GPN13:SEDAWG: Eine durchsuchbare Verschlüsselung: Unterschied zwischen den Versionen
K (→Slides) |
K (→Slides) |
||
Zeile 4: | Zeile 4: | ||
== Slides == | == Slides == | ||
* The slides are available here: [[Media:GPN13_SEDAWG_Eine_durchsuchbare_Verschlüsselung.pdf|Slides]] [http://cloud.haynberg.de/public.php?service=files&t=8ca096e1ee308ee6ce45afe388daf854 | * The slides are available here: [[Media:GPN13_SEDAWG_Eine_durchsuchbare_Verschlüsselung.pdf|Slides (3.3 MB)]] [http://cloud.haynberg.de/public.php?service=files&t=8ca096e1ee308ee6ce45afe388daf854 mirror] | ||
* As soon as the source code is available online I'll post it here, too. | * As soon as the source code is available online I'll post it here, too. | ||
* Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper. | * Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper. |
Version vom 24. Juni 2013, 18:44 Uhr
Ein Vortrag von AlienX auf der GPN13.
Slides
- The slides are available here: Slides (3.3 MB) mirror
- As soon as the source code is available online I'll post it here, too.
- Until our paper has been officially published, please get in contact with us. We can send you the release candidate of the paper.
Contact details
- @script_alert_1 (Twitter)
- bob at alice and bob dot com (eMail)
- If you are up to code this with performance improvements and in a cool programming language: Contact us!
Abstract
Cloud computing is one of the most promising trends in the IT industry. In terms of data security however, cloud computing brings a new threat: Users lose control over their data. Cloud providers can access their customer's data at will. To challenge this drawback technologically, one needs to seek methods that enhance the privacy of the user's data without negating the advantages of cloud computing. Notably, computational and storage overhead should be handled in the cloud, not on the client. Consider for example the scenario of an outsourced e-mail archive: Users wish to employ a cloud provider to store their e-mails in order to be able to access them with a mobile device and without letting the provider gain knowledge of the archive's content. To conserve bandwidth, they want to perform searches on their archived e-mail online instead of downloading each and every message individually and searching locally. This talk addresses the problem of secure exact pattern matching: A user encrypts a long string he later wishes to query for the occurrence of certain patterns. This encrypted string is then uploaded to a server and to perform a search, the user can interact with the server. The server should never learn neither the string itself, nor the patterns searched for.