{"586005":{"#nid":"586005","#data":{"type":"event","title":"Cybersecurity Lecture Series with Alexander Degitz","body":[{"value":"\u003Ch3\u003E\u003Cstrong\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. \u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Apr. 21,\u003C\/strong\u003E lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EComplimentary lunch provided for registered guests. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ESign up to receive future lecture announcements.\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch3\u003E\u003Cstrong\u003EFeaturing Alexander Degitz on Jan. 13, 2017\u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Ch4\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;Secure Data Outsourcing: Access Pattern Confidentiality in outsourced Databases\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u003Cstrong\u003E\u003Cem\u003EABSTRACT\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp;\u0026nbsp; When sensitive data is outsourced to an untrustworthy cloud storage provider, encryption techniques can be used to enforce data confidentiality. Ideally, such encryption techniques should not only enforce the confidentiality of data at rest but also the confidentiality of data accesses, as database access patterns can leak parts of the database\u0026#39;s contents. Encryption techniques like Oblivious RAM (ORAM) or dynamically shuffled B-trees were proposed to hide access patterns, but are computationally expensive and create a large overhead of network traffic. Furthermore, they currently support a very limited set of database search operations.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this talk, I will give an overview of current protocols for \u003Cstrong\u003Esecure data outsourcing\u003C\/strong\u003E like shuffled B-tree and Oblivious RAM approaches, and I will introduce our proposed protocols SECURUS and PATCONFDB.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESECURUS is a protocol that optimizes the query times on encrypted index structures for database outsourcing based on the security needs of users by using the optimal encryption technique (deterministic, order-preserving, homomorphic, etc\u0026hellip;) and outsourcing technique (data partitioning, index separation, etc\u0026hellip;) for every index.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPATCONFDB is a protocol for database outsourcing that obfuscates access patterns to the database through the use of ORAM approaches. It provides fast range and prefix selections for databases while being agnostic to the type of underlying ORAM approach.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EBIO\u003C\/em\u003E\u003C\/strong\u003E\u0026nbsp;\u0026nbsp; |\u0026nbsp;\u0026nbsp; Alexander Degitz is a researcher and Exchange Research Scholar at Georgia Tech, working under Doug Blough, a professor in the School of Electrical \u0026amp; Computer Engineering and the School of Computer Science.\u0026nbsp; He earned his bachelor\u0026#39;s and master\u0026#39;s of computer science during 2009 \u0026ndash; 2014 at the Karlsruhe Institute of Technology in Germany. Since 2015, he has served as a research staff member and Ph.D. Candidate at the DSN research group of Prof. Hartenstein, where his focus is Secure Data Outsourcing.\u003Cbr \/\u003E\r\nHe came to Georgia Tech in October 2016.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003ESupported by Jackson National Life Insurance Company\u003C\/em\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Alexander Degitz, an Exchange Research Scholar at Georgia Tech, discusses how to maintain data security in an outsourced environment."}],"uid":"27490","created_gmt":"2017-01-13 16:45:01","changed_gmt":"2017-04-13 21:13:17","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-01-13T12:00:00-05:00","event_time_end":"2017-01-13T13:00:00-05:00","event_time_end_last":"2017-01-13T13:00:00-05:00","gmt_time_start":"2017-01-13 17:00:00","gmt_time_end":"2017-01-13 18:00:00","gmt_time_end_last":"2017-01-13 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}},"586008":{"id":"586008","type":"image","title":"Alexander Degitz","body":null,"created":"1484326676","gmt_created":"2017-01-13 16:57:56","changed":"1484326676","gmt_changed":"2017-01-13 16:57:56","alt":"","file":{"fid":"223355","name":"Degitz.jpg","image_path":"\/sites\/default\/files\/images\/Degitz.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Degitz.jpg","mime":"image\/jpeg","size":513118,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Degitz.jpg?itok=p_Q1vFuk"}},"583219":{"id":"583219","type":"image","title":"Jackson National Life Insurance Company","body":null,"created":"1477585591","gmt_created":"2016-10-27 16:26:31","changed":"1477585591","gmt_changed":"2016-10-27 16:26:31","alt":"","file":{"fid":"222329","name":"Jackson_NLIC_sm.jpg","image_path":"\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Jackson_NLIC_sm.jpg","mime":"image\/jpeg","size":69862,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Jackson_NLIC_sm.jpg?itok=RJbpkMqL"}}},"media_ids":["538461","586008","583219"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"69599","name":"IPaT"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lpanetta@gtri.gatech.edu\u0022\u003Elpanetta@gtri.gatech.edu\u003C\/a\u003E, 404.376.2804\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}