Overview
Explore the intricacies of cryptographically protected database search systems in this IEEE Symposium on Security & Privacy conference talk. Delve into the challenges of balancing security, functionality, performance, and usability in protected search systems. Examine the evolution of databases and the need for adaptable protection methods. Discover key contributions, including the identification of important primitive operations across database paradigms, evaluation of current protected search systems, analysis of potential attacks, and a roadmap for transforming protected search into protected databases. Gain insights into topics such as data value, encryption, leakage, differential privacy, and database instrumentation. Learn about the speaker's approach to systematizing knowledge in this rapidly growing field and understand the importance of accurately characterizing tradeoffs between different approaches.
Syllabus
Intro
Data has tremendous value
Data creates risk
Encryption
Cryptographically Protected Search
Why Systematize
Leakage
Example Data
Differential Privacy
Utility
Database instrumentation
Functionality
Questions
Taught by
IEEE Symposium on Security and Privacy