Scalable Verifiable Encrypted Search Encrypted Search with Third Party Support and Protection From Dishonest Data Stores.

Slides:



Advertisements
Similar presentations
A Prototype Implementation of a Framework for Organising Virtual Exhibitions over the Web Ali Elbekai, Nick Rossiter School of Computing, Engineering and.
Advertisements

Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Evaluation of a Scalable P2P Lookup Protocol for Internet Applications
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Safeguarding and Charging for Information on the Internet Hector Garcia-Molina, Steven P. Ketchpel, Narayanan Shivakumar Stanford University Presented.
SECURING THE CLOUDS Presented By: Dr. Mohammed Imtiaz Ahmed Librarian, Pt. Ravi Shankar Shukla University Raipur (C.G), Mohammed Bakhtawar Ahmed.
2 Your data is anywhere but not in your control Security breaches are recurrent – Weakest link: hardware, software, technicians, … You may trust the science.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
An Architecture for Creating Collaborative Semantically Capable Scientific Data Sharing Infrastructures Anuj R. Jaiswal, C. Lee Giles, Prasenjit Mitra,
CGI and Perl MSc Publishing on the WWW. What is CGI ? (1) User Buying and selling Playing games Customised web pages Developer Means to run external programs.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Sys Prog & Scripting - HW Univ1 Systems Programming & Scripting Lecture 15: PHP Introduction.
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems Himanshu Khurana NCSA, University of Illinois.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Producing solutions Criteria Basic rules 06/05/11 Projects 3.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web Mashups -Nirav Shah.
Privacy-Aware Personalization for Mobile Advertising
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
W3car project Emmanuel Castellani Laurent Marchese Nicolas Pastorelly Wolfgang Kieß Johannes Walch Claudia Schremmer Teleseminar Nice-Mannheim Year
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
1 Some initial Design suggestions… Getting started… where to begin? Find out whether your design architecture will work… as soon as possible. If you need.
Project 1. Goals  Write a simple TCP/IP client that supports a specific protocol  The server is running right now on login.ccs.neu.edu:27993  If your.
2005 Epocrates, Inc. All rights reserved. Integrating XML with legacy relational data for publishing on handheld devices David A. Lee Senior member of.
The european ITM Task Force data structure F. Imbeaux.
Okalo Daniel Ikhena Dr. V. Z. Këpuska December 7, 2007.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Scalability of Geopriv LS GLI Project Toshiharu Kurisu Yasuhito Watanabe
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Presented By Amarjit Datta
Proximity Spider Project by Ganesh Naikare Project Advisor: Professor Scott Spetka.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
1 HBASE – THE SCALABLE DATA STORE An Introduction to HBase XLDB Europe Workshop 2013: CERN, Geneva James Kinley EMEA Solutions Architect, Cloudera.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Developing our Metadata: Technical Considerations & Approach Ray Plante NIST 4/14/16 NMI Registry Workshop BIPM, Paris 1 …don’t worry ;-) or How we concentrate.
Web Mashups -Nirav Shah.
Section 6.3 Server-side Scripting
Lecture 22 – April 9, 2002 Subprotocols – static and dynamic.
Security and Wireless LANs
Anonymous Communication
Searchable. Secure. Simple.
Anonymous Communication
Scalable Encrypted Verifiable Search
Encrypted Database Final Presentation
Addressing confidentiality issue in third party xml publication
Cloud for Development Data Storage, Data Analytics, Data Sharing
Anonymous Communication
Presentation transcript:

Scalable Verifiable Encrypted Search Encrypted Search with Third Party Support and Protection From Dishonest Data Stores

What is Encrypted Search?  Data is “big” nowadays and storage is often outsourced  Clients must be able to store and access their data  Inevitable leaks plague this concept and make outsourcing impossible for sensitive data  “Encrypted search” is a family of protocols where:  data is encrypted on the client side and stored elsewhere  data is searchable and accessible by the client using encrypted search keys  the server does not know the contents of the data or the keys

+Scalable?  In the past, encrypted search has been implemented but did not perform well.  Solutions with O(>n) do not scale to large datasets.  Recently (in this decade) papers have been published outlining a sub-linear protocol.  Another nuance is that clients must be able to allow third parties to search their data. This is a challenging cryptography probably that has also been recently solved.  Experimental implementations for proposed solutions exist.

+Verifiable?  Current solutions assume an honest but curious server  Inferences can be made from leaked information, such as number of documents that match the query and relative size of documents  So, even if the server responds accurately, it may be maliciously harvesting information about clients’ data  It is not unreasonable to assume that there will be dishonest servers as well, e.g. those that return less documents than actually matched  No implementation exists for verifiable encrypted search, but a paper outlining a solution has been published by Professor Rosario Gennaro.

Our Goal  Add “verifiability” to the OSPIR-OXT protocol developed in a joint project by IBM, MIT, and UC Urvine  Make Scalable Verifiable Encrypted Search easy to use  Current implementation is a mess of scripts written in several languages  Requires a specific system for compilations and run time  Very difficult to create new schemas and generate data  We want this to be available to everyone

Current stage in the process  Got IBM Espada project that implements the OSPIR-OXT protocol to compile and run.  Now figuring out how to generalize data generation to any schema.

Thanks! Johannes Christ and Daniel Intskirveli