SlideShare a Scribd company logo
Embedding Authenticated Data Structures in
Accumulo
Leo St. Amour
Cassandra Sparks, Robert K. Cunningham, Scott Ruoti, Emily Shen
October 11, 2016
DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited.
This material is based upon work supported by the Department of Defense under Air Force Contract
No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Any opinions, findings, conclusions or
recommendations expressed in this material are those of the author(s) and do not necessarily reflect
the views of the Department of Defense.
© 2016 Massachusetts Institute of Technology.
Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or
7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are
defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other
than as specifically authorized by the U.S. Government may violate any copyrights that exist in this
work.
Embedded ADSs in Accumulo - 2
LS 10/11/16
Querying
Clients
Threats to Accumulo
Network
Data
Sources
Threat 1: Malicious clients
Threat 2: External attacker Threat 3: Malicious cloud or admins
• Make unauthorized queries
• Learn stored data
• Learn other clients’ queries
• Insert malware
• Hack or compromise
system
• Learn contents of data & queries
• Modify, forge, or delete data
• Misattribute data to honest clients
Today’s focus: security against a malicious cloud or system
administrators
Malicious System Administrator System Administrator
Embedded ADSs in Accumulo - 3
LS 10/11/16
Secure Accumulo Overview
Querying
Clients
Network
Data
Sources
Data in motion
encryption
Accumulo provides
no safeguards!
Data at rest encryption
Malicious System Administrator System Administrator
Embedded ADSs in Accumulo - 4
LS 10/11/16
Secure Accumulo Overview
Querying
Clients
Network
Data
Sources
Digital
signatures
Field-level
encryption
Verifiable
query results
Our goal: use cryptography to protect against malicious insiders
Cryptographically
enforced access control
Malicious System Administrator System Administrator
Embedded ADSs in Accumulo - 5
LS 10/11/16
Outline
• Introduction
• Prior Work: Accumulo Summit 2015
– Digital Signatures
• Authenticated Data Structures
• Embedding Authenticated Data Structures in Accumulo
• Conclusion
Embedded ADSs in Accumulo - 6
LS 10/11/16
Using Digital Signatures with Accumulo
Case 1: Correct Response
Embedded ADSs in Accumulo - 7
LS 10/11/16
Using Digital Signatures with Accumulo
Case 2: Partially Forged Response
Embedded ADSs in Accumulo - 8
LS 10/11/16
Using Digital Signatures with Accumulo
Case 3: Incomplete Response
Clients cannot use signatures to detect maliciously omitted query results
Embedded ADSs in Accumulo - 9
LS 10/11/16
Integrity Protection Security Enforcement
Integrity
Protection
Insertion Modification Omission
Signatures
Authenticated Data
Structures
Embedded ADSs in Accumulo - 10
LS 10/11/16
Microbenchmark: Authenticated Skip Lists*
vs Signatures
* Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip
lists and commutative hashing." Johns Hopkins Information Security
Institute (2000).
Authenticated data structures are capable of improving both performance and
security over digital signatures
Embedded ADSs in Accumulo - 11
LS 10/11/16
Our Contributions
• Scheme for embedding an Authenticated Data Structure in Accumulo
– Allows for clients to verify that query results are correct and complete
• Prototype client-side library as proof-of-concept
– Written in Python
– Coming soon
• Java library
– Leverages iterators for improved efficiency
– Designed as “drop-in” API
– Coming 1st Quarter of CY-17
Contact: pace-contact@ll.mit.edu
Embedded ADSs in Accumulo - 12
LS 10/11/16
Outline
• Introduction
• Prior Work: Accumulo Summit 2015
• Authenticated Data Structures
– Skip List Properties
– Querying Over Skip Lists
• Embedding Authenticated Data Structures in Accumulo
• Conclusion
Embedded ADSs in Accumulo - 13
LS 10/11/16
digest
The digest is a small value
(constant size) that represents
the entire dataset
• Data structures that allow provably correct and complete query results
– Correctness defined by a trusted data owner
– Need to support range queries
VO
Data
