Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

could you help me solving that problem ,, please don't reply with irrelevant pages from a book :( thanks Consider a system where a data

image text in transcribed

could you help me solving that problem ,, please don't reply with irrelevant pages from a book :(

thanks

Consider a system where a data files (F. and i denotes the file ID) is distributed over a cloud A data file is generated by an author (AU, and k denotes the author ID) and stored on a distribution server (Ds). Only authorized users (US, and denotes the user ID) previously registered on the system using their private keys (KPR) are allowed to download the data. Users' public certificates (KPU) and revocation lists (CRL) are available on a trusted Certificate Authority (CA) Authentication is done using an authentication server (AS) on a challenge response PKI based authentication. The files are to be encrypted (for each user on delivery) and the decryption key for file (i) to user (Ka) is delivered securely to the user from a data rights management server (DRMS) Using (RSA) public key cryptography whenever possible and (AES) for encrypting data for the sake of performance, and any required hashing and MAC algorithms a. Show the contents of exchanged messages between each entity and the others in the system in the case of uploading a new file on the system, downloading a file, and accessing the contents of a file. All other messages required for authentication are also required Number your messages (12, 3, ..) b. Draw a simplified diagram with all the entities as vertices and the message as a between the entities e and put on each are the message(s) number(s). c. The system is vulnerable to re-distribution of decrypted files (an authenticated user can make a new of the plain text file and post it over Facebook for example). Suggest a mechanism to prevent such a problem. d. Knowing that the file is stored on the local user storage after downloading. suggest a mode of operation that can be used to allow the player software to decrypt only the needed part of the file in memory, other parts of the file should remain encrypted on the storage. Take into consideration that access to the file content will be on the byte level and in a random access fashion (A byte from the middle of the file can be read then 4 bytes from the beginning of the file then the last 6 bytes and so on) Consider a system where a data files (F. and i denotes the file ID) is distributed over a cloud A data file is generated by an author (AU, and k denotes the author ID) and stored on a distribution server (Ds). Only authorized users (US, and denotes the user ID) previously registered on the system using their private keys (KPR) are allowed to download the data. Users' public certificates (KPU) and revocation lists (CRL) are available on a trusted Certificate Authority (CA) Authentication is done using an authentication server (AS) on a challenge response PKI based authentication. The files are to be encrypted (for each user on delivery) and the decryption key for file (i) to user (Ka) is delivered securely to the user from a data rights management server (DRMS) Using (RSA) public key cryptography whenever possible and (AES) for encrypting data for the sake of performance, and any required hashing and MAC algorithms a. Show the contents of exchanged messages between each entity and the others in the system in the case of uploading a new file on the system, downloading a file, and accessing the contents of a file. All other messages required for authentication are also required Number your messages (12, 3, ..) b. Draw a simplified diagram with all the entities as vertices and the message as a between the entities e and put on each are the message(s) number(s). c. The system is vulnerable to re-distribution of decrypted files (an authenticated user can make a new of the plain text file and post it over Facebook for example). Suggest a mechanism to prevent such a problem. d. Knowing that the file is stored on the local user storage after downloading. suggest a mode of operation that can be used to allow the player software to decrypt only the needed part of the file in memory, other parts of the file should remain encrypted on the storage. Take into consideration that access to the file content will be on the byte level and in a random access fashion (A byte from the middle of the file can be read then 4 bytes from the beginning of the file then the last 6 bytes and so on)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL/PHP Database Applications

Authors: Jay Greenspan, Brad Bulger

1st Edition

978-0764535376

Students also viewed these Databases questions

Question

How many multiples of 4 are there between 10 and 250?

Answered: 1 week ago

Question

How many three-digit numbers are divisible by 7?

Answered: 1 week ago

Question

What is Indian Polity and Governance ?

Answered: 1 week ago

Question

Select suitable tools to analyze service problems.

Answered: 1 week ago