Tutorial 5a: Advances in Cryptography and Secure Hardware for Data Outsourcing
Table of Contents (powered by https://videoken.com) 0:01:36 Advances in Cryptography and Secure Hardware for Data Outsourcing 0:03:38 Contents 0:06:42 Q/A 0:...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in India under the topic 'ad'.
About this video
Table of Contents (powered by https://videoken.com)
0:01:36 Advances in Cryptography and Secure Hardware for Data Outsourcing
0:03:38 Contents
0:06:42 Q/A
0:07:14 Cloud Computing
0:09:29 Key Challenge: Loss of Control
0:12:09 Implications of Loss of Control
0:13:43 What is The Solution?
0:13:53 Secure Computing
0:17:42 Common Attacks in Data Outsourcing
0:22:26 Adversarial Cloud Model
0:24:02 Defining Security
0:27:17 Security Goal: IND-CKA1: Real Game Model with Leakage Profile
0:31:15 Cloud Layers and Security
0:35:32 Encryption-based Cryptographic Approaches
0:37:02 MPC and Secret Shared Mechanisms
0:39:43 Cryptographic Techniques vs Security Threats
0:41:25 Cryptographic Techniques - Design Criteria
0:43:16 Exploiting Trusted Platform
0:45:46 Trusted Platform - Challenges
0:47:42 Security Techniques vs Computation Cost
0:49:16 Secure Data Outsourcing: Challenge
0:50:40 Data Sensitivity
0:51:43 Partitioned Data Security Challenge
0:55:28 Cryptographic Solutions
0:56:57 Problems
0:57:13 Searchable Encryption: Ciphertext Generation
0:58:48 Searchable Encryption: Search at the Cloud
1:01:40 Indexable Searchable Encryption
1:05:40 Create Index using Prefix Family: Top-Down V
1:07:27 Execute a Point Query using the Index
1:08:56 Execute a Range Query
1:10:48 Issues with the Index (PB-Tree)
1:12:37 Order Preserving Encryption (OPE)
1:13:54 Mutable OPE (mOPE)
1:18:16 What we have discussed so far?
1:18:52 Bucketization
1:21:11 What We Have Seen in Bucketization?
1:22:06 Precomputed Joins: Different Representation of Data
1:26:36 Other Encryption-based Join Approaches
1:27:00 What we have seen so far?
1:27:21 Encryption-based Systems
1:28:15 Pros and Cons of Encryption-based Techniques
1:30:16 Secret-Sharing-based Data
Outsourcing
Video Information
Views
230
Total views since publication
Likes
2
User likes and reactions
Duration
01:30:44
Video length
Published
May 6, 2020
Release date
Quality
hd
Video definition