!Oxymoron: Encrypted (Database) Search
|
|
- Clifford Payne
- 6 years ago
- Views:
Transcription
1 !Oxymoron: Encrypted (Database) Search Srinivasan Narayanamurthy (Srini) NetApp 1
2 Agenda Survey Homomorphic Encryption 101 Encrypted Search Tradeoffs Leakage Functionality Encrypted Databases 2
3 Survey Non-cryptographic methods Differential Privacy (Noise) Data Anonymization Data Fragmentation Secret-Sharing based methods Verifiable (collaborative) Order Preserving Index based methods Bucketization Order-preserving Searchable 3
4 Survey (Continued) Cryptographic Functional Encryption Searchable Encryption Secure-Multiparty Computation Homomorphic Cryptosystems Fully (FHE) Partial (PHE) State-of-the-art Systems Systems based on Homomorphic (CryptDB) Client-server splitting approaches (Monomi, Silverline) Trusted Hardware Systems (TrustedDB, Cipherbase) 4
5 Symmetric Encryption Key: a0b0c0d0e0f The quick brown fox jumps over the lazy dog Encrypt a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df Decrypt The quick brown fox jumps over the lazy dog Key: a0b0c0d0e0f 5 5
6 Asymmetric Encryption Public key: a0b0c0d0e0f The quick brown fox jumps over the lazy dog Encrypt a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df Decrypt The quick brown fox jumps over the lazy dog Private key: 47b6ffedc2be19bd5359c32bcfd8dff5 6 6
7 AES + CBC mode Key: a0b0c0d0e0f Initialization Vector (IV) The quick brown fox jumps over the lazy dog Key AES Key AES Key AES a7be1a6997a... b6ff744ed2c... 47f7f7bc Variable IV => Non-deterministic 7 7
8 AES + CBC mode (IV changes) Key: a0b0c0d0e0f Initialization Vector (IV) The quick brown fox jumps over the lazy dog Key AES Key AES Key AES fa63a2825b c4e0d86a7b... Variable IV => Non-deterministic 8 8
9 Non-deterministic Encryption Key: a0b0c0d0e0f The quick brown fox jumps over the lazy dog Encrypt a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df The quick brown fox jumps over the lazy dog Encrypt fa636a2825b339c940668a d b3fa6ed b6c 69c4e0d86a7b0430d8cdb78070b4c55a Key: a0b0c0d0e0f 9 Example: AES + CBC + Variable IV 9
10 AES + ECB mode The quick brown fox jumps over the lazy dog Key AES Key AES Key AES a7be1a6997a... b6ff744ed2c... 47f7f7bc Key: a0b0c0d0e0f
11 Deterministic Encryption Key: a0b0c0d0e0f The quick brown fox jumps over the lazy dog Encrypt a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df The quick brown fox jumps over the lazy dog Encrypt a7be1a6997ad739bd8c9ca451f618b61 b6ff744ed2c2c9bf6c590cbf0469bf41 47f7f7bc95353e03f96c32bcfd8058df Key: a0b0c0d0e0f 1 1 Example: AES + ECB 11
12 Order Preserving Encryption Value Enc (Value) 1 0x d5f50b2beffd9f3dca4ea7 2 0x0065fda789ef4e272bcf102787a x009b5708e13665a7de14d3d824ca9f15 4 0x04e062ff507458f9be ed654c 5 0x08db34fb1f807678d3f833c2194a759e xx ; yy EEnncc xx ; EEnncc' yy( Example: AES + FFX
13 Homomorphic Encryption Enc (1) 7ad5fda789ef4e272bca100b3d9ff59f bd6e7c3df2b5779e0b61216e8b10b689 +Enc Enc (2) 7a9f102789d5f50b2beffd9f3dca4ea7 Enc (1) Encryption key is not an input
14 The Spectrum Fully Homomorphic Encryption ( any function ) Impractical Partial Homomorphic Encryption Paillier Cryptosystem ( + ) Expensive ElGamal Cryptosystem ( x ) Order Preserving Encryption ( ) Deterministic Encryption ( = = ) Non-deterministic Encryption ( ) Practical
15 Performance Scheme Space for one integer (bits) Time for one operation Fully Homomorphic Encryption Paillier ElGamal 2 14 Cosmic time scales 2048 ~ ms Deterministic Encryption 128 ~ μs
16 Encrypted Search Tradeoffs Computation & Communication complexity E.g. sub-linear index Efficiency Leakage E.g. Index, search & access pattern Security Query expressiveness (equality, boolean, subset, range queries, inner products)
