Tutorial: Information Leakage from Cryptographic Techniques

Komal Kumari, Sharad Mehrotra, Shantanu Sharma

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This tutorial focuses on the research aimed at providing secure data processing at the public cloud. First, we focus on cryptographic (encryption and secret-sharing) techniques and systems developed over the last two decades. Second, we will discuss information leakages from ciphertext (e.g., distribution, ordering, and cross-crypto leakages) and query execution (e.g. access pattern, volume, and workload skew leakages) and compare the existing techniques and systems based on efficiency and information leakage. Finally, we conclude that cryptographic techniques are not sufficient alone. To provide efficient and secure large-scale data processing at the cloud, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts.

Original languageEnglish (US)
Title of host publicationProceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops, ICDCSW 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages9-12
Number of pages4
ISBN (Electronic)9798350354713
DOIs
StatePublished - 2024
Event44th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2024 - Jersey City, United States
Duration: Jul 23 2024Jul 26 2024

Publication series

NameProceedings - 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops, ICDCSW 2024

Conference

Conference44th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2024
Country/TerritoryUnited States
CityJersey City
Period7/23/247/26/24

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Modeling and Simulation
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Tutorial: Information Leakage from Cryptographic Techniques'. Together they form a unique fingerprint.

Cite this