Source
Querying
Client ?
VO
ADS
Authenticated Data Structures
ADS: Authenticated DataStructure
VO: Verification Object
Embedded ADSs in Accumulo - 14
LS 10/11/16
Skip Lists
6
-∞ ∞
-∞
-∞
-∞
∞
∞
∞
2 4 86
2
6
10 12
-∞ ∞
8
8
8
12
Elements can be inserted in
any order: insertion takes
expected O(log(n)) time
Embedded ADSs in Accumulo - 15
LS 10/11/16
Authenticated Skip Lists*
6
-∞ ∞
-∞
-∞
-∞
∞
∞
∞
2 4 86
2
6
10 12
-∞ ∞
8
8
8
12
1
2
Pruning edges based on query
paths lets authenticated
operations be O(log(n))
* Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip
lists and commutative hashing." Johns Hopkins Information Security
Institute (2000).
Embedded ADSs in Accumulo - 16
LS 10/11/16
… …
… …
…
…
Node Labeling
6
2 4 6
2 0
0
a = h(4, 6)
b = h(2, a)
h(b, 0)
A node’s label depends on all subsequent nodes
6
642
2
Note: h is a cryptographic hash function
Embedded ADSs in Accumulo - 17
LS 10/11/16
Authenticated Skip Lists*
digest
6
-∞ ∞
-∞
-∞
-∞
∞
∞
∞
2 4 86
2
6
10 12
-∞ ∞
8
8
8
12
range(1, 5)
* Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip
lists and commutative hashing." Johns Hopkins Information Security
Institute (2000).
Embedded ADSs in Accumulo - 18
LS 10/11/16
Outline
• Introduction
• Prior Work: Accumulo Summit 2015
• Authenticated Data Structures
• Embedding Authenticated Data Structures in Accumulo
– API Overview
• Conclusion
Embedded ADSs in Accumulo - 19
LS 10/11/16
Storing Skip Lists in Accumulo
6
8
8
8
12
Skip List Structure Accumulo
n2
n5
n3
n1
n4
Row Column Value
ADS n1
ADS n2
ADS n3
ADS n4
ADS n5
All data for each node is stored server-side in a single column
{elem : 8,
label : bGFiZWwgZm9yIG5vZGUgbjM=,
down : “n5”,
right : “n4”,
parent : {name: “n1”, dir: “from_up”}}
Embedded ADSs in Accumulo - 20
LS 10/11/16
Client-side ADS Computations
• ADS prototype has clients compute VOs based on data stored
in Accumulo, resulting in high communication overhead
Accumulo
Query
Parent node
ADS metadata
Parent node
Embedded ADSs in Accumulo - 21
LS 10/11/16
Server-side ADS Computations
• Using Accumulo iterators, we can perform all computation
server-side and return the result
• This avoids the communication overhead of client-side
computations
Accumulo
Query
Compute
verification
object
Return verification object
Embedded ADSs in Accumulo - 22
LS 10/11/16
Outline
• Introduction
• Prior Work - Accumulo Summit 2015
• Authenticated Data Structures
• Embedding Authenticated Data Structures in Accumulo
– API Overview
• Conclusion
Embedded ADSs in Accumulo - 23
LS 10/11/16
API Overview
Embedded ADSs in Accumulo - 24
LS 10/11/16
API Overview
Embedded ADSs in Accumulo - 25
LS 10/11/16
Java Implementation
Embedded ADSs in Accumulo - 26
LS 10/11/16
Java Implementation
Embedded ADSs in Accumulo - 27
LS 10/11/16
Java Implementation
• Iterating over VerifyScanner
– Applies custom Accumulo Iterator to metadata scanner
– Custom Iterator extends RowEncodingIterator
Embedded ADSs in Accumulo - 28
LS 10/11/16
Java Implementation
• VerifyScanner only returns results if the query has been verified
Embedded ADSs in Accumulo - 29
LS 10/11/16
Outline
• Introduction
• Prior Work: Accumulo Summit 2015
• Authenticated Data Structures
• Embedding Authenticated Data Structures in Accumulo
• Conclusion
Embedded ADSs in Accumulo - 30
LS 10/11/16
Limitations
• Current implementation returns range query boundaries in verification object
– Leaks boundary elements
• Verification objects do not support visibility fields
– Proof may contain data that the client is not authorized to access
Embedded ADSs in Accumulo - 31
LS 10/11/16
Future Work
• Develop a method for verifying completeness without leaking boundaries
• Develop a “visibility aware” authenticated data structure
Embedded ADSs in Accumulo - 32
LS 10/11/16
Conclusion
• Scheme for embedding an Authenticated Data Structure in Accumulo
– Allows for clients to verify that query results are correct and complete
• Prototype client-side library as proof-of-concept
– Written in Python
– Coming soon
• Java library
– Leverages iterators for improved efficiency
– Designed as “drop-in” API
– Coming 1st Quarter of CY-17
Contact: pace-contact@ll.mit.edu

