Encrypted Database Final Presentation

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

TCP Monitor and Auto Tuner. Need Analysis Enable monitoring of TCP Connections Enable maximum bandwidth utilization No such utility available in MONALISA.
MyProxy: A Multi-Purpose Grid Authentication Service
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Architecture & Integration: CP v x Platforms: Windows NT sp5(6a)/Solaris 2.8 iWS Client(s) Netscape/IE 4.0+ Java Servlet Engine (Java Servlet API)
Kerberos Authentication for Multi-organization Cross-Realm Kerberos Authentication User sent request to local Authentication Server Local AS shares cross-realm.
Kerberos Authenticating Over an Insecure Network.
Fast Track to ColdFusion 9. Getting Started with ColdFusion Understanding Dynamic Web Pages ColdFusion Benchmark Introducing the ColdFusion Language Introducing.
Authentication Center for SDP Federation
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Project Title: Find New Buddy (FNB) web service Group Number:3 Group Members: Ankur Aggarwal ( ) Saurebh Raut ( ) Siddharth Kodwani ( )
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
1 MEDICAL ERROR REPORTING AND ANALYSIS Vijaya Gotla UmaDevi Bandaru Lavanya Gundamaraju.
CS4273: Distributed System Technologies and Programming Lecture 13: Review.
Creating a User ID (1) User makes any HTTP request
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Initialization: 1.Cloud machine instances initializes and sent ServiceToken from Service Controller. Authentication: 2.Client sends AuthRequest to AuthenticationService.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Web Database Programming Week 7 Session Management & Authentication.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
CD Collection Hector Urtubia Fall Summary Motivation and Objective Technologies Used Project Design Database Design and Integration Demo.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
CP476 Internet Computing CGI1 Cookie –Cookie is a mechanism for a web server recall info of accessing of a client browser –A cookie is an object sent by.
Designing a Middleware Server for Abstract Database Connection.
Display Page (HTML/CSS)
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
KERBEROS SYSTEM Kumar Madugula.
Scalable Verifiable Encrypted Search Encrypted Search with Third Party Support and Protection From Dishonest Data Stores.
Z39.50 A Basic Introduction Kathleen R. Murray, Ph.D. William E. Moen, Ph.D. May 2002.
1 Example security systems n Kerberos n Secure shell.
Added Value to XForms by Web Services Supporting XML Protocols Elina Vartiainen Timo-Pekka Viljamaa T Research Seminar on Digital Media Autumn.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Linux Password Vault by Ali Can Oğul. Codefellas2 Developer: Ali Can Oğul Sponsor: Özgür Yazılım A. Ş.
Device Management vOLTHA
Application program interface (API)
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Federation made simple
Improving searches through community clustering of information
Node.js Express Web Applications
Y.-H. Chen International College Ming-Chuan University Fall, 2004
Sabri Kızanlık Ural Emekçi
Cross-health enterprises Medical Data Management on the EGEE grid
A Wireless LAN Security Protocol
Authentication.
Radius, LDAP, Radius used in Authenticating Users
Secure communication among services
CHAPTER 3 Architectures for Distributed Systems
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Kerberos: An Authentication Service for Open Network Systems
NSE4-5.4 Dumps
מרכז אימות לפלטפורמת מתן שירותים
DUCKS – Distributed User-mode Chirp-Knowledgeable Server
BY: SHIVI AGRAWAL ( ) CSE-(6)C
KMIP Entity Object and Client Registration
Section 14.1 Section 14.2 Identify the technical needs of a Web server
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Distributed System Using Java 2 Enterprise Edition (J2EE)
Kerberos.
Network Security – Kerberos
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Tiers vs. Layers.
RKL Remote key loading.
Security Vulnerabilities in RPC (csci5931)
The Secure Sockets Layer (SSL) Protocol
Architecture Competency Group
Scalable Encrypted Verifiable Search
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
IBM C IBM Big Data Engineer. You want to train yourself to do better in exam or you want to test your preparation in either situation Dumpspedia’s.
Presentation transcript:

Encrypted Database Final Presentation Daniel Intskirveli and Johannes Christ

Data Owner’s User Interface open-source configured with owner’s EDB profile Interacts with server serves the user interface

Demo Database: 18,245 documents Reuters data dump for 1987 Generated with MapReduce job

Search protocol Client Server Authentication request Use auth. token for communication Stage 1: query authenticated word set Verify word set Stage 2: query tag set Verify tags (exit for single-word searches) Stage 3: query cross tag set Verify cross tags List results with matches. Request for end of session Verify credentials, send auth. Token Create search session (UUID) Store search token as well as public/shared keys retrieved from database Query word set and send result Retrieve tags for search token, store them Send tags for verification Query cross tag set. For found tags, find document name. Send cross tags and document names. Destroy session for user’s search session cookie.

What’s next? Write documentation and make the repository public Make the use of authenticated sets optional Implement the database generating algorithm for other platforms Single-machine process? Other distributed data processing techniques? Move inter-process communication away from Java serialization

Daniel Intskirveli and Johannes Christ Thanks! Questions? Daniel Intskirveli and Johannes Christ