ALPTEKİN KÜPÇÜ. Assistant Professor of Computer Science and Engineering



Similar documents
Energy Efficiency in Secure and Dynamic Cloud Storage

Abstract of Efficient Cryptography for the Next Generation Secure Cloud by Alptekin Küpçü, Ph.D., Brown University, May 2010.

Securing Cloud Data Storage

Official Arbitration with Secure Cloud Storage Application

Near Sheltered and Loyal storage Space Navigating in Cloud

OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING

Cloud Data Storage Services Considering Public Audit for Security

On the Limits of Anonymous Password Authentication

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

A Secure and Dependable Cloud Storage Service in Cloud Computing

Improving data integrity on cloud storage services

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Data Storage Security in Cloud Computing

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Public Auditing for Shared Data in the Cloud by Using AES

Privacy preserving technique to secure cloud

Secure cloud access system using JAR ABSTRACT:

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Secure Cloud Transactions by Performance, Accuracy, and Precision

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Distribution of File on Cloud

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

ACCESS DEFINED CLOUD BASED MULTIVARIANT RESPONSE SYSTEM WITH CACHING

Trusted Public Auditing Process for Secure Cloud Storage

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Enhance Data Security in Cloud Computing using Layered Interleaving Approach

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Secure cloud data storage and access. Mihai Ordean Research Fellow University of Birmingham

Scientific Journal Impact Factor (SJIF): 1.711

Attribute-proving for Smart Cards

Dynamic Query Updation for User Authentication in cloud Environment

LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System

Currency and Correctness of Content in Object Storage Networks

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

IEEE JAVA Project 2012

How To Ensure Correctness Of Data In The Cloud

Verifying Correctness of Trusted data in Clouds

Energy Optimal Cloud Storage and Access Methods for Temporal Cloud Databases

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

International Journal of Advance Research in Computer Science and Management Studies

Erasure correcting to enhance data security in cloud data storage

Analysis of Secure Cloud Data Sharing Within a Group

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

The Cloud Trade Off IBM Haifa Research Storage Systems

Enable Public Audit ability for Secure Cloud Storage

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

SYMMETRIC CRYPTOGRAPHIC KEY MANAGEMENT IN CLOUD PARADIGM

Privacy-Preserving Public Auditing For Secure Cloud Storage

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Information Security Basic Concepts

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Data Integrity and Dynamic Storage Way in Cloud Computing

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Cloud Computing. servers. Cloud is a phrase that resembles the sharing process. Basically Cloud

Selective dependable storage services for providing security in cloud computing

Protocols for Secure Cloud Computing

Insuring Security for Outsourced Data Stored in Cloud Environment

A Survey on Secure Auditing and Deduplicating Data in Cloud

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

A Survey on Secure Storage Services in Cloud Computing

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Dynamic Resource Allocation and Data Security for Cloud

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Cryptographic Data Security over Cloud

Ensuring Data Integrity of Cloud Storage Services In Cloud Computing

A Survey on Untransferable Anonymous Credentials

Providing Data Protection as a Service in Cloud Computing

Seclusion Search over Encrypted Data in Cloud Storage Services

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Skyfiles: Efficient and Secure Cloud-assisted File Management for Mobile Devices

Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Surveying Cloud Storage Correctness using TPA with BLS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

A Survey on Optimistic Fair Digital Signature Exchange Protocols

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

How To Ensure Data Integrity In Cloud Computing

Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)

Keywords: Cloud Computing, Third Party Auditor, Integrity.

Transcription:

ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering

Core Research Cryptography Security Privacy Application Areas Research Topics Cloud Computation Cloud Storage Peer-to-Peer Systems Electronic Cash Electronic ID Cards Password-based Authentication... 2013 Alptekin Küpçü - Koç University 2

Cloud Computation [BCEJKL08] Challenges: Outsource a job to a more powerful entity, or multiple small entities, and get correct results, without wasting own resources. Current Generation: Amazon Mechanical Turk, SETI@Home, etc. Job is not well-defined. Results can be faked. No provable guarantees. Techniques: Obje, görsel, tablo, grafik alanı Game Theory and Mechanism Design, augmented with cryptographic techniques to deal with Byzantine users. 2013 Alptekin Küpçü - Koç University 3

