Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticated Online Data Integration Services1.

Slides:



Advertisements
Similar presentations
Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Advertisements

Giuseppe Bianchi Lecture 6.1: Extras: Merkle Trees.
CSC 774 Advanced Network Security
Computer Science and Engineering Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search Chengyuan Zhang 1,Ying Zhang 1,Wenjie Zhang 1, Xuemin.
Enhancing Demand Response Signal Verification in Automated Demand Response Systems Daisuke Mashima, Ulrich Herberg, and Wei-Peng Chen SEDN (Solutions for.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
+ Accelerating Fully Homomorphic Encryption on GPUs Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar ECE Dept., Worcester Polytechnic Institute.
Vpn-info.com.
CSC 774 Advanced Network Security
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Gelu M. Nita NJIT. Noise Diode Control Day/Night Attn. Ctrl. Solar Burst Attn. Ctrl. V/H RF Power Out Attn. Ctrl. Temperature Sensors.
A Dynamic Binary Hash Scheme for IPv6 Lookup Q. Sun 1, X. Huang 1, X. Zhou 1, and Y. Ma 1,2 1. School of Computer Science and Technology 2. Beijing Key.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Optimization of Spatial Joins on Mobile Devices N. Mamoulis 1, P. Kalnis 2, S. Bakiras 3, X. Li 2 1 Department of Computer Science and Information Systems,
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Clementine Server Clementine Server A data mining software for business solution.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Probabilistic Skyline Operator over sliding Windows Wan Qian HKUST DB Group.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
HPCC Mid-Morning Break Dirk Colbry, Ph.D. Research Specialist Institute for Cyber Enabled Discovery Introduction to the new GPU (GFX) cluster.
Cache-Conscious Runtime Optimization for Ranking Ensembles Xun Tang, Xin Jin, Tao Yang Department of Computer Science University of California at Santa.
Yin Yang, Dimitris Papadias, Stavros Papadopoulos HKUST, Hong Kong Panos Kalnis KAUST, Saudi Arabia Providence, USA, 2009.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
Comp-TIA Standards.  AMD- (Advanced Micro Devices) An American multinational semiconductor company that develops computer processors and related technologies.
Bob Thome, Senior Director of Product Management, Oracle SIMPLIFYING YOUR HIGH AVAILABILITY DATABASE.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Collaborating with iPlant.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
AUTHORS: STIJN POLFLIET ET. AL. BY: ALI NIKRAVESH Studying Hardware and Software Trade-Offs for a Real-Life Web 2.0 Workload.
Development of the Graphical User Interface and Improvement and Streamlining of NYMTC's Best Practice Model Jim Lam, Andres Rabinowicz, Srini Sundaram,
Goodbye rows and tables, hello documents and collections.
Authentication: Owner and user OwnerUser Query: X > 6 Message m: Answer to X>6: X1, X5 Sign(m) DB.
Computer Science iBigTable: Practical Data Integrity for BigTable in Public Cloud CODASPY 2013 Wei Wei, Ting Yu, Rui Xue 1/40.
CERN - IT Department CH-1211 Genève 23 Switzerland t Tier0 database extensions and multi-core/64 bit studies Maria Girone, CERN IT-PSS LCG.
Insert presenter logo here on slide master. See hidden slide 4 for directions  Session ID: Session Classification: SEUNG GEOL CHOI UNIVERSITY OF MARYLAND.
SEC835 Practical aspects of security implementation Part 1.
Computer Science Integrity Assurance for Outsourced Databases without DBMS Modification DBSec 2014 Wei Wei, Ting Yu 1.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Event-Based Hybrid Consistency Framework (EBHCF) for Distributed Annotation Records Ahmet Fatih Mustacoglu Advisor: Prof. Geoffrey.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Testing… Testing… 1, 2, 3.x... Performance Testing of Pi on NT George Krc Mead Paper.
This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.
Reporter : Yu Shing Li 1.  Introduction  Querying and update in the cloud  Multi-dimensional index R-Tree and KD-tree Basic Structure Pruning Irrelevant.
Harnessing Multicore Processors for High Speed Secure Transfer Raj Kettimuthu Argonne National Laboratory.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Making Watson Fast Daniel Brown HON111. Need for Watson to be fast to play Jeopardy successfully – All computations have to be done in a few seconds –
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticating Top-k Queries in Location-based Services with Confidentiality1.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Jordan Brown & Douglas M.
Use or disclosure of the contents of this page is restricted by the terms on the notice page Intel Strategy for Post Quantum Crypto Ernie Brickell Presentation.
Get the Most out of SQL Server Standard Edition Or How to be a SQL Miser.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
A Web Based Job Submission System for a Physics Computing Cluster David Jones IOP Particle Physics 2004 Birmingham 1.
A Flexible Spatio-temporal indexing Scheme for Large Scale GPS Tracks Retrieval Yu Zheng, Longhao Wang, Xing Xie Microsoft Research.
Spatial Approximate String Search. Abstract This work deals with the approximate string search in large spatial databases. Specifically, we investigate.
Authenticated Join Processing in Outsourced Databases
Efficient Multi-User Indexing for Secure Keyword Search
The Most Secure Cloud Storage Provider
KISS-Tree: Smart Latch-Free In-Memory Indexing on Modern Architectures
Fast Nearest Neighbor Search on Road Networks
Towards A Standard for Practical Hash-based Signatures
XMSS Practical Hash-Based Signatures Andreas Hülsing joint work with Johannes Buchmann and Erik Dahmen | TU Darmstadt | Andreas Hülsing.
CS246: Search-Engine Scale
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
SPIRAL: Security Protocols for Cerberus
Presentation transcript:

Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticated Online Data Integration Services1

2 Query Integration Server (IS) Result Authenticated Online Data Integration Services Data Sources Client Combining data from multiple sources Providing users with a unified query interface

3 Client Airlines Integration Server (IS) Authenticated Online Data Integration Services CX105$617HK->MEL CX135$617HK->MEL CX105$617HK->MEL CX135$617HK->MEL QF30$594HK->MEL QF98$698HK->MEL MH73$691HK->MEL MH79$699HK->MEL QF30 Price: $594 QF30$594HK->MEL QF98$698HK->MEL MH73$691HK->MEL MH79$699HK->MEL Incorrect results Hacking attack Incomplete search Program bug In favor of sponsor HK -> MEL CX105 Price: $617

 Meta-analysis ◦ Life science research (e.g., virus spread and disease control) requires collection of disparate datasets ◦ Example: DataNet ◦ The server may be compromised by cyber attack  Collaborative data fusion ◦ Online collaborative data platforms ◦ Examples: Wikipedia, Wikisensing, Wikidata ◦ May alter some critical results due to political or financial reasons Authenticated Online Data Integration Services4 Authenticated Query Processing Enable clients to verify the correctness of query results

0123 Authenticated Online Data Integration Services5 Service Provider Data Owner Client {1, 3, 4, 5} Merkle Hash Tree (MHT) Sign Dataset Q=[1,1] Verify 0123

Authenticated Online Data Integration Services6

7

8

9

10

Authenticated Online Data Integration Services11 Authenticated Prefix Tree Extended Queries & Optimizations Extended Queries & Optimizations

Authenticated Online Data Integration Services12

 Homomorphism ◦ Completeness  Embedded a secret sharing scheme ◦ Seal folding  Generate seals for internal nodes ◦ Update efficient  Cancel out the old seals  RSA based signature ◦ Publicly verifiable Authenticated Online Data Integration Services13

Authenticated Online Data Integration Services14 {1, 3, 4, 5} Data Q=[1,1] Integration Server Data Sources Client Verify Dataset & Seals

Authenticated Online Data Integration Services15 Efficient to update, but may deteriorate under skew distribution

Authenticated Online Data Integration Services16 Tightly clustered, but an update may cause cascading tree reconstructions

Authenticated Online Data Integration Services17

 Dataset: ◦ Gowalla dataset in Stanford Large Network Dataset Collection  6,442,890 user check-ins  1,280,969 unique locations with a non-spatial score ◦ Weather dataset from NWS Cooperative Observer Program  10,000 volunteers report daily weather observation  Server: Dual 4-core Intel Xeon X GHz CPU and 32GB RAM, running GNU/Linux, OpenJDK 1.6  Client: Core 2 Quad processor and 4GB RAM, WinXP  RSA (2048 bits), AES(256 bits)  h(): SHA-1 (160 bits) 18Authenticated Online Data Integration Services

19 The construction cost is linear to the dataset size

Authenticated Online Data Integration Services20 Both index trees outperform the naïve solution. R-tree is better than G-tree since it is more compact.

Authenticated Online Data Integration Services21 G-tree updates more efficiently than R-tree. Both optimizations improve performance by 20-30%.

Authenticated Online Data Integration Services22

Authenticated Online Data Integration Services23

Authenticated Online Data Integration Services24 Cost is linear to the query range (i.e., the result size )

Authenticated Online Data Integration Services25 G-tree deteriorates faster since R-tree is more compact

Authenticated Online Data Integration Services26 G-tree wins when query ratio 60%

Authenticated Online Data Integration Services27

Authenticated Online Data Integration Services28