Secure Statistics Software Francisco Vera National Institute of Statistical Sciences.

Slides:



Advertisements
Similar presentations
1 Symbian Client Server Architecture. 2 Client, who (a software module) needs service from service provider (another software module) Server, who provide.
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Design Validation CSCI 5801: Software Engineering.
Secure Mobile IP Communication
Certification Training for Technicians Part 6 – Trouble shooting Page
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
Voice over IP Skype.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Computer Science 162 Section 1 CS162 Teaching Staff.
Cryptography1 CPSC 3730 Cryptography Chapter 7 Confidentiality Using Symmetric Encryption.
Problem Solving Process
Terminal Server © N. Ganesan, Ph.D.. Reference Thin-Client Concept Thin-Client concept tutorial.
hotEx RADIUS Manager Installation
Chapter 17 TACACS+.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Drag and Drop Display and Builder. Timofei B. Bolshakov, Andrey D. Petrov FermiLab.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
10/7/2015Copyright © 1998 – 2014 BTE Corporation, All Rights Reserved1 B T E C O R P O R A T I O N SmartMaster TM Distributed Controller.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Section 6: Upper Layers of the OSI Model CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
April 26, CSE8380 Parallel and Distributed Processing Presentation Hong Yue Department of Computer Science & Engineering Southern Methodist University.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Chapter 7 – Confidentiality Using Symmetric Encryption.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Kerberos  Kerberos was a 3-headed dog in Greek mythology Guarded the gates of the deadGuarded the gates of the dead Decided who might enterDecided who.
1 Chapter 34 Internet Applications (Telnet, FTP).
TCP/IP (Transmission Control Protocol / Internet Protocol)
Standardisation and regulation on information security Margus Püüa Head of Department Department of State Information Systems Ministry of Economic Affairs.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Gillian Raab, Chris Dibben, & Paul Burton UNECE-Eurostat Work Session on Statistical Data Confidentiality, Helsinki, 2015 Running an analysis of combined.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
- Manvitha Potluri. Client-Server Communication It can be performed in two ways 1. Client-server communication using TCP 2. Client-server communication.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Higher Computing Science 2016 Prelim Revision. Topics to revise Computational Constructs parameter passing (value and reference, formal and actual) sub-programs/routines,
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Workflow Manager Demo. Login Page Annotator Group Main Page ‘Details’: link to see the workflow detail Filter selection Click to view interface question.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
4 - Conditional Control Structures CHAPTER 4. Introduction A Program is usually not limited to a linear sequence of instructions. In real life, a programme.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Antony Edwin Keane Inc Ltd
Chapter 13 FTP and Telnet Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle River,
How to convert a Demo to Multi-user
Module 4 Remote Login.
UNH Programming Assistance Center Automation
(bandwidth control) Jeff Boote Internet2
Charles Phillips screen
Figure 1-7: Eavesdropping on a Dialog
Network Security – Kerberos
CHAPTER 11: Producing Data— Part II Review
Electronic Payment Security Technologies
Internet Applications (Telnet, FTP)
Presentation transcript:

Secure Statistics Software Francisco Vera National Institute of Statistical Sciences

Secure Sums Secure sum protocol (explained by Alan) –Process starts at one agency –A message is passed from agency to agency sequentially –If agencies know order of sequence, they could collide and break confidentiality. Third party server handles communication and sequence order

Double Encryption Server carries the messages between agencies, but is unable to read them –Agencies encrypt messages and share key with each other but not with server Communication between server and agencies is encrypted –During login, server assigns tag and encryption key, which is not shared with other agencies

Reservation Some one designated by involved agencies reserves the server The server waits until all involved agencies are logged in and ready When all agencies are ready, server randomizes order of agencies and start process

Regression Similar to secure sum implementation Agencies agree upon formula They all should have variables involved in regression with the same names Formula builder Regression results: binary file containing XtX, XtY, YtY Regression results viewer

Screen Shoots

Demo Run program