17 Is Encryption == Security? 17
18 Leakage Profile Characteristics Objects that leak Type of information leaked Which operation leaks Party that learns the leakage Examples Data objects, queries, query response (access control rules) Same value, Matches the intersection of two sets = (say equality) >, < (say, range) Provider, Querier, Server 18
19 Information leaked by Objects Information Structure Identifiers Predicates Equalities Order (or more) Examples String length, set cardinality, tree rep. of object Pointers to objects Additional information, say, a. within a common (known) range b. matches the intersection of 2 clauses within a query Objects that have same value Numerical/lexicographic ordering of objects, or perhaps even partial plaintext data 19
20 Queries on Encrypted Data Type of data Structured (DBs), Semi (XML/JSON) Unstructured Mixed Type of Queries Relational Algebra (SQL) Associative Arrays (NoSQL) Linear Algebra (NewSQL) Content-based Information Retrieval Examples Set (Union, Intersection, Difference, Cartesian product), Selection, Projection, Join (Semi-ring): Construction, Find, AA (+, x), AA Element-wise (x) Construction, Find, Matrix (+, x), Element-wise (x) Query-by-example, Fuzzy queries Exhaustive search Eg. filesystems Indexes SELECT * FROM patient WHERE (age > 40) AND (X-ray CONTAINS lung cancer ) 20
21 Base Queries Approach Description Examples Legacy Custom Obliv Modifies data insertions and query requests Special purpose protected indices Obscures object identifiers (say, pointers) Property (equality or order) preserving, boolean queries and joins by combining the results of PPE. (CryptDB) Inverted Index, Tree Traversal, Custom indices (Graph) ORAM 21
22 Composed Queries 22
23 Systems Landscape Full Homomorphic Partial Homomorphic CryptDB Monomi TrustedDB Cipherbase Non- Homomorphic Blob Store AWS GovCloud No Secure Location Client Secure Server Crypto Coprocessor FPGA 23
24 Encrypted Databases CryptDB Query-aware encryption schemes RND, HE, DET, OPE Architecture SQL-aware encryption Adjustable query-based encryption Chain cryptographic keys in user passwords Supports only 2 out of 22 queries in TPC-H Monomi (OLAP) Layout optimizer, Query planner Intermediate results. Ex.: SUM / GROUP BY / HAVING Supports 19 out of 22 queries 24
25 Summary Application security DBMS is only a part of the overall system stack Usability Clients need tools and interpretable security models to navigate security-performance tradeoffs Connections to other areas of security Data privacy, access-control, auditing 25
26 Thank you! 26
Processing Analytical Queries over Encrypted Data
Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Sam Madden Nickolai Zeldovich VLDB 2013 Introduction MONOMI a system for securely executing analytical queries over sensitive
More informationQuerying Encrypted Data
Querying Encrypted Data Arvind Arasu, Ken Eguro, Ravi Ramamurthy, Raghav Kaushik Microsoft Research Cloud Computing Well-documented benefits Trend to move computation and data to cloud Database functionality
More informationCryptographically Protected Database Search
Cryptographically Protected Database Search Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, Darby Mitchell, Robert Cunningham benjamin.fuller@uconn.edu
More informationSQL on Structurally-Encrypted Databases
SQL on Structurally-Encrypted Databases Seny Kamara Tarik Moataz Q: What is a relational database? 2 Relational DB Table or relation Column or attribute Att 1 Att 2 Att 3 Att 4 Att5 Att 6 Att 7 DB = Row
More informationProcessing Analytical Queries over Encrypted Data
