多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.

Slides:



Advertisements
Similar presentations
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Advertisements

多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Seny Kamara & Kristin Lauter Micorsoft Reaserch B 廖以圻 B 陳育旋.
Confidentiality and Privacy Controls
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), Mohammed Bakhtawar Ahmed.
Chapter 1 – Introduction
Principles of Information Security, 2nd edition1 Cryptography.
Requirements Specification
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
作者 :Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou 出處 :IEEE Transactions on Knowledge and Data Engineering(2011) 日期 :2012/05/15 報告人 :
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
報告人 : 葉瑞群 日期 : 2011/11/10 出處 : IEEE Transactions on Knowledge and Data Engineering.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
多媒體網路安全實驗室 A Security Framework of Group Location-Based Mobile Applications in Cloud Computing Date : Reporter : Hong Ji Wei Authors : Yu-Jia.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Privacy-Preserving Public Auditing for Secure Cloud Storage
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Additional Security Tools Lesson 15. Skills Matrix.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Speaker: Meng-Ting Tsai Date:2010/11/16 Toward Publicly Auditable Secure Cloud Data Storage Services Cong Wang and Kui Ren..etc IEEE Communications Society.
多媒體網路安全實驗室 Protecting the Privacy of Users in e-Commerce Environment Date: Reporter:Chien-Wen Huang Author: Chun-Hua Chen and Gwoboa Horng 出處:
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
多媒體網路安全實驗室 Ontological recommendation multi-agent for Tainan City travel Date : Speaker : Hong Ji Wei Authors : Chang-Shing, Lee,Young-Chung.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date: Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera,
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
多媒體網路安全實驗室 Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Date:2011/05/05 報告人:向峻霈 出處 : Jalal Al-Muhtadi,
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Presented By Amarjit Datta
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Advanced Science and Technology Letters Vol.31 (MulGraB 2013), pp An Efficient and Privacy-Preserving.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
BY S.S.SUDHEER VARMA (13NT1D5816)
Searchable Encryption in Cloud
Privacy Preserving Ranked Multi-Keyword
CHAPTER 5: PHYSICAL DATABASE DESIGN AND PERFORMANCE
Confidentiality and Privacy Controls
ONLINE SECURE DATA SERVICE
Presentation transcript:

多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering

多媒體網路安全實驗室 Outline INTRODUCTION 1 SERVICE ARCHITECTURE 2 BUILDING BLOCKS 33 TOWARDS SECURE AND EFFECTIVE CLOUD DATA UTILIZATION 44 INTRODUCTION 5 2

多媒體網路安全實驗室 INTRODUCTION(1/5) Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therein. Despite the tremendous benefits, outsourcing data management to the commercial public cloud is also depriving customers’ direct control over the systems that manage their data, raising security and privacy as the primary obstacles to the adoption of cloud.. 3

多媒體網路安全實驗室 INTRODUCTION(2/5)  protect data privacy and combat unsolicited accesses in cloud and beyond, sensitive data may have to be encrypted by data owners before outsourcing this, however, obsoletes the traditional data utilization service based on plaintext keyword search.  (e.g. s, personal health records, photo albums, tax documents, financial transactions,etc.) 4

多媒體網路安全實驗室 INTRODUCTION(3/5)  enabling fuzzy keyword search service that aims at accommodating various typos and representation inconsistencies in different user searching inputs is of crucial importance for the high system usability and overall user search experience. 5

多媒體網路安全實驗室 INTRODUCTION(4/5) 6

多媒體網路安全實驗室 INTRODUCTION(5/5)  However, directly deploying these techniques for secure large-scale cloud data search services would not be necessarily adequate, as they are developed as crypto primitives without considering high service-level requirements and in particular the fuzzy search functionality at all (detailed explanation in Section IV).  in this paper we propose to explore fuzzy keyword search for encrypted cloud data utilization service. 7

多媒體網路安全實驗室 SERVICE ARCHITECTURE(1/2)  Assume data owner has a collection of n data files C = (F 1, F 2,….., F N ) to be stored in the cloud server, where a predefined set of distinct keywords in C is denoted as W = (W 1,W 2,…..,W p ).  To keep sensitive data confidential from unauthorized entities, cryptographic methods have to be applied to the data collection C by the owner before outsourcing. 8

