spideroak
play

SpiderOak 6 years Idea: Create a central repository of your data - PowerPoint PPT Presentation

SpiderOak 6 years Idea: Create a central repository of your data Client based Windows, Mac, Linux, mobile platforms Backup data from all your devices Share any folder File-Synchronization of any folder Unique Feature


  1. SpiderOak ● 6 years ● Idea: Create a central repository of your data ● Client based ● Windows, Mac, Linux, mobile platforms ● Backup data from all your devices ● Share any folder ● File-Synchronization of any folder

  2. Unique Feature ● Zero knowledge approach ● Deduplication (only within your account Block-Based and File-Based) ● File synchronization ● No convergent encryption!

  3. Why no convergent encryption? ● Convergent encryption: Encrypt Plaintext m: Key k = hash(m) Ciphertext c = encrypt(k, m) ● Serious privacy issues: ● Provider can see if you stored a file that he has access to himself.

  4. Why no convergent encryption? ● a database mp3 files → reveals your taste of music ● INVOICE Dear ______, for month ____ your fee is $___. Best regards, Non-Free-Download, Inc

  5. „encryption, encryption, encryption“ ● Privacy for you and the people you work with ● Mistakes can't reveal your data ● Authentication bypass can't reveal your data ● Legal reasons ● More?

  6. SpiderOak Orange

  7. SpiderOak Orange ● For private / small business usage ● Backup your data. Sync/Share ● All your data AND metadata is encrypted ● Password is required to unlock the encryption keys ● Password never send to us

  8. How does it work? ● Whole file synchronization process is done by the client ● Deduplication is done by the client ● Client knows about all your meta-data ● Only encrypted meta-data is uploaded to storage-server

  9. SpiderOak Blue ● Two options: Hosted or private cloud

  10. Hosted and Private Cloud ● It's the same zero knowledge approach. ● Client is mostly the same ● Only how authentication works changed and key escrow added ● Authentication: LDAP, RADIUS, soon: SAML

  11. Virtual appliance ● Installed on your system, behind your firewall ● Web based management console ● LDAP (or AD) integration provisioning, group permissions, and space management with LDAP ● Authentication service ● Key escrow server

  12. Virtual appliance ● The first time it boots up it creates new keys ● You setup authentication / LDAP integration ● Ready to use

  13. Thank you Questions? Discussion?

Recommend


More recommend