More Related Content

What's hot

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
Sqrrl
 
Bitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management controlBitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management control
ramycaspi
 
Core intel
Core intelCore intel
Core intel
Krzysztof Adamski
 
Tracing Micro Services with OpenTracing
Tracing Micro Services with OpenTracingTracing Micro Services with OpenTracing
Tracing Micro Services with OpenTracing
Hemant Kumar
 
FIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart SystemsFIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE
 
Distributed tracing with OpenTracing and Jaeger @ getstream.io
Distributed tracing with OpenTracing and Jaeger @ getstream.ioDistributed tracing with OpenTracing and Jaeger @ getstream.io
Distributed tracing with OpenTracing and Jaeger @ getstream.io
Max Klyga
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
DataWorks Summit
 
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...
LibbySchulze
 
Optimizing Elastic for Search at McQueen Solutions
Optimizing Elastic for Search at McQueen SolutionsOptimizing Elastic for Search at McQueen Solutions
Optimizing Elastic for Search at McQueen Solutions
Elasticsearch
 
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBSCassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
DataStax Academy
 
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the CloudCrypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
JAYAPRAKASH JPINFOTECH
 
How to Light a Beacon
How to Light a BeaconHow to Light a Beacon
How to Light a Beacon
Miro Cupak
 
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX
 

What's hot (14)

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
Bitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management controlBitcoin blockchains and distributed satellite management control
Bitcoin blockchains and distributed satellite management control
 
Core intel
Core intelCore intel
Core intel
 
Tracing Micro Services with OpenTracing
Tracing Micro Services with OpenTracingTracing Micro Services with OpenTracing
Tracing Micro Services with OpenTracing
 
FIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart SystemsFIWARE Wednesday Webinars - Short Term History within Smart Systems
FIWARE Wednesday Webinars - Short Term History within Smart Systems
 
Distributed tracing with OpenTracing and Jaeger @ getstream.io
Distributed tracing with OpenTracing and Jaeger @ getstream.ioDistributed tracing with OpenTracing and Jaeger @ getstream.io
Distributed tracing with OpenTracing and Jaeger @ getstream.io
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...
 
Optimizing Elastic for Search at McQueen Solutions
Optimizing Elastic for Search at McQueen SolutionsOptimizing Elastic for Search at McQueen Solutions
Optimizing Elastic for Search at McQueen Solutions
 
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBSCassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
 
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the CloudCrypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
 
How to Light a Beacon
How to Light a BeaconHow to Light a Beacon
How to Light a Beacon
 
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
NIX Case Study: ARTIFACTS - A Blockchain Platform for Scientific Research Dat...
 

Viewers also liked

Accumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
Accumulo Summit 2016: Effective Testing of Apache Accumulo IteratorsAccumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
Accumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
Accumulo Summit
 
Accumulo design
Accumulo designAccumulo design
Accumulo design
scsorensen
 
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
Accumulo Summit
 
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
Accumulo Summit
 
Accumulo meetup 20130109
Accumulo meetup 20130109Accumulo meetup 20130109
Accumulo meetup 20130109
Sqrrl
 
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
Accumulo Summit
 
Accumulo Summit 2016: Accumulo in the Enterprise
Accumulo Summit 2016: Accumulo in the EnterpriseAccumulo Summit 2016: Accumulo in the Enterprise
Accumulo Summit 2016: Accumulo in the Enterprise
Accumulo Summit
 
