One Year Peer Review Report

Total Page:16

File Type:pdf, Size:1020Kb

One Year Peer Review Report International Technology Alliance in Network & Information Sciences One Year Peer Review Report July 2014 Prepared for: Peer Review Panel Prepared by: Dinesh Verma & David Watson, IBM 19 Skyline Drive, Hawthorne, NY – 10549, USA & MP 137, IBM Hursley, Hursley Park, Winchester, Hants., SO21 2JN, UK Distribution authorized to U.S. Government agencies and their contractors; test and evaluation (December 2009). Other requests for this document shall be referred to Director, U.S. Army Research Laboratory, ATTN: AMSRD-ARL-CI-IA, 2800 Powder Mill Road, Adelphi, MD 20783-1197 1 1. Introduction ..................................................................................................................... 4 1.1 What is the Peer Review Report (PRR)? ................................................................................ 4 1.2 Overview of ITA .................................................................................................................... 4 1.2.1 ITA Mission ........................................................................................................................... 5 1.2.2 Alliance Members ................................................................................................................. 7 1.2.3 The Ways of Working ........................................................................................................... 9 1.3 Document Organization ...................................................................................................... 10 2. Technical Area 5: Coalition Interoperable Secure & Hybrid Networks ............................. 11 2.1 Overview ............................................................................................................................ 11 2.1.1 Accomplishments Highlights .............................................................................................. 12 2.1.2 Other Important information / facts related to TA 5 ......................................................... 13 2.2 Project 1- Hybrid Networks: Performance and Metrics ........................................................ 15 2.2.1 Introduction ........................................................................................................................ 15 2.2.2 Research Impact ................................................................................................................. 16 2.2.3 Technical Accomplishments ............................................................................................... 19 2.2.4 References for Project 1 ..................................................................................................... 23 2.3 Project 2 – Security/Network Management and Control ..................................................... 25 2.3.1 Introduction ........................................................................................................................ 25 2.3.2 Research Impact ................................................................................................................. 26 2.3.3 Technical Accomplishments ............................................................................................... 33 2.3.4 References for Project 2 ..................................................................................................... 41 2.4 Project 3 – Security for Distributed Services ........................................................................ 43 2.4.1 Introduction ........................................................................................................................ 43 2.4.2 Research Impact ................................................................................................................. 43 2.4.3 Technical Accomplishments ............................................................................................... 46 2.4.4 References for Project 3 ..................................................................................................... 51 3. Technical Area 6: Distributed Coalition Information Processing for Decision Making ...... 52 3.1 Overview ............................................................................................................................ 52 3.1.1 Accomplishments Highlights .............................................................................................. 53 3.1.2 Other Important information/facts related to TA6 ............................................................ 54 3.2 Project 4 - Human-Information Interaction ......................................................................... 56 3.2.1 Introduction ........................................................................................................................ 56 3.2.2 Research Impact ................................................................................................................. 57 3.2.3 Technical Accomplishments ............................................................................................... 61 3.2.4 References for Project 4 ..................................................................................................... 68 3.3 Project 5 – Distributed Coalition Services ............................................................................ 70 3.3.1 Introduction ........................................................................................................................ 70 3.3.2 Research Impact ................................................................................................................. 71 3.3.3 Technical Accomplishments ............................................................................................... 74 3.3.4 References for Project 5 ..................................................................................................... 76 3.4 Project 6 - Collective Sensemaking Under Uncertainty ........................................................ 78 3.4.1 Introduction ........................................................................................................................ 78 3.4.2 Research Impact ................................................................................................................. 78 3.4.3 Technical Accomplishments ............................................................................................... 81 3.4.4 References for Project 6 ..................................................................................................... 