Secure Data Export and Auditing Using Data Diodes

نویسندگان

  • Douglas W. Jones
  • Tom C. Bowersox
چکیده

Data diodes, that is, devices which permit only one-way communication, without even a reverse channel for acknowledgment, have many potential uses within voting systems. A practical design for a data diode is presented that is simpler and more nearly self-evident than previously published designs. Communication protocols appropriate for use in the voting context are described. Throughout, we emphasize designs that permit a relatively naïve observer to determine that it meets key security constraints. The Problem The results of any election must be published, for example, in newspapers or on the Internet. This generally requires communication from the election management system used for canvassing the election to any of a variety of systems outside the election administration security domain. At the same time, the election management system must be protected against intrusion from the outside. Many election officials deny that their systems are vulnerable to attack, flatly stating that their election management system has no public network connections. This denial cannot be taken at face value if the election management system provides up-to-date election results on a public server. In one system we examined, we have found a remarkably baroque data export path best characterized as security through extreme obscurity. In other cases, vendors recommend using an air gap with " sneakernet technology " to carry data across this gap Just because the electronic media are hand-carried across an air-gap does not imply that there is no reverse channel! One can easily imagine hand-carrying data back and forth in a thumb drive or any other reusable medium in such a way that contagion is carried into the election management system with each shuttle across the air gap. Data export on write-once disposable media such as ink on paper or recordable CD-ROMs is safe, but this may be just cumbersome enough that many jurisdictions will cheat. This moved us to develop an easily audited one-way on-line data connection for use between election servers and systems connected to public data networks. The basic idea we exploited was an electro-optical data-diode. This is not a new idea; it has even been patented. The patent explicitly limits itself to transmission from an unsecured computer to a secured computer, exactly the opposite direction from the data transfers that concern us here. In every case we discuss, data is exported from a secure environment to an insecure environment containing potential threats. Another class of similar devices are …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Auditing Protocol for Secured Data Storage in Cloud

On cloud servers the data are hosted by the data owners and the data are accessed by the users from the cloud servers in cloud computing. As the data are outsourced, there are new security challenges been introduced by the new data hosting service that requires an independent auditing service in cloud to check the data integrity. There exist few remote integrity methods used for checking which ...

متن کامل

Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry

Introduction Both health information technology (HIT) and the payment card industry (PCI) involve the exchange and management of sensitive, protected information. Compared to the PCI, HIT could consider protected health information (PHI) more sensitive than PCI cardholder data. If cardholder data is breached in the PCI, payment card companies may then remove fraudulent charges from the customer...

متن کامل

Auditing and De-Duplication in Cloud Computing

As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data de-duplication in cloud while achieving integrity aud...

متن کامل

The Secure Integrity Verification in Cloud Storage Auditing with Deduplication

The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. By the by, since the outsourced cloud stockpiling administration is not completely reliable, it raises security worries on the most proficient method to acknowledge data de...

متن کامل

Record Maintenance and Secure Preserving Of Shared Data in Public Auditing

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006