Apache Accumulo and the Data Lake
Apache Accumulo and the Data LakeApache Accumulo and the Data Lake
Apache Accumulo and the Data Lake
Aaron Cordova
 
Large Scale Accumulo Clusters
Large Scale Accumulo ClustersLarge Scale Accumulo Clusters
Large Scale Accumulo Clusters
Aaron Cordova
 
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
Accumulo Summit
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
James Salter
 
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
Accumulo Summit
 
Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411
Sqrrl
 
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
Accumulo Summit
 
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit
 
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big DataOct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Yahoo Developer Network
 
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
Accumulo Summit
 
Apache Accumulo Overview
Apache Accumulo OverviewApache Accumulo Overview
Apache Accumulo Overview
Bill Havanki
 
Apache Kafka, HDFS, Accumulo and more on Mesos
Apache Kafka, HDFS, Accumulo and more on MesosApache Kafka, HDFS, Accumulo and more on Mesos
Apache Kafka, HDFS, Accumulo and more on Mesos
Joe Stein
 
Scaling up Linked Data
Scaling up Linked DataScaling up Linked Data
Scaling up Linked Data
Marin Dimitrov
 

Viewers also liked (20)

Accumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
Accumulo Summit 2016: Effective Testing of Apache Accumulo IteratorsAccumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
Accumulo Summit 2016: Effective Testing of Apache Accumulo Iterators
 
Accumulo design
Accumulo designAccumulo design
Accumulo design
 
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
Accumulo Summit 2014: Four Orders of Magnitude: Running Large Scale Accumulo ...
 
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
Accumulo Summit 2015: Tracing in Accumulo and HDFS [Internals]
 
Accumulo meetup 20130109
Accumulo meetup 20130109Accumulo meetup 20130109
Accumulo meetup 20130109
 
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
Accumulo Summit 2016: Accumulo Indexing Strategies for Searching Semantic Net...
 
Accumulo Summit 2016: Accumulo in the Enterprise
Accumulo Summit 2016: Accumulo in the EnterpriseAccumulo Summit 2016: Accumulo in the Enterprise
Accumulo Summit 2016: Accumulo in the Enterprise
 
Apache Accumulo and the Data Lake
Apache Accumulo and the Data LakeApache Accumulo and the Data Lake
Apache Accumulo and the Data Lake
 
Large Scale Accumulo Clusters
Large Scale Accumulo ClustersLarge Scale Accumulo Clusters
Large Scale Accumulo Clusters
 
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
Accumulo Summit 2014: Benchmarking Accumulo: How Fast Is Fast?
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
 
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
Accumulo Summit 2015: Accumulo In-Depth: Building Bulk Ingest [Sponsored]
 
Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411
 
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
Accumulo Summit 2015: Performance Models for Apache Accumulo: The Heavy Tail ...
 
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
Accumulo Summit 2015: Real-Time Distributed and Reactive Systems with Apache ...
 
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big DataOct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
Oct 2012 HUG: Apache Accumulo: Unlocking the Power of Big Data
 
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
Accumulo Summit 2016: GeoMesa: Using Accumulo for Optimized Spatio-Temporal P...
 
Apache Accumulo Overview
Apache Accumulo OverviewApache Accumulo Overview
Apache Accumulo Overview
 
Apache Kafka, HDFS, Accumulo and more on Mesos
Apache Kafka, HDFS, Accumulo and more on MesosApache Kafka, HDFS, Accumulo and more on Mesos
Apache Kafka, HDFS, Accumulo and more on Mesos
 
Scaling up Linked Data
Scaling up Linked DataScaling up Linked Data
Scaling up Linked Data
 

Similar to Accumulo Summit 2016: Embedding Authenticated Data Structures in Accumulo

REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
IRJET Journal
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
IRJET Journal
 
Elastic Stack @ Swisscom Application Cloud
Elastic Stack @ Swisscom Application CloudElastic Stack @ Swisscom Application Cloud
Elastic Stack @ Swisscom Application Cloud
Lucas Bremgartner
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
VIT University
 