90 2 4. Experimentation Framework .......................................................................................... 92 4.1 Overview ............................................................................................................................ 92 4.2 Experimentation as a Service – The Reference Framework for Experimentation ................. 92 4.2.1 Operating System Platform Layer ....................................................................................... 93 4.2.2 Emulation and Orchestration Layer .................................................................................... 93 4.2.3 Data Management Layer .................................................................................................... 94 4.2.4 Services Layer ..................................................................................................................... 95 4.2.5 Decision Layer ..................................................................................................................... 95 4.2.6 Automation, Monitoring & Visualization Tools .................................................................. 95 4.3 Datasets ............................................................................................................................. 96 4.3.1 3G/4G Cellular Network Measurement from UMASS ........................................................ 96 4.3.2 Multicast Mobile Node Movement Data from BBN ........................................................... 97 4.3.3 SYNCOIN Data ..................................................................................................................... 97 4.3.4 GeoLife Trajectories ............................................................................................................ 97 4.3.5 Mobility Patterns of San Francisco Taxi Cabs ..................................................................... 97 4.3.6 A Collection of Data Sets for Wireless/Mobile Data from CRAWDAD ................................ 97 4.4 Exploitation and Ongoing Efforts ........................................................................................ 97 Appendix A. ITA Program Metrics ..................................................................................... 98 Appendix B. Technology Transitions ............................................................................... 114 3 1. Introduction The International Technology Alliance is a ground-breaking collaborative effort across several universities, industrial research laboratories, and government researchers in the United States and the United Kingdom. This document provides an evaluation report of the activities and achievements of the alliance during year eight of the program (May 2013 – May 2014). In this introductory section, we discuss the purpose of this evaluation report, a brief overview of the alliance, and the organization of the document. 1.1 What is the Peer Review Report (PRR)? This Peer Review Report (PRR) provides a summary of the activities and achievements of the
Recommended publications
  • Practical Homomorphic Encryption and Cryptanalysis
    Practical Homomorphic Encryption and Cryptanalysis Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften (Dr. rer. nat.) an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum vorgelegt von Dipl. Ing. Matthias Minihold unter der Betreuung von Prof. Dr. Alexander May Bochum April 2019 First reviewer: Prof. Dr. Alexander May Second reviewer: Prof. Dr. Gregor Leander Date of oral examination (Defense): 3rd May 2019 Author's declaration The work presented in this thesis is the result of original research carried out by the candidate, partly in collaboration with others, whilst enrolled in and carried out in accordance with the requirements of the Department of Mathematics at Ruhr-University Bochum as a candidate for the degree of doctor rerum naturalium (Dr. rer. nat.). Except where indicated by reference in the text, the work is the candidates own work and has not been submitted for any other degree or award in any other university or educational establishment. Views expressed in this dissertation are those of the author. Place, Date Signature Chapter 1 Abstract My thesis on Practical Homomorphic Encryption and Cryptanalysis, is dedicated to efficient homomor- phic constructions, underlying primitives, and their practical security vetted by cryptanalytic methods. The wide-spread RSA cryptosystem serves as an early (partially) homomorphic example of a public- key encryption scheme, whose security reduction leads to problems believed to be have lower solution- complexity on average than nowadays fully homomorphic encryption schemes are based on. The reader goes on a journey towards designing a practical fully homomorphic encryption scheme, and one exemplary application of growing importance: privacy-preserving use of machine learning.
    [Show full text]
  • Analysis and Detection of Anomalies in Mobile Devices
    Master’s Degree in Informatics Engineering Dissertation Final Report Analysis and detection of anomalies in mobile devices António Carlos Lagarto Cabral Bastos de Lima [email protected] Supervisor: Prof. Dr. Tiago Cruz Co-Supervisor: Prof. Dr. Paulo Simões Date: September 1, 2017 Master’s Degree in Informatics Engineering Dissertation Final Report Analysis and detection of anomalies in mobile devices António Carlos Lagarto Cabral Bastos de Lima [email protected] Supervisor: Prof. Dr. Tiago Cruz Co-Supervisor: Prof. Dr. Paulo Simões Date: September 1, 2017 i Acknowledgements I strongly believe that both nature and nurture playing an equal part in shaping an in- dividual, and that in the end, it is what you do with the gift of life that determines who you are. However, in order to achieve great things motivation alone might just not cut it, and that’s where surrounding yourself with people that want to watch you succeed and better yourself comes in. It makes the trip easier and more enjoyable, and there is a plethora of people that I want to acknowledge for coming this far. First of all, I’d like to thank professor Tiago Cruz for giving me the support, motivation and resources to work on this project. The idea itself started over one of our then semi- regular morning coffee conversations and from there it developed into a full-fledged concept quickly. But this acknowledgement doesn’t start there, it dates a few years back when I first had the pleasure of having him as my teacher in one of the introductory courses.
