Secure Cloud Storage meets with Secure Network Coding

Slides:



Advertisements
Similar presentations
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 40.
Advertisements

1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 28.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 75.
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
PROOFS OF RETRIEVABILITY VIA HARDNESS AMPLIFICATION Yevgeniy Dodis, Salil Vadhan and Daniel Wichs.
The First International Workshop on XML Data management (XML-DM 2010) July 15 th 2010 Jiuzhai Valley, China.
1 Trust-based Privacy Preservation for Peer-to-peer Data Sharing Y. Lu, W. Wang, D. Xu, and B. Bhargava yilu, wangwc, dxu, cs.purdue.edu Department.
New Publicly Verifiable Databases with Efficient Updates
This document and the information therein are the property of Morpho, They must not be copied or communicated to a third party without the prior written.
Evaluating “find a path” reachability queries P. Bouros 1, T. Dalamagas 2, S.Skiadopoulos 3, T. Sellis 1,2 1 National Technical University of Athens 2.
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
Henry C. H. Chen and Patrick P. C. Lee
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
1 Stochastic Modeling of Large-Scale Solid-State Storage Systems: Analysis, Design Tradeoffs and Optimization Yongkun Li, Patrick P. C. Lee and John C.S.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Yuchong Hu1, Henry C. H. Chen1, Patrick P. C. Lee1, Yang Tang2
Accumulators and U-Prove Revocation Tolga Acar, Intel Sherman S.M. Chow, The Chinese University of Hong Kong Lan Nguyen, XCG – Microsoft Research.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
Beyond the MDS Bound in Distributed Cloud Storage
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Location-Aware Security Services for Wireless Sensor Networks using Network Coding IEEE INFOCOM 2007 최임성.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
Network Coding in P2P-Systems Christian Ortolf. Overview ● Introduction ● Galois fields ● Encoding/Decoding of Files ● Gain – Coupon Collector's problem.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Minimax Estimators Dominating the Least-Squares Estimator Zvika Ben-Haim and Yonina C. Eldar Technion - Israel Institute of Technology.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.

T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
1 DBS A Bit-level Heuristic Packet Classification Algorithm for High Speed Network Author: Baohua Yang, Xiang Wang, Yibo Xue and Jun Li Publisher: International.
Network Coding Distributed Storage Patrick P. C. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong 1.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Xiaohua Jia Shen Zhen Graduate School Harbin Institute of Technology Data Security for Cloud Storage Systems 1.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
K.U.Leuven George Danezis 1, Markulf Kohlweiss 1, Ben Livshits 1, and Alfredo Rial 2 Private Client-Side Profiling with Random Forests and Hidden Markov.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
LT Codes-based Secure and ReliableCloud Storage Service
Network Coding and Media Streaming (Invited Paper)
Fast Signature Scheme for Network Coding Mingxi Yang, Wenjie Yan Reporter: Wenjie Yan Mingxi Yang, Wenjie Yan1 DCABES 2009.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
LT Network Codes Mary-Luc Champel, Kevin Huguenin, Anne-Marie Kermarrec and Nicolas Le Scouarnec Technicolor, Rennes, France IEEE ICDCS (International.
On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Computer System Design Lab 1 Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang * Wei Song *†
NC-Audit: Auditing for Network Coding Storage Anh Le and Athina Markopoulou University of California, Irvine.
Multiobjective Optimization for Locating Multiple Optimal Solutions of Nonlinear Equation Systems and Multimodal Optimization Problems Yong Wang School.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China.
Manu Drijvers, Joint work with Jan Camenisch, Anja Lehmann. March 9 th, 2016 Universally Composable Direct Anonymous Attestation.
By:- Kan Yang, Xiaohua Jia
MPC and Verifiable Computation on Committed Data
Digital Signature Schemes and the Random Oracle Model
th IEEE International Conference on Sensing, Communication and Networking Online Incentive Mechanism for Mobile Crowdsourcing based on Two-tiered.
Parallel and Distributed Block Coordinate Frank Wolfe
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Smart Meter Data Privacy: A Survey
Data-Dependent Approximation
Presentation transcript:

Secure Cloud Storage meets with Secure Network Coding Fei Chen (Chinese University of Hong Kong, Hong Kong) Tao Xiang (Chongqing University, China) Yuanyuan Yang (Stony Brook University, USA) Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)

Roadmap Preliminaries Generic Construction Showcase: A Novel Protocol Technical Obstacles Showcase: A Novel Protocol Extensions Third-party Auditing User Anonymity Summary

Secure Cloud Storage (SCS) Juels-Kaliski, Ateniese et al. (both CCS’07) Wang, Chow, Wang, Ren, Lou (IEEE TC’13) Yang-Jia (TPDS’13) Wang, Chow, Li, Li (ICDCS’13)

SCS Protocol     User     Cloud          

Handling Security  

    User     Cloud          

Security Definition  

Secure Network Coding (SNC) Ahlswede, Cai, Li, Yeung from CUHK (IEEE TIT’00) Li, Yeung, Cai (IEEE TIT’03); Cai-Yeung (ISIT’02) Gkantsidis-Rodriguez (INFOCOM’06); Li, Lui, Chiu (ICNP’06) Agrawal-Boneh (ACNS’09); Catalano et al. (PKC’12) (many others)

SNC Protocol          

Security Definition  

Our work

1. Generic Construction  

Basic Idea  

Optimization  

Security  

Data Recovery Algorithm  

2. A Novel SCS Protocol Based on a recent SNC protocol by Catalano et al. (PKC’12) First publicly verifiable secure cloud storage protocol which is provably secure (not random oracle heuristics)

Detailed Construction  

Theoretical Performance Asymptotic performance comparable to previous work

Experimental Performance Benchmark (data from Wikipedia) Storage and communication overhead

Computation Cost (Time is in milliseconds.) The protocol is effective in practice. Efficiency cost is acceptable for a standard model proof. For protocols with security argued with random oracle heuristics, one may instantiate with larger cryptographic groups / security parameters, which results in lower efficiency anyways.

Supporting Third-Party Auditing Idea: mask the returned result with randomized vectors with coefficients all 0 (zero-knowledge proof of knowledge) [Wang, Chow, Wang, Ren, Lou (IEEE TC’13)]

Supporting User Anonymity Idea: randomization again (blind signature approach) [Wang, Chow, Li, Li (ICDCS’13)]

Summary Secure Cloud Storage meets with Secure Network Coding A generic construction A novel SCS protocol Security definition and security proof Support of third-party auditing and user anonymity