Présentation iwsm-mensura 2016
Présentation iwsm-mensura 2016Présentation iwsm-mensura 2016
Présentation iwsm-mensura 2016
Hela Loulouette
 
19 secure iccp-integration
19 secure iccp-integration19 secure iccp-integration
19 secure iccp-integration
Ivan Carmona
 
Model-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data AnalyticsModel-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data Analytics
Cisco Canada
 
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
IRJET Journal
 
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
mjos
 
Shceduling iot application on cloud computing
Shceduling iot application on cloud computingShceduling iot application on cloud computing
Shceduling iot application on cloud computing
Eman Ahmed
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Dominique Dessy
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
IRJET Journal
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET Journal
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
Real-Time Innovations (RTI)
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentiality
theijes
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11
Kevin Mahoney
 
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
HostedbyConfluent
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET Journal
 
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
Splunk
 

Similar to Accumulo Summit 2016: Embedding Authenticated Data Structures in Accumulo (20)

REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
Elastic Stack @ Swisscom Application Cloud
Elastic Stack @ Swisscom Application CloudElastic Stack @ Swisscom Application Cloud
Elastic Stack @ Swisscom Application Cloud
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Présentation iwsm-mensura 2016
Présentation iwsm-mensura 2016Présentation iwsm-mensura 2016
Présentation iwsm-mensura 2016
 
19 secure iccp-integration
19 secure iccp-integration19 secure iccp-integration
19 secure iccp-integration
 
Model-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data AnalyticsModel-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data Analytics
 
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
IRJET- An Efficient Vehicle Authentication using Block Authentication Code fo...
 
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
 
Shceduling iot application on cloud computing
Shceduling iot application on cloud computingShceduling iot application on cloud computing
Shceduling iot application on cloud computing
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentiality
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11
 
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
SingleStore & Kafka: Better Together to Power Modern Real-Time Data Architect...
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
SplunkLive! Tampa: Splunk Ninjas: New Features, Pivot, and Search Dojo
 

Recently uploaded

Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
22ad0301
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
TeukuEriSyahputra
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
Vineet
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
osoyvvf
 
SAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content DocumentSAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content Document
newdirectionconsulta
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 
Econ3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdfEcon3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdf
blueshagoo1
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
Vietnam Cotton & Spinning Association
 
saps4hanaandsapanalyticswheretodowhat1565272000538.pdf
saps4hanaandsapanalyticswheretodowhat1565272000538.pdfsaps4hanaandsapanalyticswheretodowhat1565272000538.pdf
saps4hanaandsapanalyticswheretodowhat1565272000538.pdf
newdirectionconsulta
 
Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)
GeorgiiSteshenko
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
keesa2
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
ArshadAyub49
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
eudsoh
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
dataschool1
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Marlon Dumas
 

Recently uploaded (20)

Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
 
SAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content DocumentSAP BW4HANA Implementagtion Content Document
SAP BW4HANA Implementagtion Content Document
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 
Econ3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdfEcon3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdf
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
 
saps4hanaandsapanalyticswheretodowhat1565272000538.pdf
saps4hanaandsapanalyticswheretodowhat1565272000538.pdfsaps4hanaandsapanalyticswheretodowhat1565272000538.pdf
saps4hanaandsapanalyticswheretodowhat1565272000538.pdf
 
Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)Telemetry Solution for Gaming (AWS Summit'24)
Telemetry Solution for Gaming (AWS Summit'24)
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
 

