Max-Planck-Institut für Informatik
max planck institut
informatik
mpii logo Minerva of the Max Planck Society
 

MPI-INF or MPI-SWS or Local Campus Event Calendar

<< Previous Entry Next Entry >> New Event Entry Edit this Entry Login to DB (to update, delete)
What and Who
Title:Trustworthy Computing with Untrusted Resources
Speaker:Charalampos Papamanthou
coming from:University of Maryland, College Park
Speakers Bio:Charalampos (Babis) Papamanthou is an assistant professor of Electrical and Computer Engineering at the University of Maryland, College Park, where he joined in 2013 after a postdoc at UC Berkeley. At Maryland, he is also affiliated with the Institute for Advanced Computer Studies (UMIACS) where he is a member of the Maryland Cybersecurity Center (MC2). He works on the areas of applied cryptography and computer security---and especially on technologies, systems and theory for secure and private cloud computing. While at College Park, he received the 2013 University of Maryland invention of the year award, the 2014 Jimmy Lin award for invention (for his work on secure cloud storage) and the George Corcoran Award for excellence in teaching. His research is currently funded by federal agencies (NSF, NIST and NSA) and by the industry (Google, Yahoo! and Amazon). His PhD is in Computer Science from Brown University (2011) and he also holds an MSc in Computer Science from the University of Crete (2005), where he was a member of ICS-FORTH. He has published in venues and journals spanning theoretical and applied cryptography, systems and database security, graph algorithms and visualization and operations research. 
Event Type:CISPA Distinguished Lecture Series
Visibility:D1, D2, D3, D4, D5, SWS, RG1, MMCI
We use this to send out email in the morning.
Level:Public Audience
Language:English
Date, Time and Location
Date:Friday, 18 December 2015
Time:11:00
Duration:60 Minutes
Location:Saarbrücken
Building:E1 5
Room:0.02
Abstract
In the age of big data, cloud computing plays a major role in processing and analyzing massive amounts of information. Services like Amazon S3 and EC2 offer easily accessible outsourced storage and computation, gradually replacing our local hard drives and desktop machines. Nevertheless, many security concerns exist in this new paradigm. In an untrusted cloud setting, users' data and computations can be potentially tampered with and sensitive data could be leaked to unauthorized parties. In this talk, I will present my work that tackles the above mentioned problems through protocols and systems that offer verifiability and privacy assurances of data and computations in the cloud (or generally in untrusted environments).

First, I will review some of my work on theory and systems for efficiently verifying cloud storage queries as well as more expressive queries including conjunctive and disjunctive keyword search, SQL, range search and geometric processing queries, usually appearing in information retrieval and data streaming applications.

Second, I will highlight some of my recent work on cloud privacy concerning efficient and parallel searching of dynamic encrypted data and will finally talk about a private cloud-based email system (Pmail) with searching capabilities that we are developing at Maryland.

Contact
Name(s):Sabine Nermerich
Phone:3023585
EMail:--email address not disclosed on the web
Video Broadcast
Video Broadcast:NoTo Location:
Tags, Category, Keywords and additional notes
Note:
Attachments, File(s):

Created by:Sabine Nermerich/AG4/MPII/DE, 11/04/2015 02:46 PMLast modified by:Uwe Brahm/MPII/DE, 11/24/2016 04:13 PM
  • Sabine Nermerich, 11/04/2015 02:50 PM -- Created document.