PicFS presentation
-
Upload
awesomesos -
Category
Travel
-
view
698 -
download
0
description
Transcript of PicFS presentation
![Page 1: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/1.jpg)
The The SSuper uper SSecret ecret FFile ile SSystemystem
CS851 – CS851 – Web Web
Application Application Security Security SeminarSeminar
Chris Sosa Chris Sosa Blake Blake Sutton Sutton Howie Howie HuangHuang
![Page 2: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/2.jpg)
OverviewOverview
Implemented CovertFS on top of FUSE
Automatic Image Selection from Video
Used Tor to further protect users
![Page 3: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/3.jpg)
MotivationMotivation
We have the right We have the right and the desire for and the desire for
privacyprivacy
We only trust our We only trust our friendsfriends
![Page 4: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/4.jpg)
Plausible DeniabilityPlausible Deniability
What can we do to What can we do to provide privacy?provide privacy?
We want Plausible We want Plausible DeniabilityDeniability– Privacy is threatened Privacy is threatened
whenever private whenever private information is known information is known to existto exist
– We can mask private We can mask private activities with non-activities with non-private onesprivate ones
What do you do if Nina isn’t one of your friends?
![Page 5: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/5.jpg)
Related Work and their Related Work and their IssuesIssues
StegFS – Free Memory StegFS – Free Memory BlocksBlocks– Files were stored on the same Files were stored on the same
systemsystem– No permanent storage No permanent storage
guaranteesguarantees CovertFS – Online photo-CovertFS – Online photo-
sharingsharing– Lacked way of getting imagesLacked way of getting images– Lacked implementationLacked implementation– User is compromised at same User is compromised at same
time as datatime as data
He does not like bullets either
![Page 6: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/6.jpg)
Image GenerationImage Generation
![Page 7: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/7.jpg)
Anonymizing with TorAnonymizing with Tor
Onion Routing in Action
I AM A MEDIA
SERVER
I <3 Privac
y
![Page 8: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/8.jpg)
Image Access PatternsImage Access Patterns
Mask our private file access patterns with Mask our private file access patterns with non-private online image access non-private online image access – Online sites have open API’s that encourage 3Online sites have open API’s that encourage 3rdrd
party applicationsparty applications– Mask our accesses to be similar to at least one Mask our accesses to be similar to at least one
such popular applicationsuch popular application Techniques UsedTechniques Used
– See CovertFSSee CovertFS– Image-based On-disk cache helps enormously Image-based On-disk cache helps enormously
herehere
![Page 9: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/9.jpg)
File System ImplementationFile System Implementation
Based on Ext2 Based on Ext2 Uses Fuse-J library to take advantage of Java SerializationUses Fuse-J library to take advantage of Java Serialization Steganographic Algorithm replaceable (uses F5)Steganographic Algorithm replaceable (uses F5) Allocation Table has paths for efficiencyAllocation Table has paths for efficiency Allocation table is chained especially (does not follow normal Allocation table is chained especially (does not follow normal
direct – indirect linkage)direct – indirect linkage) Implemented Media ServerImplemented Media Server Image-based On-Disk Cache Image-based On-Disk Cache
– Looks just like a subset of images from the Media ServerLooks just like a subset of images from the Media Server– Permanently deleted on unmountPermanently deleted on unmount
Insert “Sexy” On-disk cache
here
Ext2
![Page 10: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/10.jpg)
Implementation IssuesImplementation Issues
Allocation Table cannot act as a traditional Allocation Table cannot act as a traditional special file (chicken-egg problem)special file (chicken-egg problem)
Flickr modifies uploaded images of Free Flickr modifies uploaded images of Free Account holdersAccount holders– Grad students are poorGrad students are poor– No restriction with $30 / year subscriptionNo restriction with $30 / year subscription– Easier to evaluate without FlickrEasier to evaluate without Flickr
Tradeoff with privacy vs. efficiency Tradeoff with privacy vs. efficiency between On-Demand downloading and between On-Demand downloading and Bulk DownloadBulk Download
![Page 11: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/11.jpg)
Evaluation (Future Work)Evaluation (Future Work)
Image GenerationImage Generation– How many images How many images
selectedselected– ““Uniqueness” of frames Uniqueness” of frames – Different video types Different video types
(cartoon, home, (cartoon, home, television)television)
I’m unique!
•Traffic patterns- Media Server gathers
data- Compare with existing
API tools/apps
![Page 12: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/12.jpg)
DemoDemo
![Page 13: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/13.jpg)
ConclusionsConclusions
An anonyMizing Image-based Log File An anonyMizing Image-based Log File System is feasible!System is feasible!
Completely automatic image Completely automatic image generation is practical if you have generation is practical if you have lots of videos ;) available as source lots of videos ;) available as source materialmaterial
![Page 14: PicFS presentation](https://reader035.fdocuments.us/reader035/viewer/2022070301/546d0b1aaf79595e658b823e/html5/thumbnails/14.jpg)
Questions?Questions?