Data Protection and String Search in SDDS-2005

Slides:



Advertisements
Similar presentations
Introduction to Algorithms
Advertisements

Space-for-Time Tradeoffs
CSC 774 Advanced Network Security
1 Scalable Distributed Data Structures Part 2 Witold Litwin
Delta Encoding in the compressed domain A semi compressed domain scheme with a compressed output.
Procedures of Extending the Alphabet for the PPM Algorithm Radu Rădescu George Liculescu Polytechnic University of Bucharest Faculty of Electronics, Telecommunications.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Knuth-Morris-Pratt Algorithm left to right scan like the naïve algorithm one main improvement –on a mismatch, calculate maximum possible shift to the right.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
Improved TCAM-based Pre-Filtering for Network Intrusion Detection Systems Department of Computer Science and Information Engineering National Cheng Kung.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Witold Litwin Riad Mokadem Thomas Schwartz Disk Backup Through Algebraic Signatures.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Using Algebraic Signatures in Storage Applications Thomas Schwarz, S.J. Associate Professor, Santa Clara University Associate, SSRC UCSC Storage Systems.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
1 Pattern Matching Using n-grams With Algebraic Signatures Witold Litwin[1], Riad Mokadem1, Philippe Rigaux1 & Thomas Schwarz[2] [1] Université Paris Dauphine.
String Matching. Problem is to find if a pattern P[1..m] occurs within text T[1..n] Simple solution: Naïve String Matching –Match each position in the.
Chapter 17 Domain Name System
Theory and Applications of GF(2 p ) Cellular Automata P. Pal Chaudhuri Department of CST Bengal Engineering College (DU) Shibpur, Howrah India (LOGIC ON.
Data Compression By, Keerthi Gundapaneni. Introduction Data Compression is an very effective means to save storage space and network bandwidth. A large.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Pattern Matching Using n-gram Sampling Of Cumulative Algebraic Signatures : Preliminary Results Witold Litwin[1], Riad Mokadem1, Philippe Rigaux1 & Thomas.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
1 Kyung Hee University Chapter 18 Domain Name System.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Prepared by Emre Aydemir & Arif Çanakoglu CMPE 473 Project
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Elementary Data Organization. Outline  Data, Entity and Information  Primitive data types  Non primitive data Types  Data structure  Definition 
Scalable Hybrid Keyword Search on Distributed Database Jungkee Kim Florida State University Community Grids Laboratory, Indiana University Workshop on.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Digital Signatures.
MA/CSSE 473 Day 26 Student questions Boyer-Moore B Trees.
Security is one of the most widely used and regarded network services
Presented By: Prof. D.W.Chadwick Other Author: D.Mundy
Version B.00 H7076S Module 3 Slides
New Indices for Text : Pat Trees and PAT Arrays
Source : Practical fast searching in strings
Adobe EchoSign.
Radius, LDAP, Radius used in Authenticating Users
Introduction to Security
Calcul mental. 5ème Questions 1 à 10 : 20 secondes par calcul.
Improving Lamport One-time Signature Scheme
Accessing nearby copies of replicated objects
Digital Signatures Last Updated: Oct 14, 2017.
Chapter 7 Space and Time Tradeoffs
The Longest Common Subsequence Problem
Unit-4: Dynamic Programming
OAuth Design Team Call 11th February 2013.
HTML5 and Local Storage.
Calcul réfléchi 2 Multiplier par 5.
A Small and Fast IP Forwarding Table Using Hashing
Erasure Correcting Codes for Highly Available Storage
Chapter 29 Cryptography and Network Security
Addressing confidentiality issue in third party xml publication
Space-for-time tradeoffs
Space-for-time tradeoffs
2019/5/14 New Shift table Algorithm For Multiple Variable Length String Pattern Matching Author: Punit Kanuga Presenter: Yi-Hsien Wu Conference: 2015.
Fast Accesses to Big Data in Memory and Storage Systems
Presentation transcript:

Data Protection and String Search in SDDS-2005 http://ceria.dauphine.fr/Riad/PagePersoRiad.html Riad Mokadem

SDDS-2005 Evolution of SDDS-2004 Existent Functions Extension of algebraic signatures Introduction of Pre-computed algebraic signature

Cumulative Algebraic Signature Encoding data in servers Protection against incidental viewing in servers Fast manipulation of string Encoding form directly in servers The fastest technology in manipulation of characters. Prefix search Corruption protection ( future) Data Compression ( future)

Applications Servers SDDS Data Grid P2P Systems XML data Search engine MSN ?