Accumulo Summit 2016: Embedding Authenticated Data Structures in Accumulo

  • 1. Embedding Authenticated Data Structures in Accumulo Leo St. Amour Cassandra Sparks, Robert K. Cunningham, Scott Ruoti, Emily Shen October 11, 2016 DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. This material is based upon work supported by the Department of Defense under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Department of Defense. © 2016 Massachusetts Institute of Technology. Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work.
  • 2. Embedded ADSs in Accumulo - 2 LS 10/11/16 Querying Clients Threats to Accumulo Network Data Sources Threat 1: Malicious clients Threat 2: External attacker Threat 3: Malicious cloud or admins • Make unauthorized queries • Learn stored data • Learn other clients’ queries • Insert malware • Hack or compromise system • Learn contents of data & queries • Modify, forge, or delete data • Misattribute data to honest clients Today’s focus: security against a malicious cloud or system administrators Malicious System Administrator System Administrator
  • 3. Embedded ADSs in Accumulo - 3 LS 10/11/16 Secure Accumulo Overview Querying Clients Network Data Sources Data in motion encryption Accumulo provides no safeguards! Data at rest encryption Malicious System Administrator System Administrator
  • 4. Embedded ADSs in Accumulo - 4 LS 10/11/16 Secure Accumulo Overview Querying Clients Network Data Sources Digital signatures Field-level encryption Verifiable query results Our goal: use cryptography to protect against malicious insiders Cryptographically enforced access control Malicious System Administrator System Administrator
  • 5. Embedded ADSs in Accumulo - 5 LS 10/11/16 Outline • Introduction • Prior Work: Accumulo Summit 2015 – Digital Signatures • Authenticated Data Structures • Embedding Authenticated Data Structures in Accumulo • Conclusion
  • 6. Embedded ADSs in Accumulo - 6 LS 10/11/16 Using Digital Signatures with Accumulo Case 1: Correct Response
  • 7. Embedded ADSs in Accumulo - 7 LS 10/11/16 Using Digital Signatures with Accumulo Case 2: Partially Forged Response
  • 8. Embedded ADSs in Accumulo - 8 LS 10/11/16 Using Digital Signatures with Accumulo Case 3: Incomplete Response Clients cannot use signatures to detect maliciously omitted query results
  • 9. Embedded ADSs in Accumulo - 9 LS 10/11/16 Integrity Protection Security Enforcement Integrity Protection Insertion Modification Omission Signatures Authenticated Data Structures
  • 10. Embedded ADSs in Accumulo - 10 LS 10/11/16 Microbenchmark: Authenticated Skip Lists* vs Signatures * Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip lists and commutative hashing." Johns Hopkins Information Security Institute (2000). Authenticated data structures are capable of improving both performance and security over digital signatures
  • 11. Embedded ADSs in Accumulo - 11 LS 10/11/16 Our Contributions • Scheme for embedding an Authenticated Data Structure in Accumulo – Allows for clients to verify that query results are correct and complete • Prototype client-side library as proof-of-concept – Written in Python – Coming soon • Java library – Leverages iterators for improved efficiency – Designed as “drop-in” API – Coming 1st Quarter of CY-17 Contact: pace-contact@ll.mit.edu
  • 12. Embedded ADSs in Accumulo - 12 LS 10/11/16 Outline • Introduction • Prior Work: Accumulo Summit 2015 • Authenticated Data Structures – Skip List Properties – Querying Over Skip Lists • Embedding Authenticated Data Structures in Accumulo • Conclusion
  • 13. Embedded ADSs in Accumulo - 13 LS 10/11/16 digest The digest is a small value (constant size) that represents the entire dataset • Data structures that allow provably correct and complete query results – Correctness defined by a trusted data owner – Need to support range queries VO Data Source Querying Client ? VO ADS Authenticated Data Structures ADS: Authenticated DataStructure VO: Verification Object
  • 14. Embedded ADSs in Accumulo - 14 LS 10/11/16 Skip Lists 6 -∞ ∞ -∞ -∞ -∞ ∞ ∞ ∞ 2 4 86 2 6 10 12 -∞ ∞ 8 8 8 12 Elements can be inserted in any order: insertion takes expected O(log(n)) time
