Research And Development For GeoSpatial Data Security. CSRE, IIT Bombay



Similar documents
CONCEPTUAL FRAMEWORK FOR GEOSPATIAL DATA SECURITY

Neutralus Certification Practices Statement

Chapter 23. Database Security. Security Issues. Database Security

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

CPSC 467b: Cryptography and Computer Security

SAMPLE: DO NOT COMPLETE

Secure cloud access system using JAR ABSTRACT:

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

CSE/EE 461 Lecture 23

Chapter 23. Database Security. Security Issues. Database Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

How To Understand And Understand The History Of Cryptography

Page 1. Session Overview: Cryptography

MovieLabs Specification for Enhanced Content Protection Version 1.0

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Vector storage and access; algorithms in GIS. This is lecture 6

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Associate Prof. Dr. Victor Onomza Waziri

GEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington

Internet of Things (IoT): A vision, architectural elements, and future directions

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

Privacy & Security of Mobile Cloud Computing (MCC)

Chapter 17. Transport-Level Security

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

IT Networks & Security CERT Luncheon Series: Cryptography

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Gold Lock Desktop White Paper

Institute of Southern Punjab, Multan

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

FACT SHEET: Ransomware and HIPAA

Implementing an Imagery Management System at Mexican Navy

Compter Networks Chapter 9: Network Security

Data management using Virtualization in Cloud Computing

Information Security

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

<Insert Picture Here> Data Management Innovations for Massive Point Cloud, DEM, and 3D Vector Databases

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Mapping Mashup/Data Integration Development Resources

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

IoT Security Concerns and Renesas Synergy Solutions

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Introduction to Hill cipher

Adobe Systems Software Ireland Ltd

Privacy Patterns in Public Clouds

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

SENSE Security overview 2014

Single Sign-On Secure Authentication Password Mechanism

A Secure Model for Medical Data Sharing

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

How To Encrypt With A 64 Bit Block Cipher

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Cryptography and Network Security Chapter 12

Cryptography and Network Security: Summary

Scientific Journal Impact Factor (SJIF): 1.711

SSL A discussion of the Secure Socket Layer

MEng, BSc Computer Science with Artificial Intelligence

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Role Based Encryption with Efficient Access Control in Cloud Storage

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

EDA385 Embedded Systems Design. Advanced Course

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

Newcastle University Information Security Procedures Version 3

Network Security Theoretical & Practical Perspective

Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

A Road Map on Security Deliverables for Mobile Cloud Application

Data Security Incident Response Plan. [Insert Organization Name]

Weighted Total Mark. Weighted Exam Mark

Key Management Issues in the Cloud Infrastructure

Computer Security: Principles and Practice

Transcription:

Research And Development For GeoSpatial Data Security P. Venkatachalam and B. Krishna Mohan CSRE, IIT Bombay July 2011

Introduction Advancements in sensor technology, satellite remote sensing and field data measurements Large amounts of geospatial data Highspatial resolution and frequent coverage Key applications Military operations and internal security Disaster management and environmental monitoring Rural and urban planning Commercial applications. Involves diverse organizations, data repositories and users with different responsibilities for security purposes.

Need for research in spatial data security and privacy Variety of models and techniques to Manage Access Share geospatial data Geospatial information can be exploited by attackers for Disrupting critical infrastructures Compromising the security and privacy of people, property and systems. Important to address data security, access control Important to address data security, access control and privacy.

Current practices and motivational scenarios in spatial data security High-resolution satellite imagery + Vector data + demographic data + Uncontrolled access Potential for security threats, data misuse and privacy violations. Necessary to extend security mechanisms to Interoperable GIS repositories GIS applications. Role-based access controls for interoperable GIS p repositories are important security requirements.

GIS and Cryptology Cryptology : Si Science that incorporates both hc Cryptography and Cryptanalysis to handle the text based data. Cryptography: Conversion of data into a scrambled code that can be sent across a public or private network. Cryptanalysis: Study of ciphers, ciphertext, or cryptosystems to find weaknesses in them that will permit retrieval of the plain text from the ciphertext, without necessarily knowing the key or the algorithm. Map data represents space with embedded objects that have varying degrees of importance and sensitivity more complex than text encryption

Suggested Research Approaches Spatial Data Indexing and Geometric Transformations Spatial Data Transformations of Geometric Objects Cryptographic Transformation Watermarking Methods for Raster and vector Data Spatial Domain Methods Frequency Domain Methods

Framework for private spatial data outsourcing Private Data Owner Upload Original Transformed Data Dataset P Data set P Transformation Dt Data Server Send The Key Query Service Provider Original Dataset P Authorized User Transformed Data set P Query Result Inverse Transformation

Example Hierarchical Space Division

Hierarchical Space Division (HSD) Spatial Transformation Visualization of North America points

Cryptographic Transformation Employs conventional cryptographic technique CRT provides provable confidentiality guarantees, inherited from the encryption technique CRT does not allow any type of location-based attack such as the general attack. Query processing at the SP becomes difficult. CRT employs R*- tree In CRT, data points a,, b,, c are stored in an encrypted index. To find the result for query q, the root (Node A) is sent to user U, who decrypts A and determines that the MBR of node B intersects q. Then U retrieves node B from the SP and computes the query result as b. The number of communication cat o rounds equals the tree height.

Cryptographic Transformation

Spatial Data Watermarking on Vector and draster Datasets Protect spatial data against illegal distribution and secure their contents t by a. Spatial Domain Methods b. Frequency Domain Methods Requirements Precision should be preserved Positional accuracy should be maintained Good robustness Invisible and blind watermarking Wt k hl t l t th f th i d / Watermark may help to locate the sourceof unauthorised copy / leak of security restricted data.

Research and Development Objectives Development of mathematical and cryptographic algorithms for spatial data security for storage and online data sharing Develop efficient procedures to Secure spatial dataset Support for query processing online Establish robustness of techniques to various attack models. Work on watermarking methods to secure both vector and raster data Develop prototype systems for demonstration of methodology