ABSTRACT
The continuously increasing availability of cloud and edge data center resources is driving our evolution to a data-driven society. Meanwhile, however, the innate sharing of third-party data center resources by users continues to fuel strong security concerns around data and computations handled in and across such infrastructures. While many basic solutions to enforce security have been proposed over the years, both in terms of software mechanisms (cryptographic primitives) and hardware mechanisms (trusted execution environments), they all come with their respective pros and cons. In this talk I will report and reflect on almost a decade of experience of working on the problem of confidentiality-preserving data and event processing. I will cover challenges in terms of guarantees, performance, transparency, or portability and interoperability, discuss tradeoffs therein, solutions, and, finally, open challenges.
Index Terms
- Secure distributed data and event processing at scale: where are we now?
Recommendations
Secure construction of k-unlinkable patient records from distributed providers
Objectives: Healthcare organizations must adopt measures to uphold their patients' right to anonymity when sharing sensitive records, such as DNA sequences, to publicly accessible databanks. This is often achieved by suppressing patient identifiable ...
SGX-PySpark: Secure Distributed Data Analytics
WWW '19: The World Wide Web ConferenceData analytics is central to modern online services, particularly those data-driven. Often this entails the processing of large-scale datasets which may contain private, personal and sensitive information relating to individuals and organisations. ...
Anonymity and confidentiality in secure distributed simulation
DS-RT '18: Proceedings of the 22nd International Symposium on Distributed Simulation and Real Time ApplicationsResearch on data confidentiality, integrity and availability is gaining momentum in the ICT community, due to the intrinsically insecure nature of the Internet. While many distributed systems and services are now based on secure communication protocols ...
Comments