Next Gen Cloud Computation [BCEJKL08] Guaranteed high fraction of correct results, even in presence of malicious users. Malicious users cannot force the boss to perform tons of extra work. Obje, görsel, tablo, grafik alanı 2013 Alptekin Küpçü - Koç University 4

Next Gen Cloud Computation [BCEJKL08] Guaranteed high fraction of correct results, even in presence of malicious users. Malicious users cannot force the boss to perform tons of extra work. Obje, görsel, tablo, grafik alanı 2013 Alptekin Küpçü - Koç University 5

Next Gen Cloud Computation [BCEJKL08] Guaranteed high fraction of correct results, even in presence of malicious users. Malicious users cannot force the boss to perform tons of extra work. reward fine Obje, görsel, tablo, grafik alanı 2013 Alptekin Küpçü - Koç University 6

Next Gen Cloud Computation [BCEJKL08] Guaranteed high fraction of correct results, even in presence of malicious users. Malicious users cannot force the boss to perform tons of extra work. reward fine Obje, görsel, tablo, grafik alanı 2013 Alptekin Küpçü - Koç University 7

Next Gen Cloud Computation [BCEJKL08] Guaranteed high fraction of correct results, even in presence of malicious users. Malicious users cannot force the boss to perform tons of extra work. reward fine Obje, görsel, tablo, grafik alanı 2013 Alptekin Küpçü - Koç University 8

Cloud Storage [EKPT09][K13][EK13][CKW13] Challenges: Outsource storage of data to a more powerful entity, or multiple small entities, while data will be kept intact, or you will get compensated. Current Generation: Amazon S3, Google Drive, Dropbox, etc. No guarantee that file will be kept intact. No service warranty. Techniques: Obje, görsel, tablo, grafik alanı Cryptography, as well as secure protocol design, probability, and errorcorrecting codes (erasure codes). 2013 Alptekin Küpçü - Koç University 9

Next Gen Cloud Storage [EKPT09][CKW13] [EK13a] Guaranteed high probability detection of integrity loss of data. 2013 Alptekin Küpçü - Koç University 10

Next Gen Cloud Storage [EKPT09][CKW13] [EK13a] Guaranteed high probability detection of integrity loss of data. 2013 Alptekin Küpçü - Koç University 11

Next Gen Cloud Storage [K13a] Automated official arbitration system with compensation (via e-cash). 2013 Alptekin Küpçü - Koç University 12

Next Gen Cloud Database [EK13b] Guaranteed verification of correctness, completeness, and freshness of query results. 2013 Alptekin Küpçü - Koç University 13

Next Gen Cloud Database [EK13b] Guaranteed verification of correctness, completeness, and freshness of query results. 2013 Alptekin Küpçü - Koç University 14

Peer-to-Peer Systems [BCEJKLR07][KL09][KL10a][KL10b][KL12] Challenges: Incentivize peers to contribute to the system, thereby increasing overall system performance and fault tolerance. Techniques: Cryptography (fair exchange protocols and electronic cash), together with economic analysis and game-theoretic models. Obje, görsel, tablo, grafik alanı Forced fair contribution by peers both increase the fault tolerance of the system, as well as increased performance. 2013 Alptekin Küpçü - Koç University 15

Electronic Cash [BCEJKLR07][MEKHL10] Applications: Electronic commerce, privacy-protecting protocols, anonymous credentials and electronic identity cards. Use Cases: Cryptographic protocol design, virtual economies, automated payments, and even official arbitration mechanisms. Future Uses: Obje, görsel, tablo, grafik alanı Accountability issues can be handled through e-cash while preserving privacy (e.g., in GPS, transport, or cloud systems). 2013 Alptekin Küpçü - Koç University 16

Efficient Cryptography TOPIC RELATED WORK OUR WORK Cloud Storage network overhead N/A 10 KB Cloud Storage computation overhead N/A 1 ms Judge Arbitration network overhead 25 KB 80 bytes Judge Arbitration computation overhead 1 second 2 ms P2P Fairness network overhead (over 2.8 GB) 225 MB 1.8 MB P2P Fairness computation overhead (over 1.5 hours) 42 minutes 40 seconds 2-3 orders of magnitude 2013 Alptekin Küpçü - Koç University 17

