Award Abstract # 1526950
TWC: Small: Collaborative: Practical Security Protocols via Advanced Data Structures

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF MARYLAND, COLLEGE PARK
Initial Amendment Date: September 16, 2015
Latest Amendment Date: July 18, 2016
Award Number: 1526950
Award Instrument: Continuing Grant
Program Manager: Shannon Beck
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 15, 2015
End Date: August 31, 2018 (Estimated)
Total Intended Award Amount: $166,600.00
Total Awarded Amount to Date: $166,600.00
Funds Obligated to Date: FY 2015 = $100,707.00
FY 2016 = $65,893.00
History of Investigator:
  • Charalampos Papamanthou (Principal Investigator)
    cpap@umd.edu
Recipient Sponsored Research Office: University of Maryland, College Park
3112 LEE BUILDING
COLLEGE PARK
MD  US  20742-5100
(301)405-6269
Sponsor Congressional District: 04
Primary Place of Performance: University of Maryland College Park
MD  US  20742-5141
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): NPU8ULVAAS23
Parent UEI: NPU8ULVAAS23
NSF Program(s): CSR-Computer Systems Research,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001516DB NSF RESEARCH & RELATED ACTIVIT
01001617DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7923
Program Element Code(s): 735400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Data structures have a prominent modern computational role, due to their wide applicability, such as in database querying, web searching, and social network analysis. This project focuses on the interplay of data structures with security protocols, examining two different paradigms: the security for data structures paradigm (SD) and the data structures for security paradigm (DS). The objectives of this project are, in the SD paradigm, to provide security and privacy both for data elements in data sets and also for the inter-relationships and distributions between such data elements, such as links between nodes in a social network, and, in the DS paradigm, to develop new data structures to improve the efficiency of algorithms for security and/or privacy applications.

The project explores methods for achieving these objectives include algorithm design, theoretical analysis, rigorous proofs of security and correctness, and experimental validation of claims of practicality. This research focuses on the security and cybersecurity uses of three advanced data structures: tree structures, invertible Bloom filters and cascading tables. The project advances knowledge on (a) authenticated data structures and verifiable query execution within the SD paradigm, and (b) secure deduplication, searchable encryption, and privacy-preserving memory allocators within the DS paradigm.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos: "Practical Authenticated Pattern Matching with Optimal Proof Size. PVLDB 8(7): 750-761 (2015)" VLDB 2015 , 2015
Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia "Accountable Storage" ACNS , 2017
Ioannis Demertzis and Charalampos Papamanthou. In Proc. ACM Special Interest Group on Management of Data "Fast Searchable Encryption with Tunable Locality" SIGMOD 2017 , 2017
Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili "New Constructions for Forward and Backward Private Symmetric Searchable Encryption" CCS 2018 , 2018
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou "All Your Queries Are Belong to Us: The Power of File Injection Attacks in Searchable Encryption" USENIX SECURITY , 2016
Zhe Zhou,Tao Zhang,Sherman S.M. Chow,Yupeng Zhang, Kehuan Zhang "Efficient Authenticated Multi-Pattern Matching" ASIACCS 2016 , 2016

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The project studied various relations between data structures and security, focusing on how data structures can enhance the performance of security protocols and more generally on the impact of data structure design on the security of data management.

One of the area that was explored is searching encrypted dynamic data, namely how to encrypt your personal information, send it to an untrusted repository/server, and then enable the server do some simple computation (search) without ever seeing the data in plaintext. We focused on the most challenging problem of supporting updates, such as edits, insertions and deletions, in the outsourced encrypted data collection without sacrificing privacy or efficiency (e.g., we do not re-encrypt the whole database whenever an update takes place). We particularly explored advanced security guarantees for this problem, such as backward privacy. For example, we want to make sure that our dynamic algorithms do not reveal which documents were deleted, after a deletion takes place.

A second area that was explored was data structures whose operation can be verified (authenticated data structures) with applications to blockchains. We considered the problem of distributing authenticated data structures, such that every party stores individual proofs for certain elements in the dataset, and all proofs are easily updatable when an update on the data structure takes place. This type of data structure has applications in stateless transaction validation, where network nodes do not maintain the whole blockchain state (but just a succinct digest), and the state is distributed across multiple parties/users of the blockchain.

The project contributed in the professional development of several PhD students and postdocs.


 


Last Modified: 02/26/2019
Modified by: Charalampos Papamanthou

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page