A Privacy Preserving Repository for Securing Data across the Cloud ENMING LI UIN: 00835113 CS775 Presentation.

Slides:



Advertisements
Similar presentations
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Advertisements

Enter User ID & Password Click ‘Submit” “Molecule spins until a connection is achieved”
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
FIT3105 Security and Identity Management Lecture 1.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
Chapter 3 : Distributed Data Processing
Chapter 3 : Distributed Data Processing
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Centralized and Client/Server Architecture and Classification of DBMS
Ch 4. The Evolution of Analytic Scalability
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
DAS Game DAS game Distributed Annotation System A game to settle down the concept of DAS Game cards available in:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Tools for Privacy Preserving Distributed Data Mining
Enter User ID & Password Click ‘Submit” “Molecule spins until a connection is achieved”
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Ohio Courts Network Introduction. 2 What is the OCN? Play Audio.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Secure Transmission of Instant Messages CS522 Final Project Presented by Akbar Khan Kaushal.S.Chandrashekar.
Encryption CS110: Computer Science and the Internet.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.
Presented By Amarjit Datta
Public / Private Key Example Dan Fleck CS 469: Security Engineering Coming up: Today 11.
Secure Data Outsourcing
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Encryption Name : Maryam Mohammed Alshami ID:H
SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Lecture XV: Review CS 4593 Cloud-Oriented Big Data and Software Engineering.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Company LOGO Networks Planning and Management 1.1 Course Overview By Dr. Shadi Masadeh 1.
BUILD SECURE PRODUCTS AND SERVICES
ITIS 1210 Introduction to Web-Based Information Systems
ANTHILLPRO online Training at GoLogica
Privacy Preserving Ranked Multi-Keyword
COMPUTER PRIVACY.
Cloud system.
Private and Secure Secret Shared MapReduce
A Privacy-Preserving Index for Range Queries
Public Key Infrastructure
An Introduction to Cloud Computing
Chapter 15 – Part 2 Networks The Internal Operating System
Chapter 4 Cryptography / Encryption
Database Management Systems CCSA 211
Presentation transcript:

A Privacy Preserving Repository for Securing Data across the Cloud ENMING LI UIN: CS775 Presentation

Introduction & Issues  Cloud Computing – Internet-based, resource (data) distributed, computation at cloud servers.  Issues: 1. distributed data sharing owners do not want to submit ALL their private data to central computing servers, but ONLY the data needed to produce the users’ query result. 2. Data owners do not want their data to be intercepted in the course of transmission.

Solution  Concept of Privacy Preserving Repository  How can the Repository Increase the Privacy? 1. Extract ONLY the NECESSARY data from the data sharing service; 2. Do computation on encrypted data 3. Encrypt the final computation result

Architecture of the Repository

How the Repository Works  User send his/her public key and query to the repository  Query Plan Wrapper: make query plan scan the user’s query, figure out what intermediate results are needed for producing the final result; based on the intermediate result, break the whole query into a sequence of sub-queries in the form (p 1 ; p 2 ; _ _ _; p m );  Query Plan Executor: For each sub-query p i, look for the corresponding data sharing service S i, send pi to S i ; S i will prepare the data needed for computing, encrypt those data, then send them back to query plan executor; Compute the intermediate and final results; Encrypt the final result using user’s public key; Send back the final result to the user; Destruct all the encryped data and intermediate results that are used for computing the final result.

Example  Final Results: The Progress of Project with name RD  Q1->Tmp1: ID of Project RD  Q2->Tmp2: Number of Employees working on Project RD  Q3->Tmp3: Place of Project RD  Q4-> Final Result Note: The user just need to know the PROGRESS of a Given Project, so other intermediate result is encrypted by hash function.

Benefits of Using the Repository  Keep the privacy of user data as much as possible, by picking up only the necessary data, encrypt the intermediate result.

Reference  R. Mishra, S. Dash, “A Privacy Preserving Repository for Securing Data across the Cloud”