Distributed, Consistent and Secure USB Hub

Preview:

DESCRIPTION

Distributed, Consistent and Secure USB Hub. Sean Busch Matt Dube Eddie Lai Zhou Zheng. Backing Up Data. Everyone needs to save their work and data This data needs to be available in multiple locations Data needs to be readily available - PowerPoint PPT Presentation

Citation preview

Team Wolf

Distributed, Consistent and

Secure USB HubSean BuschMatt DubeEddie Lai

Zhou Zheng

Team Wolf 2

Backing Up Data Everyone needs to save their work and data

• This data needs to be available in multiple locations• Data needs to be readily available• Today’s most popular storage device is the thumb drive

Backups have problems• Can be physically broken• Need to be carried around• Can wear out after a number of reads/writes

This leads to using multiple backups

Team Wolf 3

Multiple Backups Multiple backups create problems

• Data changes create inconsistencies between backups• When many backups are created, data becomes vulnerable

The solution: Distributed Consistent Secure USB Hub• Maintains consistency

− Spatial separation− Temporal separation

• Ensures data security− Secret sharing− Secure connections

Team Wolf 4

System Architecture

Team Wolf 5

Outline Introduction System Architecture Usage Scenarios Requirements Proposed Design MDR Deliverables

Team Wolf 6

Usage Scenarios Initialization Spatial Separation Temporal Separation Secret Sharing

Team Wolf 7

Scenario 0: Initialization Authenticates each Hub and USB drive

Team Wolf 8

Scenario 1: Spatial Separation Hub keeps backups consistent even if they are in different locations

Team Wolf 9

Scenario 2: Temporal Separation Unconnected drives updated when plugged into Hub

Later

Team Wolf 10

Scenario 3: Secret Sharing Keep backups confidential

Team Wolf 11

Software Consistency

• Utilize concepts from current versioning systems• If modifications are made, distribute changes• If not all devices are connected save modifications on each Hub

− Synchronize remaining backups and delete modifications from Hub Security

• (k, n) threshold scheme• Requires a subset, k, of a set, n, to recover data• With fewer than k pieces, no information about the data can be recovered

Team Wolf 12

Requirements Powerful embedded system

• Processor Cost: Maximum $200 Low Power Consumption: <= 20W Network capability I/O ports

• Minimum 4 USB ports per hub• Interface with computer via USB

Minimum 64 GB storage on Hub• Support 16 GB USB sticks

Must run Operating System• Will not require external software installation

Team Wolf 13

Block Diagram

Team Wolf 14

Prototype System Atom Prototype Board

• Atom D510 1.66 GHz • 2 GB DDR2@ 667 MHz• 160 GB SATA HD• Network Connectivity• 4 USB Ports• Linux OS• Dimensions 17cm x 17cm• Max 20 W

Team Wolf 15

Optional Custom PCB Prototype contains unnecessary features Advantages

• Slim Design • Less Power Consumption • Shrink Size by 35 %

Disadvantages• Expensive• Potential of Not Working

Team Wolf 16

MDR Deliverables 2 hubs based on Advantech Intel Atom board

• Initialize (Scenario 0)− Authenticate hubs to each other− Authenticate USBs to hub-network

• Make backup and distribute (Scenario 1)• Distribute updates to non-connected USB sticks (Scenario 2)

Team Wolf 17

Questions?

Recommended