  • 15. Embedded ADSs in Accumulo - 15 LS 10/11/16 Authenticated Skip Lists* 6 -∞ ∞ -∞ -∞ -∞ ∞ ∞ ∞ 2 4 86 2 6 10 12 -∞ ∞ 8 8 8 12 1 2 Pruning edges based on query paths lets authenticated operations be O(log(n)) * Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip lists and commutative hashing." Johns Hopkins Information Security Institute (2000).
  • 16. Embedded ADSs in Accumulo - 16 LS 10/11/16 … … … … … … Node Labeling 6 2 4 6 2 0 0 a = h(4, 6) b = h(2, a) h(b, 0) A node’s label depends on all subsequent nodes 6 642 2 Note: h is a cryptographic hash function
  • 17. Embedded ADSs in Accumulo - 17 LS 10/11/16 Authenticated Skip Lists* digest 6 -∞ ∞ -∞ -∞ -∞ ∞ ∞ ∞ 2 4 86 2 6 10 12 -∞ ∞ 8 8 8 12 range(1, 5) * Goodrich, and Tamassia. "Efficient authenticated dictionaries with skip lists and commutative hashing." Johns Hopkins Information Security Institute (2000).
  • 18. Embedded ADSs in Accumulo - 18 LS 10/11/16 Outline • Introduction • Prior Work: Accumulo Summit 2015 • Authenticated Data Structures • Embedding Authenticated Data Structures in Accumulo – API Overview • Conclusion
  • 19. Embedded ADSs in Accumulo - 19 LS 10/11/16 Storing Skip Lists in Accumulo 6 8 8 8 12 Skip List Structure Accumulo n2 n5 n3 n1 n4 Row Column Value ADS n1 ADS n2 ADS n3 ADS n4 ADS n5 All data for each node is stored server-side in a single column {elem : 8, label : bGFiZWwgZm9yIG5vZGUgbjM=, down : “n5”, right : “n4”, parent : {name: “n1”, dir: “from_up”}}
  • 20. Embedded ADSs in Accumulo - 20 LS 10/11/16 Client-side ADS Computations • ADS prototype has clients compute VOs based on data stored in Accumulo, resulting in high communication overhead Accumulo Query Parent node ADS metadata Parent node
  • 21. Embedded ADSs in Accumulo - 21 LS 10/11/16 Server-side ADS Computations • Using Accumulo iterators, we can perform all computation server-side and return the result • This avoids the communication overhead of client-side computations Accumulo Query Compute verification object Return verification object
  • 22. Embedded ADSs in Accumulo - 22 LS 10/11/16 Outline • Introduction • Prior Work - Accumulo Summit 2015 • Authenticated Data Structures • Embedding Authenticated Data Structures in Accumulo – API Overview • Conclusion
  • 23. Embedded ADSs in Accumulo - 23 LS 10/11/16 API Overview
  • 24. Embedded ADSs in Accumulo - 24 LS 10/11/16 API Overview
  • 25. Embedded ADSs in Accumulo - 25 LS 10/11/16 Java Implementation
  • 26. Embedded ADSs in Accumulo - 26 LS 10/11/16 Java Implementation
  • 27. Embedded ADSs in Accumulo - 27 LS 10/11/16 Java Implementation • Iterating over VerifyScanner – Applies custom Accumulo Iterator to metadata scanner – Custom Iterator extends RowEncodingIterator
  • 28. Embedded ADSs in Accumulo - 28 LS 10/11/16 Java Implementation • VerifyScanner only returns results if the query has been verified
  • 29. Embedded ADSs in Accumulo - 29 LS 10/11/16 Outline • Introduction • Prior Work: Accumulo Summit 2015 • Authenticated Data Structures • Embedding Authenticated Data Structures in Accumulo • Conclusion
  • 30. Embedded ADSs in Accumulo - 30 LS 10/11/16 Limitations • Current implementation returns range query boundaries in verification object – Leaks boundary elements • Verification objects do not support visibility fields – Proof may contain data that the client is not authorized to access
  • 31. Embedded ADSs in Accumulo - 31 LS 10/11/16 Future Work • Develop a method for verifying completeness without leaking boundaries • Develop a “visibility aware” authenticated data structure
  • 32. Embedded ADSs in Accumulo - 32 LS 10/11/16 Conclusion • Scheme for embedding an Authenticated Data Structure in Accumulo – Allows for clients to verify that query results are correct and complete • Prototype client-side library as proof-of-concept – Written in Python – Coming soon • Java library – Leverages iterators for improved efficiency – Designed as “drop-in” API – Coming 1st Quarter of CY-17 Contact: pace-contact@ll.mit.edu