Collaboration Areas Outsourced Databases Privacy (e.g., PIR, obfuscation) Usable Security Password-based Authentication and OTP Peer-to-Peer Systems Fair (video) streaming, P2P storage Anonymous Credentials (and E-cash) Electronic ID and Passport Electronic Health Privacy-preserving Information Sharing Internet Security FIA, LTE, mobile ad-hoc network security 2013 Alptekin Küpçü - Koç University 18

IC1206 Related Reversible De-Identification Replace identifier with encrypted version Protect integrity of the whole object, not just the identifier Reversing possible only with multiple authorities joint effort Multi-biometric encryption Fuzzy extractors Encryption that can be opened using alternative keys derived from different biometrics 2013 Alptekin Küpçü - Koç University 19

ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering http://crypto.ku.edu.tr

References [BCEJKLR07] Mira Belenkiy, Melissa Chase, Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, and Eric Rachlin. Making P2P Accountable without Losing Privacy. ACM WPES of ACM CCS, 2007. [BCEJKL08] Mira Belenkiy, Melissa Chase, Chris Erway, John Jannotti, Alptekin Küpçü, and Anna Lysyanskaya. Incentivizing outsourced computation. NetEcon of ACM SIGCOMM, 2008. [KL09] Alptekin Küpçü and Anna Lysyanskaya. Brief Announcement: Impossibility Results on Optimistic Fair Exchange with Multiple Autonomous Arbiters. PODC 2009. [EKPT09] Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. Dynamic Provable Data Possession. ACM CCS 2009. [KL10a] Alptekin Küpçü and Anna Lysyanskaya. Usable Optimistic Fair Exchange. CT-RSA 2010. [KL10b] Alptekin Küpçü and Anna Lysyanskaya. Optimistic Fair Exchange with Multiple Arbiters. ESORICS, 2010. [MEKHL10] Sarah Meiklejohn, Chris Erway, Alptekin Küpçü, Theodora Hinkle, and Anna Lysyanskaya. Enabling Efficient Implementation of Zero-Knowledge Proofs and Electronic Cash with ZKPDL. USENIX Security, 2010. [K10] Alptekin Küpçü. Efficient Cryptography for the Next Generation Secure Cloud: Protocols, Proofs, and Implementation. Lambert Academic Publishing, 2010. [CKO11] Sena Efsun Cebeci, Alptekin Küpçü, Öznur Özkasap, Secure Peer-to-Peer Health Sharing. Turkish National Medical Informatics Congress, 2011. [KL12] Alptekin Küpçü and Anna Lysyanskaya. Usable Optimistic Fair Exchange. Elsevier Computer Networks Journal, 2012, 56(1), 50-63. [ABK13] Tolga Acar, Mira Belenkiy, and Alptekin Küpçü. Single Password Authentication. Elsevier Computer Networks Journal, 2013, 57(13), 2597-2614. [KEKO13] Ertem Esiner, Adilet Kachkeev, Alptekin Küpçü, Öznur Özkasap. Energy Efficiency in Secure and Dynamic Cloud Storage. EE-LSDS, 2013. [EK13a] Mohammad Etemad and Alptekin Küpçü. Transparent, Distributed, and Replicated Dynamic Provable Data Possession. ACNS, 2013. [EK13b] Mohammad Etemad and Alptekin Küpçü. Database Outsourcing with Hierarchical Authenticated Data Structures. ICICS, 2013. [CKW13] David Cash, Alptekin Küpçü, and Daniel Wichs. Dynamic Proofs of Retrievability via Oblivious RAM. EUROCRYPT, 2013. [K13a] Alptekin Küpçü. Official Arbitration and its Application to Secure Cloud Storage. The Computer Journal, 2013. [K13b] Alptekin Küpçü. Distributing Trusted Third Parties. ACM Sigact News Distributed Computing Column, 2013, 44(2), 88-118. [K13c] Alptekin Küpçü. Efficient Cryptography for the Next Generation Secure Cloud. IEEE Computing Now, March 8, 2013.