Of Data Tools On The Basis Of

Recovery By PhotoRec

Images Videos TextWipeShredSrm

rm

NO NO YES

NO NO YES

NO NO YES

YES NO YES

Page 27: final presentation edited final

THANK YOU

By:Bhanu Priya