Table of Contents (powered by https://videoken.com)
0:04:56 Secret-Sharing-based Data
Outsourcing
0:05:19 Why Secret-Sharing?
0:05:54 Shamir's Secret-Sharing (SSS) [Shamir79] - Key Idea
0:09:48 Order-Preserving Secret-Sharing
0:10:15 Computing over Secret Shared Data
0:10:57 Simple Aggregation using Secret-Shared Data
0:11:32 Challenges
0:12:01 DB Owner Assisted Query Execution
0:13:30 Big Question
0:14:04 String Matching over Secret-Shared Data
0:15:03 String-Matching over Secret-Shared Data
0:15:57 String-Matching over Secret-Shared Data
Secret-Share
Creation by
0:17:52 Now... Can we use this string-matching technique for solving other operations such as selection and aggregation?
0:17:59 OBSCURE: Oblivious and Verifiable Aggregation Queries
0:18:49 OBSCURE: Data Outsourcing using OBSCURE
0:21:10 OBSCURE: Conjunctive Count Query
0:25:08 OBSCURE: Count Query - Security Guarantees
0:25:40 Impact of #Shares - Conjunctive Count Query
0:27:19 OBSCURE: Maximum Query
0:28:05 OBSCURE: Experimental Results
0:28:09 OBSCURE VS MPC (communication among servers)
0:28:49 OBSCURE vs Downloading and Local Processing
0:29:19 OBSCURE: Experiments Results - Query Execution vs
Verification Time
0:29:54 OBSCURE: Advantage: Support Multiple DB Owners
0:30:22 Conclave (1)
0:30:57 Conclave (2): Trivial Solution: Use an MPC System as a
Blackbox
0:31:23 Conclave (3)
0:32:04 Conclave (4)
0:32:22 Conclave (5)
0:34:19 Conclave (6)
0:34:57 Industrial Efforts (1)
0:35:30 Industrial Efforts (2): Jana by Galois Inc.
0:35:37 Comparing Secret-Sharing-based Systems
0:35:48 Pros and Cons of Secret-Sharing-based Techniques
0:36:32 Exploiting Trusted Computing Platforms
0:41:27 Intel SGX
0:41:48 Motivation for SGX
0:43:18 Operating systems haven't changed for decades
0:44:57 Modern kernels are vulnerable
0:48:32 TCB of a modern system
0:49:13 Enclaves
0:50:09 SGX enclaves
0:53:51 Performance
0:57:25 Perspective (40,000 cycles per EPC page-fault)
0:59:04 Performance: KV store (parameter server)
1:01:24 Powerful adversary model
1:02:39 SGX-Step: A Practical Attack Framework for Precise
Enclave Execution Control
1:03:21 Side channel attacks
1:04:13 Page fault tracing attacks
1:06:05 Example: recovering text via spell checker
1:08:12 Example: recovering JPEG images
1:10:50 Cache attacks: Prime + probe
1:13:52 Controlled execution environment
1:15:25 Example: VC3 (map/reduce in SGX)
1:16:31 Text reconstruction
1:17:38 Cache-tracing: reconstructed text
1:18:44 Branch shadowing attack
1:20:48 Data-oblivious primitives
1:22:51 How does this apply to databases
1:24:06 What's the future?
1:24:21 What will be fixed in hardware?
1:28:17 Joins using SGX: Opaque (1)
1:28:28 Can we design a system supporting database operations using SGX?
1:29:14 Joins using SGX: Opaque (3)
1:29:19 Joins using SGX: Opaque (4)
1:29:22 Background: Column Sort
1:29:27 Joins using SGX: Opaque (7)
1:29:34 Searching using SGX (1)
1:29:49 Data Partitioning-based Outsourced Data Processing
1:31:13 Scaling Secure Data Management
1:33:28 Partitioned Data Security at the Public Cloud
1:36:03 Analytical Model
1:36:27 No Silver Bullet
1:37:53 Conclusion
Смотрите видео Tutorial 5b: Advances in Cryptography and Secure Hardware for Data Outsourcing онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь IEEE ICDE 06 Май 2020, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 71 раз и оно понравилось людям.