    [Show full text]
  • Implementing Fully Homomorphic Encryption Schemes in FPGA-Based Systems
    Grado en Matemáticas e Ingeniería Informática Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros Informáticos TRABAJO DE FIN DE GRADO Implementing Fully Homomorphic Encryption Schemes in FPGA-based Systems Autor: Alejandro Ranchal Pedrosa Director: Manuel Carro Liñares MADRID, ENERO 2016 Contents 1 Summary 1 1.1Spanish.................................. 1 1.2 English ................................... 3 2 Introduction 5 3 Architecture Overview 9 3.1 Maxeler IDE and MaxJ Language .................... 14 4 Background & Related Work 19 4.1 Number Theoretic Transform ...................... 21 4.2 Polynomial Multiplication ........................ 25 4.3 Chinese Remainder Theorem ....................... 26 4.4 Modular Reduction ............................ 29 4.5 Brakerski-Gentry-Vaikuntanathan Homomorphic Encryption ..... 31 4.6 Parameter set ............................... 32 4.7 Related Work ............................... 33 5 Implementation 35 5.1 Parameter set Selection .......................... 37 5.2 BGV & Polynomial Multiplication (CPU) ............... 40 5.3 Polynomial Multiplication (FPGA) ................... 43 6 Evaluation 54 6.1 Targeted Board .............................. 54 6.2 Modular Reductions ........................... 54 6.3 Polynomial Multiplication (CPU) .................... 57 6.4 Pease’s Polynomial Multiplication (FPGA) ............... 60 6.4.1 Generic Polynomial Multiplication ............... 64 1 6.5 Cooley’s Polynomial Multiplication (FPGA) .............. 66 6.5.1 BGV (CPU vs FPGA) .....................
    [Show full text]
  • A Worldwide Survey of Encryption Products
    A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products.
    [Show full text]
  • User-Centric Security and Privacy Approaches in Untrusted Environments
    UNIVERSITY OF CALIFORNIA, IRVINE User-Centric Security and Privacy Approaches in Untrusted Environments DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Computer Science by Mamadou Hassimiou Diallo Dissertation Committee: Professor Sharad Mehrotra, Chair Professor Ardalan Amiri Sani Professor Nalini Venkatasubramanian Professor Lubomir Bic Professor Farzin Zareian 2018 Portion of Chapter 3 c 2015 IEEE Portion of Chapter 3 c 2016 Springer Portion of Chapter 4 c 2012 IEEE All other materials c 2018 Mamadou Hassimiou Diallo DEDICATION To my parents, my beloved wife Fatoumata Binta Diallo, and my three children Djienabou, Djoubairou, and Ibrahim for their patience and unfaltering support. ii TABLE OF CONTENTS Page LIST OF FIGURES vi LIST OF TABLES vii LIST OF ALGORITHMS viii ACKNOWLEDGMENTS ix CURRICULUM VITAE xi ABSTRACT OF THE DISSERTATION xiv 1 Introduction 1 1.1 Motivation . .1 1.2 Thesis Problem and Challenges . .4 1.3 Thesis Scope . .6 1.4 Thesis Contributions and Organization . .7 2 Related Work 9 2.1 Data Security and Privacy in Untrusted Cloud Systems . .9 2.2 Data Security and Privacy in Untrusted Cloud Applications (SaaS) . 10 2.3 Trust in IoT Systems and Applications . 14 3 Nomad: Managing Data Privacy in Cloud Systems (IaaS and PaaS) 17 3.1 Introduction . 17 3.2 Nomad Framework Overview . 21 3.2.1 Client Management Service . 23 3.2.2 Cloud Storage Service . 24 3.2.3 Operational Overview . 25 3.3 Homomorphic Encryption Background . 29 3.3.1 BGV Scheme . 30 3.3.2 HElib . 31 3.4 GPU-based Acceleration of BGV FHE .
    [Show full text]
  • On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries
    University of Arkansas, Fayetteville ScholarWorks@UARK Computer Science and Computer Engineering Undergraduate Honors Theses Computer Science and Computer Engineering 5-2020 On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries Alycia Carey Follow this and additional works at: https://scholarworks.uark.edu/csceuht Part of the Information Security Commons, and the Theory and Algorithms Commons Citation Carey, A. (2020). On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries. Computer Science and Computer Engineering Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/csceuht/77 This Thesis is brought to you for free and open access by the Computer Science and Computer Engineering at ScholarWorks@UARK. It has been accepted for inclusion in Computer Science and Computer Engineering Undergraduate Honors Theses by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected]. On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries An Undergraduate Honors College Thesis in the Department of Computer Science and Computer Engineering College of Engineering University of Arkansas Fayetteville, AR by Alycia N. Carey [email protected] May 9, 2020 University of Arkansas Abstract While fully homomorphic encryption (FHE) is a fairly new realm of cryptography, it has shown to be a promising mode of information protection as it allows arbitrary compu- tations on encrypted data. The development of a practical FHE scheme would enable the development of secure cloud computation over sensitive data, which is a much-needed technology in today's trend of outsourced computation and storage. The first FHE scheme was proposed by Craig Gentry in 2009, and although it was not a practical implementa- tion, his scheme laid the groundwork for many schemes that exist today.
    [Show full text]
  • Implementing Fully Homomorphic Encryption Schemes in FPGA-Based Systems
    Grado en Matemáticas e Ingeniería Informática Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros Informáticos TRABAJO DE FIN DE GRADO Implementing Fully Homomorphic Encryption Schemes in FPGA-based Systems Autor: Alejandro Ranchal Pedrosa Director: Manuel Carro Liñares MADRID, ENERO 2016 Contents 1 Summary 1 1.1 Spanish . .1 1.2 English . .3 2 Introduction 5 3 Architecture Overview 9 3.1 Maxeler IDE and MaxJ Language . 14 4 Background & Related Work 19 4.1 Number Theoretic Transform . 21 4.2 Polynomial Multiplication . 25 4.3 Chinese Remainder Theorem . 26 4.4 Modular Reduction . 29 4.5 Brakerski-Gentry-Vaikuntanathan Homomorphic Encryption . 31 4.6 Parameter set . 32 4.7 Related Work . 33 5 Implementation 35 5.1 Parameter set Selection . 37 5.2 BGV & Polynomial Multiplication (CPU) . 40 5.3 Polynomial Multiplication (FPGA) . 43 6 Evaluation 54 6.1 Targeted Board . 54 6.2 Modular Reductions . 54 6.3 Polynomial Multiplication (CPU) . 57 6.4 Pease’s Polynomial Multiplication (FPGA) . 60 6.4.1 Generic Polynomial Multiplication . 64 1 6.5 Cooley’s Polynomial Multiplication (FPGA) . 66 6.5.1 BGV (CPU vs FPGA) . 68 6.6 Comparison with Other Work . 69 7 Conclusions and Future Work 71 2 List of Figures 2.1 Client-server communication using HE and a traditional approach. .6 3.1 Circuit result of implementing algorithm 1 in a FPGA. Note the pipeline architecture allows the elements to advance in the circuit at the same cycle (tick). The diamonds represent accessing to the current position plus an offset, the squares are just the values at that point of the circuit, the circles represent operations and the upper and lower sequence of numbers represent the input and output streams, respec- tively.
    [Show full text]