多媒體網路安全實驗室 SERVICE ARCHITECTURE(2/2)  data owner will distribute search request (trapdoor) generation keys sk to authorized users.  To securely search the file collection for a given keyword w, an authorized user uses the trapdoor generation key sk to generate a search request Tw = f(sk,w) via some one-way function f(.)  which then performs the search over the data file collection C without decryption and sends back all encrypted files containing the specific keyword w, denoted as FIDw. 9

多媒體網路安全實驗室 BUILDING BLOCKS(1/2)  1.Symmetric Searchable Encryption: Symmetric Searchable Encryption (SSE) can be properly utilized in the application setting where the entity that generates the data and the ones that search over it share the same secret key(s).  2. Asymmetric Searchable Encryption: Asymmetric (public key based) Searchable Encryption is appropriate for application setting where the entity that generates the data is different from the one that searches over it. Boneh et al. 10

多媒體網路安全實驗室 BUILDING BLOCKS(2/2)  The edit distance ed(w 1,w 2 ) between two words w1 and w2 is the number of operations required to transform one of them into the other.  Using edit distance, the fuzzy search problem can be formulated as follows: given a collection of n encrypted data files C = (F 1, F 2,…, F N ), a predefined set of distinct keywords W = (w 1,w 2,…,w p ) a word w in the searching input and a specified edit distance d, the execution of fuzzy keyword search should return a set of files possibly containing the word w, denoted as FIDw: if w = w i ∈ W, return {FIDw}; otherwise, if w ∉ W, return {FIDw}, where ed(w,w i ) <= d. 11

多媒體網路安全實驗室 Fuzzy Keyword Search Over Encrypted Cloud Data  The following 26 listed variants after only one substitution operation on the first character of keyword CASTLE: {AASTLE, BASTLE, DASTLE,…, YASTLE, ZASTLE} The total number of variants of such a set would be 13 * For the general case of S wi, d, its resulting set can be too huge for practical system usability. 12

多媒體網路安全實驗室 Fuzzy Keyword Search Over Encrypted Cloud Data  we propose to consider only the positions of the three primitive edit operations. That is, we can use a wildcard ‘*’ to denote all three operations of character insertion, deletion and substitution at any position, making a much smaller fuzzy keyword set.  For example, for the keyword CASTLE with the preset edit distance 1, its fuzzy keyword set can be constructed as S CASTLE, 1 = {CASTLE, *CASTLE, *ASTLE, C*ASTLE, C*STLE, …, CASTL*E, CASTL*, CASTLE*}. 13

多媒體網路安全實驗室 Fuzzy Keyword Search Over Encrypted Cloud Data  The total number of variants after one operation on word CASTLE can now be reduced to only , far less than the exhaustive enumeration approach. Generally, for a given keyword wi with length L, the size of S wi, 1 will be only 2L , opposing to (2L+1)26+1 obtained in the straightforward approach. And, the larger the pre-set edit distance d is, the more storage overhead can be reduced.  Before:13*26+1  After(2L+1)*

多媒體網路安全實驗室 Support Similarity Search Our preliminary analysis [20] shows that for correctness of the fuzzy search mechanism, search request for keyword w is now a trapdoor set {T w’ } w’ ∈ {Sw,0,Sw,1,…,Sw,d}, instead of a single trapdoor as in the traditional approach. Support Similarity Search  given n encrypted data files C = (F 1, F 2, …, F N ), a predefined set of distinct keywords W = (w 1,w 2,;…,w p ), a word w in the searching input and a specified edit distance d, the execution of similarity search should return a set of files {FIDw}, where ed(w,w i ) <= d. 15

多媒體網路安全實驗室 CONCLUDING REMARKS In this article, we focused on the utilization of encrypted cloud data with practical system usability and high-level user searching experience. We investigated these challenges,defined the problem of fuzzy keyword search over encrypted cloud data, and further studied its natural support of similarity search in information retrieval. We outlined the building blocks for these new search functionalities, and described several future research directions, which should be explored for such an encrypted cloud data service system to become a reality. 16

多媒體網路安全實驗室