Question

ion (6 markt Consider a system where a data files (F. and i denotes the file ID) is distributed over a cloud A data file is generated by an author (AU., and k denotes the author ID) and stored on a distribution server (Ds). Only authorized users (US, and denotes the user ID) previously registered on the system using their private keys (KPR) are allowed to download the data. Users public certificates (KPU) and revocation lists (CRL) are available on a trusted Certificate Authority (CA) Authentication is done using an authentication server (AS) on a challenge response PKI based authentication. The files are to be encrypted (for each user on delivery) and the decryption key for file (i) to user (Ka) is delivered securely to the user from a data rights management server (DRMS) Using (RSA) public key cryptography whenever possible and (AES) for encrypting data for the sake of performance, and any required hashing and MAC algorithms a. Show the contents of exchanged messages between each entity and the others in the system in the case of uploading a new file on the system, downloading a file, and accessing the contents of a file. All other messages required for authentication are also required Number your messages (12,3,...) b. Draw a simplified diagram with all the entities as vertices and the message as a between the entities e and put on each are the message(s) number(s). decrypted files (an authenticated user can make a new The system is vulnerable to re-distribution of of the plain text file and post it over Facebook for example). Suggest a mechanism to prevent such a problem. d. Knowing that the file is stored on the local user storage after downloading. suggest a mode of operation that can be used to allow the player software to decrypt only the needed part of the file in memory, other parts of the file should remain encrypted on the storage. Take into consideration that access to the file content will be on the byte level and in a random access fashion (A byte from the middle of the file can be read then 4 bytes from the beginning of the file then the last 6 bytes and so

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Customer Experience Mapping if your flow chart focuses on customer service, so that you can gain a better understanding of thTip: If your process or project involves several people or teams, you might find it more useful to use a Swim Lane Diagram raFor example, software developers can use them to work out how the automated and manual parts of a process join up. InexperienTip: You can use many other symbols in a flow chart but remember that these diagrams are used for communication o. If you use3. Diamonds, which highlight where you must make a decision. No Example Decision Yes 4. Parallelograms, which show input andWhat Is a Flow Chart? Flow charts are easy-to-understand diagrams that show how the steps of a process fit together. American

Add a comment
Know the answer?
Add Answer to:
Consider a system where a data files (F_i, and i denotes the file ID) is distributed...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Consider a file server where a user is allowed to download files. Each file has an...

    Consider a file server where a user is allowed to download files. Each file has an access control list of the users that are allowed to download the file. The security policy is that only users listed in the access control list can download the file. List the information that must be logged by a system that audits this policy.

  • Computer Science Operation System question. I will give thumb up, thank you! Consider a file system that uses inodes to represent files. This file system has 16 direct disk blocks, as well as single,...

    Computer Science Operation System question. I will give thumb up, thank you! Consider a file system that uses inodes to represent files. This file system has 16 direct disk blocks, as well as single, double, and triple indirect disk blocks. This file system is illustrated in the below figure. Please notice that the tables pointed to by the indirect pointers are full sized blocks that only stores pointers. mode owners (2) timestamps (3) size block count data data data direct...

  • Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the...

    Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential...

  • UNIX File Permission help, please answer the questions in the green boxes. Thank you Lab 03...

    UNIX File Permission help, please answer the questions in the green boxes. Thank you Lab 03 File Permissions In this lab we will: learn about file permissions learn to create symbolic links and hard links Utilities that will be utilized in this Lab: us, cd, less, cat touch, chmod id umask, mkdir, In, echo and redirection Users and Groups Linux supports several methods of controlling access to files an directories. In this lab we are going to learn the traditional...

  • I need help ASAP on this, this is due at midnight PST. This is the current...

    I need help ASAP on this, this is due at midnight PST. This is the current code I have. How can I allow the user to quit. My counting while loop works fine, but I would like it to not keep outputting username if a file was successfully opened. This is what is required. Prompt You have assumed the role of managing the technology infrastructure at a zoo. You will develop a working program (either an authentication system or a...

  • In C++ Task 3: Use the stack and queue to simulate receiving and transforming data We are creating a system that will co...

    In C++ Task 3: Use the stack and queue to simulate receiving and transforming data We are creating a system that will convert strings sent over a serial bus one character at a time. The conversion will be from big to little endian or from little to big endian. To simplify this, each character will be considered a word. Little endian will have the lowest address first. Big endian will have the biggest address first. For example (for this lab),...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • 36. What kind of virus runs in place of the computer's normal system files? A. Worms...

    36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...

  • C Programming - Please Help us! Implementing Load Balancing, the 3 Base Code files are at the bot...

    C Programming - Please Help us! Implementing Load Balancing, the 3 Base Code files are at the bottom: Implementing Load Balancing Summary: In this homework, you will be implementing the main muti-threaded logic for doing batch based server load balancing using mutexes Background In this assignment you will write a batch-based load balancer. Consider a server which handles data proces- sing based on user requests. In general, a server has only a fixed set of hardware resources that it can...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT