Techniques for Secure and Reliable Computational Outsourcing

Abstract : Techniques were developed that make it possible to use remote servers without having to reveal to them either (i) the confidential inputs and outputs of computations; or (in the case of information storage and retrieval) the confidential data and queries thereupon. The techniques also make cheating by the remote untrusted servers detectable; here cheating mean s not carrying out the expected computational and storage duties. Significant progress was also made in the direction of hiding from the remote servers the access patterns to the encrypted data that they store, a potentially important consideration in situations where it is not enough to hide the data (e.g., when the access patterns reveal too much about the nature of how the data is being used). The progress in this area brings closer the day when remote cloud servers can be used for the most confidential tasks, without worry about confidentiality being compromised by security breaches occurring at the cloud service providers.

[1]  Mikhail J. Atallah,et al.  Efficient data structures for range-aggregate queries on trees , 2009, ICDT '09.

[2]  Mikhail J. Atallah,et al.  Privacy-Preserving Business Process Outsourcing , 2012, 2012 IEEE 19th International Conference on Web Services.

[3]  Marina Blanton,et al.  Secure outsourced computation of iris matching , 2012, J. Comput. Secur..

[4]  Keith B. Frikken,et al.  Outsourcing Manufacturing: Secure Price‐Masking Mechanisms for Purchasing Component Parts , 2011 .

[5]  Mikhail J. Atallah,et al.  Efficient Private Record Linkage , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[6]  Yihua Zhang,et al.  An Overview of Issues and Recent Developments in Cloud Computing and Storage Security , 2014 .

[7]  Mikhail J. Atallah,et al.  Running Max/Min Filters Using 1+o(1) Comparisons per Sample , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Marina Blanton,et al.  Private and oblivious set and multiset operations , 2012, ASIACCS '12.

[9]  Marina Blanton,et al.  Biometric-Based Non-transferable Anonymous Credentials , 2009, ICICS.

[10]  Mikhail J. Atallah,et al.  Computing all skyline probabilities for uncertain data , 2009, PODS.

[11]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[12]  Emil Stefanov,et al.  Duress detection for authentication attacks against multiple administrators , 2010, Insider Threats '10.

[13]  Marina Blanton Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[14]  Mikhail J. Atallah,et al.  Efficient and secure distribution of massive geo-spatial data , 2009, GIS.

[15]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[16]  Mikhail J. Atallah,et al.  Efficient relaxed search in hierarchically clustered sequence datasets , 2012, JEAL.

[17]  Mikhail J. Atallah,et al.  Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS , 2012, Cloud-I '12.

[18]  Mikhail J. Atallah,et al.  Identifying Interesting Instances for Probabilistic Skylines , 2010, DEXA.

[19]  Mikhail J. Atallah,et al.  Secure and Efficient Outsourcing of Sequence Comparisons , 2012, ESORICS.

[20]  Mikhail J. Atallah,et al.  Secure Authenticated Comparisons , 2011, ACNS.

[21]  Yihua Zhang,et al.  Secure and Verifiable Outsourcing of Large-Scale Biometric Computations , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[22]  Mikhail J. Atallah,et al.  Pattern matching in the Hamming distance with thresholds , 2011, Inf. Process. Lett..

[23]  Marina Blanton,et al.  On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.

[24]  Marina Blanton,et al.  Secure Outsourcing of DNA Searching via Finite Automata , 2010, DBSec.

[25]  Mikhail J. Atallah,et al.  Efficient and Practical Approach for Private Record Linkage , 2012, JDIQ.

[26]  Elisa Bertino,et al.  Leakage-free redactable signatures , 2012, CODASPY '12.

[27]  Daniel G. Aliaga,et al.  Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity , 2009, Comput. Graph. Forum.

[28]  Mikhail J. Atallah,et al.  Asymptotically efficient algorithms for skyline probabilities of uncertain data , 2011, TODS.

[29]  Mikhail J. Atallah,et al.  Data structures for range minimum queries in multidimensional arrays , 2010, SODA '10.

[30]  Mikhail J. Atallah,et al.  Private Outsourcing of Matrix Multiplication over Closed Semi-rings , 2012, SECRYPT.

[31]  Paolo Falcarin,et al.  Guest Editors' Introduction: Software Protection , 2011, IEEE Software.

[32]  Mikhail J. Atallah,et al.  Robust Authentication Using Physically Unclonable Functions , 2009, ISC.

[33]  Elisa Bertino,et al.  On the Complexity of Authorization in RBAC under Qualification and Security Constraints , 2011, IEEE Transactions on Dependable and Secure Computing.