Prototype SDDS 2005 Réseau Serveur Cases en RAM Client SDDS-CP Applications ... de Noms d'index RP* S

Problematic Encoding\ Decoding of data by client - Data on clear viewing per on authorized administrator - Storage dump… No protection data Encoding\ Decoding of data by client Data encoded in servers Different possibilities of search.

Data structure Encoding/decoding concerns non key data. Encoding/decoding is transparent for servers. Limit of 256B for data actually

Search of string Aalgorithms: Boyer Moore, Karp Rabin… SDDS-2005: No sent data to search. Sending signature Best confidentiality Encoding Pré- computed algebraic signatures

Cumulative signature algebraic signature (p1,p2,…,pn)= pi i Structure of Galois field GF(2f ) f>>1 symbols of size f=8,16… primitive element  algebraic signature (p1,p2,…,pn)= pi i Pre-computed signature p’i=antilog (log pi+i) Encoding pi p’’i= p’’i-1 XOR p’i i=n-1 i=0

Encoding+ sent request Cumulative signature Encoding+ sent request Comparison of signatures+ verification of collision Result of search Client Décoding Pré compute of signatures Gain of search time

Performances d’Encodage / Décodage Size of record Encoding time Decoding time Iinsertion time 100B 0.045ms 0.042ms 0.3ms Fast Time encoding / decoding. Signatures pre computed serach time reduced

SDDS-2005 String matching functions Prefix search String search Sent of signature + size of data Longest Prefix match Longest common String Sent of data to comparison

Cumulative signature Size of case Size of inserted data Size of last record Size of data to search Offset of data in last record Time of search Sign alg Time of search Karp Rabin Time of search sign cumulatives 100 250 25 10 5 205 151 147 200 368 275 268 500 1123 725 702 1000 2254 1580 1526 1) La solution d’envoi de ces messages par UDP, faite par .. 2) Preparer un tampon Unifier les messages de supp et d’insertion du meme enreg e …

Performance(cumulative signature) Record Position Size of inserted data Size of data to search r Offset of string Time of search (ms) 1 100 13 80 0.65 250 5 460 Record Position Size of inserted data Size of prefix Time of search (ms) 1 100 20 0.369 250 37 Préfix Search String match search Record Position Size of inserted data Size of last record Size of prefix to search Offset prefix in record Time of search (ms) 1 50 25 0.48 99/100 250 453 Longest Prefix Match Search time in 2 servers+ comparison = Search time in only one server 1) La solution d’envoi de ces messages par UDP, faite par .. 2) Preparer un tampon Unifier les messages de supp et d’insertion du meme enreg e … Ecord Position Size of inserted data Size of last record Size of string to search Offset of string Time of search (ms) 1 22 10 0.658 100 200 35 20 4 672 15 625 250 45 8 407 Longest Common String

Cumulative signature }New Search Functions Reduction of search time: -Existent Algorithms existents (30% algebraic signature, 5% Karp-Rabin, Size(Data) >32B… Non encoded data 1) La solution d’envoi de ces messages par UDP, faite par .. 2) Preparer un tampon Unifier les messages de supp et d’insertion du meme enreg e … }New Search Functions

SDDS-2005 : Cumulative signatures Opérationnel Functions (2005): Prefix Search String matching Longest Prefix match Longest Common String 1) La solution d’envoi de ces messages par UDP, faite par .. 2) Preparer un tampon Unifier les messages de supp et d’insertion du meme enreg e …

Cumulative Signatures Théory labour (2005): - Comparison with Karp Rabin algorithm. Remaining work: - Data > 256B - Performance mesures - Amélioration of signature calculation time (Horner scheme, Broder table…) -Data compression (prefix, suffix, full ) 1) La solution d’envoi de ces messages par UDP, faite par .. 2) Preparer un tampon Unifier les messages de supp et d’insertion du meme enreg e …

The end Merci Riad Mokadem