MPI-INF Logo
Campus Event Calendar

Event Entry

What and Who

Trustworthy Computing with Untrusted Resources

Charalampos Papamanthou
University of Maryland, College Park
CISPA Distinguished Lecture Series

Charalampos (Babis) Papamanthou is an assistant professor of Electrical and Computer Engineering at the University of Maryland, College Park, where he joined in 2013 after a postdoc at UC Berkeley. At Maryland, he is also affiliated with the Institute for Advanced Computer Studies (UMIACS) where he is a member of the Maryland Cybersecurity Center (MC2). He works on the areas of applied cryptography and computer security---and especially on technologies, systems and theory for secure and private cloud computing. While at College Park, he received the 2013 University of Maryland invention of the year award, the 2014 Jimmy Lin award for invention (for his work on secure cloud storage) and the George Corcoran Award for excellence in teaching. His research is currently funded by federal agencies (NSF, NIST and NSA) and by the industry (Google, Yahoo! and Amazon). His PhD is in Computer Science from Brown University (2011) and he also holds an MSc in Computer Science from the University of Crete (2005), where he was a member of ICS-FORTH. He has published in venues and journals spanning theoretical and applied cryptography, systems and database security, graph algorithms and visualization and operations research. 
AG 1, AG 2, AG 3, AG 4, AG 5, SWS, RG1, MMCI  
Public Audience
English

Date, Time and Location

Friday, 18 December 2015
11:00
60 Minutes
E1 5
0.02
Saarbrücken

Abstract

In the age of big data, cloud computing plays a major role in processing and analyzing massive amounts of information. Services like Amazon S3 and EC2 offer easily accessible outsourced storage and computation, gradually replacing our local hard drives and desktop machines. Nevertheless, many security concerns exist in this new paradigm. In an untrusted cloud setting, users' data and computations can be potentially tampered with and sensitive data could be leaked to unauthorized parties. In this talk, I will present my work that tackles the above mentioned problems through protocols and systems that offer verifiability and privacy assurances of data and computations in the cloud (or generally in untrusted environments).

First, I will review some of my work on theory and systems for efficiently verifying cloud storage queries as well as more expressive queries including conjunctive and disjunctive keyword search, SQL, range search and geometric processing queries, usually appearing in information retrieval and data streaming applications.

Second, I will highlight some of my recent work on cloud privacy concerning efficient and parallel searching of dynamic encrypted data and will finally talk about a private cloud-based email system (Pmail) with searching capabilities that we are developing at Maryland.

Contact

Sabine Nermerich
3023585
--email hidden
passcode not visible
logged in users only

Sabine Nermerich, 11/04/2015 14:50 -- Created document.