PPT-Scaling Secure Computation Using the Cloud

Author : debby-jeon | Published Date : 2018-12-06

Payman Mohassel Yahoo Labs 1 Do We Have the Same Person in Mind Alice Bob Jack Joe o nly reveal YesNo Solutions You have access to a trusted computer You can

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Scaling Secure Computation Using the Clo..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Scaling Secure Computation Using the Cloud: Transcript


Payman Mohassel Yahoo Labs 1 Do We Have the Same Person in Mind Alice Bob Jack Joe o nly reveal YesNo Solutions You have access to a trusted computer You can use an airline reservation service. Presented by Paul. Problem. The cloud offers. Near infinite computing capabilities. Near infinite storage. On-demand access to new VMs. Pay-as-you-go model. But how do you build an application to automatically take advantage of those resources?. Cloud Solutions. http://www.8KMiles.com. Discussion Areas. Background. Cloud Engineering and Migration Services. 8KMiles AWS Security Framework. 8KMiles Mobile Collaboration Solution. Technology Partnership . (Lecture 1). Arpita. . Patra. Welcome to an exciting Journey .  . >> . Course Homepage. : . http://. drona.csa.iisc.ernet.in. /~. arpita. /SecureComputation15. .html . >> References:. Professor, Computer Science, UMD. Director, Maryland Cybersecurity Center. . Secure . Computation. Mathematics. Complexity . theory. C. ryptography. Cybersecurity. Science of . Cybersecurity. C. ryptography. Open Government Forum. Abu Dhabi. 28-30 April 2014. Karl Chambers CISSP PMP. President/CEO. Diligent eSecurity International. The e-Government Challenge. Securely delivering high-quality . digital government information and . Abstract. Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. . However, how to protect customers’ confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud.. Ranjit . Kumaresan. (MIT). Based on joint works with . Iddo. . Bentov. (. Technion. ), Tal Moran (IDC), Guy . Zyskind. (MIT). x. f. . (. x,y. ). y. f. . (. x,y. ). Secure Computation. Most general problem in cryptography. . Kartik . Nayak. With Xiao . Shaun . Wang, . Stratis. Ioannidis, Udi . Weinsberg. , Nina Taft, Elaine Shi. 1. 2. Users. Data. Data. Privacy concern!. Data Mining Engine. Data Model. Data Mining on User Data. Tore Frederiksen. , . Thomas . Jakobsen. , . Jesper. Nielsen, Peter . Nordholt. , Claudio . Orlandi. 27-08-2016. The LEGO Approach for. Maliciously Secure Two-Party Computation. 1. What we will present. Presented by Paul. Problem. The cloud offers. Near infinite computing capabilities. Near infinite storage. On-demand access to new VMs. Pay-as-you-go model. But how do you build an application to automatically take advantage of those resources?. Effortless hybrid connectivity. Tuned for exceptional performance. Fast time-to-value with cloud flexibility. Meet your toughest demands with virtual machines optimized by the team that built SQL Server. Supported by ERC starting grant.. IEEE INFOCOM 2017, Atlanta, GA, USA. Mor. Sides. , . Anat. . Bremler. -Barr, Eli . Brosh. Interdisciplinary Center, . Herzliya. , Israel. Distributed Denial of Service. Chongwon Cho. . (HRL Laboratories). Sanjam. . Garg. (IBM T.J. Watson). . Rafail. . Ostrovsky. (UCLA). 2. Secure . Computation [Yao, GMW]. Alice and Bob. Alice holds input . x. .. Bob holds input . Arpita. . Patra. Recap . >Three orthogonal problems- (. n,t. )-sharing, reconstruction, multiplication protocol. > Verifiable Secret Sharing (VSS) will take care first two problems. >> .

Download Document

Here is the link to download the presentation.
"Scaling Secure Computation Using the Cloud"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents