CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Data in the Cloud: Authentication Without Leaking

Ashish Kundu

Ashish Kundu - Purdue University

Sep 01, 2010

Size: 441.4MB

Download: Video Icon MP4 Video  
Watch in your Browser   Watch on Youtube Watch on YouTube

Abstract

Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches. We have developed schemes for leakage-free authentication of trees and graphs. Our schemes are provably secure and efficient. In this talk, I would present these schemes as well as describe how to address the problem for disconnected trees/graphs (forests) (e.g., a set of databases). Time permitting, we would discuss some of the applications of these schemes. Our solutions have several applications in the cloud-based service offerings such as in the database and e-mail as services, storage and distribution of healthcare and biological data, and in security of social networks.

About the Speaker

Ashish Kundu is a Ph.D. Candidate in Computer Science at Purdue
University and is affiliated with CERIAS. Ashish is as an advisee of Prof. Elisa Bertino. His research interests are broadly in the area of "how to build secure and dependable systems and services". In his doctoral thesis, Ashish is addressing the problem of "How to Authenticate Trees and Graphs Without Leaking". One of his papers related to his thesis received the Best Student Paper at the IEEE Enterprise Computing conference in 2006. Prior to joining Purdue, Ashish was a Research Staff Member at IBM India Research Lab for about five years. At IBM Research, Ashish worked on distributed and pervasive systems. He has been (co-)inventor in several patents. He has also been awarded with the IBM Bravo award as well as two IBM Plateau awards for his contributions.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.