In today’s big data world, the ability to collect, share, and analyze data has led to unprecedented capabilities as well as unprecedented privacy concerns. A cryptographic technique called secure multi-party computation (MPC) lets people perform joint computations on their collective data without revealing their individual data. In this talk, I will describe what MPC is and how it can fundamentally change the way we compute on data.
It seems that not a day goes by without a cyber security breach. To prevent breaches, many cloud providers offer encryption using a key. Their users should ask two questions: Who has the key? And is my data protected end-to-end? The answers lie in the domain of key management. In this presentation, I will discuss different usage scenarios in SaaS, PaaS and IaaS and how keys can be managed.
As storage needs grow, users are outsourcing their data to the cloud.
However, many users do not trust the cloud and have concerns about the integrity and confidentiality of their data. In this paper, we discuss these issues in the context of a database called Accumulo. We present cryptographic solutions for integrity using signatures, and for confidentiality using symmetric key encryption and a variant of attribute-based access control.