Processing Analytical Queries over Encrypted Data The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationDBMask: Fine-Grained Access Control on Encrypted Relational Databases
187 214 DBMask: Fine-Grained Access Control on Encrypted Relational Databases Muhammad I Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino Purdue University, West Lafayette, IN, 47907, USA. Oracle,
More informationPrivacy-Preserving Machine Learning
Privacy-Preserving Machine Learning CS 760: Machine Learning Spring 2018 Mark Craven and David Page www.biostat.wisc.edu/~craven/cs760 1 Goals for the Lecture You should understand the following concepts:
More informationNorthrop Grumman Cybersecurity Research Consortium (NGCRC) Spring 2014 Symposium
Northrop Grumman Cybersecurity Research Consortium (NGCRC) Spring 2014 Symposium Crypsis: Secure Big Data Analysis in Untrusted Clouds 28 May 2014 Julian Stephen, Savvas Savvides, Russell Seidel and Patrick
More informationPrivacy-Preserving Using Data mining Technique in Cloud Computing
Cis-601 Graduate Seminar Privacy-Preserving Using Data mining Technique in Cloud Computing Submitted by: Rajan Sharma CSU ID: 2659829 Outline Introduction Related work Preliminaries Association Rule Mining
More informationLectures 6+7: Zero-Leakage Solutions
Lectures 6+7: Zero-Leakage Solutions Contents 1 Overview 1 2 Oblivious RAM 1 3 Oblivious RAM via FHE 2 4 Oblivious RAM via Symmetric Encryption 4 4.1 Setup........................................ 5 4.2
More informationCSC 5930/9010 Cloud S & P: Cloud Primitives
CSC 5930/9010 Cloud S & P: Cloud Primitives Professor Henry Carter Spring 2017 Methodology Section This is the most important technical portion of a research paper Methodology sections differ widely depending
More informationDifferential Privacy
CPSC 426/526 Differential Privacy Ennan Zhai Computer Science Department Yale University Recall: Lec-11 In lec-11, we learned: - Cryptographic basics - Symmetric key cryptography - Public key cryptography
More informationBuilding systems that compute on encrypted data
? xd51db5 X9ce568 xab2356 x453a32 xe891a1 X32e1dc xdd0135 x63ab12 Building systems that compute on encrypted data Raluca Ada Popa MIT Compromise of confidential data is prevalent Problem setup clients
More informationSecure Conjunctive Keyword Ranked Search over Encrypted Cloud Data
Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared
More informationOrder-Revealing Encryption:
Order-Revealing Encryption: New Constructions, Applications and Lower Bounds Kevin Lewi and David J. Wu Stanford University Searching on Encrypted Data Searching on Encrypted Data Searching on Encrypted
More informationHomomorphic Encryption
Homomorphic Encryption Travis Mayberry Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Northeastern saves money on infrastructure and gets the benefit of redundancy and
More informationCERIAS Tech Report DBMask: Fine-Grained Access Control on Encrypted Relational Databases by Mohamed Nabeel, Muhammad I.
CERIAS Tech Report 2013-21 DBMask: Fine-Grained Access Control on Encrypted Relational Databases by Mohamed Nabeel, Muhammad I. Sarfraz, Jianneng Cao, Elisa Bertino Center for Education and Research Information
More informationENEE 457: Computer Systems Security 09/12/16. Lecture 4 Symmetric Key Encryption II: Security Definitions and Practical Constructions
ENEE 457: Computer Systems Security 09/12/16 Lecture 4 Symmetric Key Encryption II: Security Definitions and Practical Constructions Charalampos (Babis) Papamanthou Department of Electrical and Computer
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationSymmetric Cryptography
CSE 484 (Winter 2010) Symmetric Cryptography Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...
More informationSecure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results
Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19 th, 2013 Agenda Motivation for Secure
More informationPrivacy Preserving Service Discovery for Interoperability in Power to the Edge Approach Research and Development Initiative, Chuo University
Privacy Preserving Service Discovery for Interoperability in Power to the Edge Approach Research and Development Initiative, Chuo University Hiroshi Yamaguchi, Masahito Gotaishi, Shigeo Tsujii, Norihisa
More informationUsing Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data Wen-jie Lu 1, Shohei Kawasaki 1, Jun Sakuma 1,2,3 1. University of Tsukuba, Japan 2. JST CREST 3.
More information9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationCryptography (cont.)
CSE 484 / CSE M 584 (Autumn 2011) Cryptography (cont.) Daniel Halperin Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationarxiv: v4 [cs.cr] 18 Jan 2018
Top-k Query Processing on Encrypted Databases with Strong Security Guarantees Xianrui Meng Haohan Zhu George Kollios arxiv:1510.05175v4 [cs.cr] 18 Jan 2018 Abstract Privacy concerns in outsourced cloud
More informationStructured Encryption and Controlled Disclosure
Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Cloud Storage Security for Cloud Storage o Main concern: will my data be safe? o it will be encrypted o it will
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationFORWARD PRIVATE SEARCHABLE ENCRYPTION
FORWARD PRIVATE SEARCHABLE ENCRYPTION DATE 13/07/2016 MSR CAMBRIDGE - RAPHAEL BOST Searchable Encryption Outsource data securely keep search functionalities Generic Solutions We can use generic tools
More informationUsing cryptography in databases and web applica4ons
Using cryptography in databases and web applica4ons Nickolai Zeldovich MIT CSAIL Joint work with Raluca Ada Popa, Stephen Tu, Emily Stark, Jonas Helfer, Steven Valdez, Hari Balakrishnan, Frans Kaashoek,
More information7. Symmetric encryption. symmetric cryptography 1
CIS 5371 Cryptography 7. Symmetric encryption symmetric cryptography 1 Cryptographic systems Cryptosystem: t (MCKK GED) (M,C,K,K,G,E,D) M, plaintext message space C, ciphertext message space K, K, encryption
More informationHiding in the Cloud: The Perils and Promise of Searchable Encryption
Hiding in the Cloud: The Perils and Promise of Searchable Encryption Jason Perry Lewis University In collaboration with: David Cash Rutgers University Paul Grubbs Cornell University Tom Ristenpart Cornell
More informationSQL on Structurally-Encrypted Databases
SQL on Structurally-Encrypted Databases Seny Kamara Brown University Tarik Moataz Brown University Abstract We show how to encrypt a relational database in such a way that it can efficiently support a
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 4, 2017 CPSC 467, Lecture 11 1/39 ElGamal Cryptosystem Message Integrity and Authenticity Message authentication codes
More informationDJoin: Differentially Private Join Queries over Distributed Databases. University of Pennsylvania
DJoin: Differentially Private Join Queries over Distributed Databases Arjun Narayan Andreas Haeberlen University of Pennsylvania 1 Motivation Is there a epidemic in Elbonia? Researcher Airlines Doctors
More informationSecure Multiparty Computation Multi-round protocols
Secure Multiparty Computation Multi-round protocols Li Xiong CS573 Data Privacy and Security Secure multiparty computation General circuit based secure multiparty computation methods Specialized secure
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationSIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017
SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and
More informationCryptography: Symmetric Encryption [continued]
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption [continued] Fall 2016 Ada (Adam) Lerner lerner@cs.washington.edu Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann,
More informationComputer Security CS 526
Computer Security CS 526 Topic 4 Cryptography: Semantic Security, Block Ciphers and Encryption Modes CS555 Topic 4 1 Readings for This Lecture Required reading from wikipedia Block Cipher Ciphertext Indistinguishability
More informationHarnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices
34th IEEE INFOCOM, 26 April 1 May, 2015, Hong Kong Harnessing Encrypted Data in Cloud for Secure and Efficient Image Sharing from Mobile Devices Helei Cui, Xingliang Yuan, and Cong Wang Department of Computer
More informationStructured Encryption
Contents Structured Encryption 1 Motivation 1 2 The Solution Space 3 3 Structured Encryption 5 4 Data Structures 6 5 Syntax 7 6 Security 8 6.1 Formalizing Leaky Primitives.......................... 9 1
More informationUsing Cryptography CMSC 414. October 16, 2017
Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using
More informationSyrvey on block ciphers
Syrvey on block ciphers Anna Rimoldi Department of Mathematics - University of Trento BunnyTn 2012 A. Rimoldi (Univ. Trento) Survey on block ciphers 12 March 2012 1 / 21 Symmetric Key Cryptosystem M-Source
More informationIntroduction to cryptology (GBIN8U16)
Introduction to cryptology (GBIN8U16) Finite fields, block ciphers Pierre Karpman pierre.karpman@univ-grenoble-alpes.fr https://www-ljk.imag.fr/membres/pierre.karpman/tea.html 2018 01 31 Finite fields,
More informationCryptography. Andreas Hülsing. 6 September 2016
Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:
More informationSearchable Encryption Using ORAM. Benny Pinkas
Searchable Encryption Using ORAM Benny Pinkas 1 Desiderata for Searchable Encryption Security No leakage about the query or the results Functionality Variety of queries that are supported Performance 2
More informationDesign and Analysis of High Performance Crypt-NoSQL
Design and Analysis of High Performance Crypt-NoSQL Ming-Hung Shih and J. Morris Chang Abstract NoSQL databases have become popular with enterprises due to their scalable and flexible storage management
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationDemonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin
Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions Topic Prerequisites Security concepts Security-related concepts (e.g., entropy) Virtualization
More informationCryptographic Systems
CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationOrder-Revealing Encryption:
Order-Revealing Encryption: How to Search on Encrypted Data Kevin Lewi and David J. Wu Stanford University Searching on Encrypted Data The information accessed from potentially exposed accounts "may have
More informationA Machine Learning Approach to Privacy-Preserving Data Mining Using Homomorphic Encryption
A Machine Learning Approach to Privacy-Preserving Data Mining Using Homomorphic Encryption Seiichi Ozawa Center for Mathematical Data Science Graduate School of Engineering Kobe University 2 What is PPDM?
More informationSecure Parallel Processing on Encryption Cloud Data Using Fully Homomorphic Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationCryptography [Symmetric Encryption]
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography [Symmetric Encryption] Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin,
More informationMidgame Attacks. (and their consequences) Donghoon Chang 1 and Moti Yung 2. IIIT-Delhi, India. Google Inc. & Columbia U., USA
Midgame Attacks (and their consequences) Donghoon Chang 1 and Moti Yung 2 1 IIIT-Delhi, India 2 Google Inc. & Columbia U., USA Crypto is a Technical Science As technology moves, so should crypto designs
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationVERIFIABLE SYMMETRIC SEARCHABLE ENCRYPTION
VERIFIABLE SYMMETRIC SEARCHABLE ENCRYPTION DATE 09/03/2016 SÉMINAIRE EMSEC - RAPHAEL BOST Searchable Encryption Outsource data securely keep search functionalities Generic Solutions We can use generic
More informationSecuring Bitcoin wallets: A new DSA threshold signature scheme that is usable in the real world
Securing Bitcoin wallets: A new DSA threshold signature scheme that is usable in the real world https://eprint.iacr.org/2016/013 Rosario Gennaro, Steven Goldfeder, Arvind Narayanan Spending bitcoins is
More informationEncrypted databases. Tom Ristenpart CS 6431
Encrypted databases Tom Ristenpart CS 6431 Outsourced storage settings Client wants to store data up on Dropbox High availability, synch across devices Server includes much value-add functionality Keyword
More informationBasic operators: selection, projection, cross product, union, difference,
CS145 Lecture Notes #6 Relational Algebra Steps in Building and Using a Database 1. Design schema 2. Create schema in DBMS 3. Load initial data 4. Repeat: execute queries and updates on the database Database
More informationCrypto tidbits: misuse, side channels. Slides from Dave Levin 414-spring2016
Crypto tidbits: misuse, side channels Slides from Dave Levin 414-spring2016 A paper from 2013 that looked at how Android apps use crypto, as a function of 6 rules that reflect the bare minimum a secure
More informationWhite-Box Cryptography State of the Art. Paul Gorissen
White-Box Cryptography State of the Art Paul Gorissen paul.gorissen@philips.com Outline Introduction Attack models White-box cryptography How it is done Interesting properties State of the art Conclusion
More informationUses of Cryptography
Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can
More informationThe Relational Algebra
The Relational Algebra Relational Algebra Relational algebra is the basic set of operations for the relational model These operations enable a user to specify basic retrieval requests (or queries) 27-Jan-14
More informationOrder-Revealing Encryption:
Order-Revealing Encryption: How to Search on Encrypted Data Kevin Lewi and David J. Wu Stanford University Searching on Encrypted Data Searching on Encrypted Data Searching on Encrypted Data Searching
More informationOrder-Revealing Encryption:
Order-Revealing Encryption: How to Search on Encrypted Data David Wu Stanford University based on joint works with Nathan Chenette, Kevin Lewi, and Stephen A. Weis Searching on Encrypted Data The information
More informationChapter 6 The Relational Algebra and Relational Calculus
Chapter 6 The Relational Algebra and Relational Calculus Fundamentals of Database Systems, 6/e The Relational Algebra and Relational Calculus Dr. Salha M. Alzahrani 1 Fundamentals of Databases Topics so
More informationSecurity and Privacy through Modern Cryptography
Security and Privacy through Modern Cryptography David Wu Stanford University Cryptography in the 1970s How can two users who have never met before communicate securely with each other? m secrecy integrity
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationRelational Database Management Systems for Epidemiologists: SQL Part II
Relational Database Management Systems for Epidemiologists: SQL Part II Outline Summarizing and Grouping Data Retrieving Data from Multiple Tables using JOINS Summary of Aggregate Functions Function MIN
More informationPrivate Database Queries Using Somewhat Homomorphic Encryption. Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu ACNS 2013 Fully Private Conjunctive Database Queries user SELECT * FROM db WHERE
More informationSecurity of Searchable Encrypted Cloud Storage
Security of Searchable Encrypted Cloud Storage David Cash Paul Grubbs Jason Perry Tom Ristenpart Rutgers University Cornell University Lewis University Cornell Tech Outsourced storage and searching client
More informationCMP-3440 Database Systems
CMP-3440 Database Systems Relational DB Languages Relational Algebra, Calculus, SQL Lecture 05 zain 1 Introduction Relational algebra & relational calculus are formal languages associated with the relational
More informationFoundations of Cryptology
Multimedia Security Mauro Barni University of Siena Cryptography Cryptography is the art or science of keeping messages secret; the word cryptography is derived from Greek and literally means secret (crypto-)
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message
More informationAdvanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50
Advanced Encryption Standard and Modes of Operation Foundations of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm AES has been originally requested
