{"id":24673,"date":"2014-07-11T10:40:59","date_gmt":"2014-07-11T14:40:59","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24673"},"modified":"2014-07-11T10:40:59","modified_gmt":"2014-07-11T14:40:59","slug":"computer-security-melbourne-shuffle-secures-data-in-the-cloud","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/computer-security-melbourne-shuffle-secures-data-in-the-cloud.php","title":{"rendered":"Computer security: &#8216;Melbourne Shuffle&#8217; secures data in the cloud"},"content":{"rendered":"<p><p>  To keep data safe in the cloud, a group of computer scientists  suggests doing the Melbourne Shuffle.<\/p>\n<p>    That may sound like a dance move (and it is), but it's also a    computer algorithm developed by researchers at Brown    University.  <\/p>\n<p>    The computing version of the Melbourne Shuffle aims to hide    patterns that may emerge as users access data on cloud servers.    Patterns of access could provide important information about a    dataset -- information that users don't necessarily want others    to know -- even if the data files themselves are encrypted.  <\/p>\n<p>    \"Encrypting data is an important security measure. However,    privacy leaks can occur even when accessing encrypted data,\"    said Olga Ohrimenko, lead author of a paper describing the    algorithm. \"The objective of our work is to provide a higher    level of privacy guarantees, beyond what encryption alone can    achieve.\"  <\/p>\n<p>    The paper was presented this week at the International    Colloquium on Automata, Languages, and Programming (ICALP 2014)    in Copenhagen. Ohrimenko, who recently received her Ph.D. from    Brown University and now works at Microsoft Research,    co-authored the work with Roberto Tamassia and Eli Upfal,    professors of computer science at Brown, and Michael Goodrich    from the University of California-Irvine.  <\/p>\n<p>    Cloud computing is increasing in popularity as more individuals    use services like Google Drive and more companies outsource    their data to companies like Amazon Web Services. As the amount    of data on the cloud grows, so do concerns about keeping it    secure. Most cloud service providers encrypt the data they    store. Larger companies generally encrypt their own data before    sending it to the cloud to protect it not only from hackers but    also to keep cloud providers themselves from snooping around in    it.  <\/p>\n<p>    But while encryption renders data files unreadable, it can't    hide patterns of data access. Those patterns can be a serious    security issue. For example, a service provider -- or someone    eavesdropping on that provider -- might be able to figure out    that after accessing files at certain locations on the cloud    server, a company tends to come out with a negative earnings    report the following week. Eavesdroppers may have no idea    what's in those particular files, but they know that it's    correlated to negative earnings.  <\/p>\n<p>    But that's not the only potential security issue.  <\/p>\n<p>    \"The pattern of accessing data could give away some information    about what kind of computation we're performing or what kind of    program we're running on the data,\" said Tamassia, chair of the    Department of Computer Science.  <\/p>\n<p>    Some programs have very particular ways in which they access    data. By observing those patterns, someone might be able to    deduce, for example, that a company seems to be running a    program that processes bankruptcy proceedings.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.sciencedaily.com\/releases\/2014\/07\/140710111902.htm\/RK=0\/RS=EKfFWjFlSuQv.fi6CbwshkNqrws-\" title=\"Computer security: 'Melbourne Shuffle' secures data in the cloud\">Computer security: 'Melbourne Shuffle' secures data in the cloud<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> To keep data safe in the cloud, a group of computer scientists suggests doing the Melbourne Shuffle. That may sound like a dance move (and it is), but it's also a computer algorithm developed by researchers at Brown University. The computing version of the Melbourne Shuffle aims to hide patterns that may emerge as users access data on cloud servers. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24673","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24673"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24673"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24673\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}