More information02. Usable Encryption. Blase Ur and Mainack Mondal March 28 th, 2018 CMSC / 33210
02. Usable Encryption Blase Ur and Mainack Mondal March 28 th, 2018 CMSC 23210 / 33210 1 This World of Ours 2 Encryption: A crash course 3 Encryption basics Putting information in code so that unauthorized
More informationGridDB Advanced Edition SQL reference
GMA022C1 GridDB Advanced Edition SQL reference Toshiba Solutions Corporation 2016 All Rights Reserved. Introduction This manual describes how to write a SQL command in the GridDB Advanced Edition. Please
More informationDefending Computer Networks Lecture 20: More Encryp1on. Stuart Staniford Adjunct Professor of Computer Science
Defending Computer Networks Lecture 20: More Encryp1on Stuart Staniford Adjunct Professor of Computer Science HW5 out on website Logis;cs Will need at least one correc;on Due Weds Dec 2nd No lectures next
More informationCS 161 Computer Security. Week of September 11, 2017: Cryptography I
Weaver Fall 2017 CS 161 Computer Security Discussion 3 Week of September 11, 2017: Cryptography I Question 1 Activity: Cryptographic security levels (20 min) Say Alice has a randomly-chosen symmetric key
More informationLeakage-Abuse Attacks against Searchable Encryption
Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs Jason Perry Tom Ristenpart Rutgers University Cornell University Lewis University Cornell Tech Outsourced storage and searching
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationCRYPTOGRAPHY. Jakub Laszczyk. June 7th,
CRYPTOGRAPHY Jakub Laszczyk June 7th, 2018 @KarmanLtd Agenda About What is it? And History Part 1 - Hashing Part 2 - Symmetric Keys Part 3 - Asymmetric Keys Conclusion 2 About Karman Interactive is a mobile
More informationHighly-Functional Highly-Scalable Search on Encrypted Data
Highly-Functional Highly-Scalable Search on Encrypted Data Hugo Krawczyk, IBM Joint work with IBM-UCI teams: David Cash, Sky Faber, Joseph Jaeger, Stas Jarecki, Charanjit Jutla, Quan Nguyen, Marcel Rosu,
More informationAnalysis of Partially and Fully Homomorphic Encryption
Analysis of Partially and Fully Homomorphic Encryption Liam Morris lcm1115@rit.edu Department of Computer Science, Rochester Institute of Technology, Rochester, New York May 10, 2013 1 Introduction Homomorphic
More informationSecure Remote Storage Using Oblivious RAM
Secure Remote Storage Using Oblivious RAM Giovanni Malloy Mentors: Georgios Kellaris, Kobbi Nissim August 11, 2016 Abstract Oblivious RAM (ORAM) is a protocol that allows a user to access the data she
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationTechnological foundation
Technological foundation Carte à puce et Java Card 2010-2011 Jean-Louis Lanet Jean-louis.lanet@unilim.fr Cryptology Authentication Secure upload Agenda Cryptology Cryptography / Cryptanalysis, Smart Cards
More informationSymmetric-Key Cryptography
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016 Announcements Project due Sept 20 Special guests Alice Bob The attacker (Eve - eavesdropper, Malice) Sometimes Chris
More informationPrivacy Preserving Decision Tree Classification on Horizontal Partition Data
Privacy Preserving Decision Tree Classification on Horizontal Partition Kamini D. Tandel Shri S ad Vidya Mandal Institute of Technology Bharuch, Gujarat, India Jignasa N. Patel Shri S ad Vidya Mandal Institute
More informationSecurity of Searchable Encrypted Cloud Storage
Security of Searchable Encrypted Cloud Storage David Cash Paul Grubbs Jason Perry Tom Ristenpart Rutgers U Skyhigh Networks Lewis U Cornell Tech Outsourced storage and searching client give me all records
More informationCIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm
CIS 4360 Introduction to Computer Security Fall 2010 WITH ANSWERS in bold Name:.................................... Number:............ First Midterm Instructions This is a closed-book examination. Maximum
More informationSecurity IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y
AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing l e a d i n g t h e w a y l e a d i n g t h e w a y Secure your sensitive content, guarantee its integrity and
More information