Privacy and Integrity Preserving Computation in Distributed Systems

Total Page:16

File Type:pdf, Size:1020Kb

Privacy and Integrity Preserving Computation in Distributed Systems PRIVACY AND INTEGRITY PRESERVING COMPUTATION IN DISTRIBUTED SYSTEMS By Fei Chen A DISSERTATION Submitted to Michigan State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Computer Science 2011 ABSTRACT PRIVACY AND INTEGRITY PRESERVING COMPUTATION IN DISTRIBUTED SYSTEMS By Fei Chen Preserving privacy and integrity of private data has become core requirements for many distributed systems across different parties. In these systems, one party may try to compute or aggregate useful information from the private data of other parties. However, this party is not be fully trusted by other parties. Therefore, it is important to design security protocols for preserving such private data. Furthermore, one party may want to query the useful information computed from such private data. However, query results may be modified by a malicious party. Thus, it is important to design query protocols such that query result integrity can be verified. In this dissertation, we study four important privacy and integrity preserving problems for different distributed systems. For two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, we proposed SafeQ, a protocol that prevents compromised storage nodes from gaining informa- tion from both sensor collected data and sink issued queries, while it still allows storage nodes to process queries over encrypted data and the sink to detect compromised storage nodes when they misbehave. For cloud computing, where a cloud provider hosts the data of an organization and replies query results to the customers of the organization, we propose novel privacy and integrity preserving schemes for multi-dimensional range queries such that the cloud provider can process encoded queries over encoded data without knowing the actual values, and customers can verify the integrity of query results with high probability. For dis- tributed firewall policies, we proposed the first privacy-preserving protocol for cross-domain firewall policy optimization. For any two adjacent firewalls belonging to two different admin- istrative domains, our protocol can identify in each firewall the rules that can be removed because of the other firewall. For network reachability, one of the key factors for capturing end-to-end network behavior and detecting the violation of security policies, we proposed the first cross-domain privacy-preserving protocol for quantifying network reachability. ACKNOWLEDGMENTS I am extremely grateful to my advisor Dr. Alex X. Liu. He is not only an excellent advisor, an outstanding researcher, but also a great friend. This thesis would not be possible without his tremendous help. He always tries his best to guide me through every perspective of my graduate study, and give tremendous support to make me successful in both study and research. He not only teaches me how to identify problems, how to solve problems, and how to build systems, but also helps me improve my writing skills, speaking skills, and communication skills. Numerous times, he helps me set milestones together, and guides me to make progress steadily. When I meet difficult problems in my research, his encouragement help me to gain more confidence, and to come up with solutions. I would like to thank other members in my thesis committee, Dr. Eric Torng, Dr. Richard Enbody, and Dr. Hayder Radha. Dr. Torng not only guided my thesis, but also gave me great help on finding travel funds such that I can present my papers in many conferences. Dr. Enbody and Dr. Radha gave me many valuable suggestions and feedbacks on my qualifying report and comprehensive proposal, which helped improve my thesis significantly. I thank my collaborator and friend Bezawada Bruhadeshwar. He makes significant con- tributions to this thesis work. My work with him is both happy and fruitful. He actively discussed with me the works of privacy preserving firewall optimization and privacy preserv- ing network qualifications and provide significant help to move the project forward. I really thank my wife Xiaoshu Wu and my parents for her great love and tremendous support in every aspect of my life in Michigan State University. They support me to pursue my own goals with confidence and to overcome obstacles with courage. I extremely grateful for my wife taking great care of me when I had serious health problems and stayed in hospital. This thesis is dedicated to my wife and my parents. iv TABLE OF CONTENTS LIST OF TABLES ix LIST OF FIGURES x 1 Introduction 1 1.1 Privacy and Integrity Preserving Queries for SensorNetworks.................................. 2 1.2 Privacy and Integrity Preserving Queries for CloudComputing................................. 3 1.3 Privacy Preserving Optimization for Firewall Policies....................................... 4 1.4 Privacy Preserving Quantification of Network Reachability.................................... 4 1.5 Structureofthepaper .............................. 5 2 Privacy and Integrity Preserving Range Queries in Sensor Networks 7 2.1 Introduction.................................... 7 2.1.1 Motivation................................. 7 2.1.2 TechnicalChallenges ........................... 8 2.1.3 Limitations of Prior Art . 9 2.1.4 OurApproachandKeyContributions . 9 2.1.5 SummaryofExperimentalResults. 10 2.2 ModelsandProblemStatement . .. .. 10 2.2.1 SystemModel............................... 10 2.2.2 ThreatModel ............................... 12 2.2.3 ProblemStatement ............................ 13 2.3 Privacyfor1-dimensionalData . 13 2.3.1 PrefixMembershipVerification . 14 2.3.2 TheSubmissionProtocol. .. .. 16 2.3.3 TheQueryProtocol ........................... 17 2.3.4 QueryProcessing ............................. 18 2.4 Integrityfor1-dimensionalData . .. 19 2.4.1 Integrity Scheme Using Merkle Hash Trees . 20 2.4.2 Integrity Scheme Using Neighborhood Chains . 23 2.5 Queries over Multi-dimensional Data . 24 2.5.1 Privacy for Multi-dimensional Data . 25 2.5.2 Integrity for Multi-dimensional Data . 26 v 2.6 SafeQOptimization................................ 29 2.7 QueriesinEvent-drivenNetworks . 32 2.8 Complexity and Security Analysis . 34 2.8.1 Complexity Analysis . 34 2.8.2 PrivacyAnalysis ............................. 35 2.8.3 IntegrityAnalysis............................. 36 2.9 ExperimentalResults............................... 36 2.9.1 EvaluationMethodology . .. .. 36 2.9.2 EvaluationSetup ............................. 37 2.9.3 EvaluationResults ............................ 38 3 Privacy and Integrity Preserving Range Queries for Cloud Computing 47 3.1 Introduction.................................... 47 3.1.1 Motivation................................. 47 3.1.2 TechnicalChallenges ........................... 48 3.1.3 Limitations of Previous Work . 49 3.1.4 OurApproach............................... 49 3.1.5 KeyContributions ............................ 50 3.1.6 SummaryofExperimentalResults. 50 3.2 ModelsandProblemStatement . .. .. 51 3.2.1 SystemModel............................... 51 3.2.2 ThreatModel ............................... 51 3.2.3 ProblemStatement ............................ 52 3.3 Privacy Preserving for 1-dimensional Data . ... 52 3.3.1 The Order-Preserving Hash-based Function . 54 3.3.2 The Privacy-Preserving Scheme . 56 3.3.3 Optimization of the Order-Preserving Hash-based Function . .... 57 3.3.4 Analysis of Information Leakage . 58 3.4 Integrity Preserving for 1-dimensional Data . .... 59 3.4.1 Bit Matrices and Local Bit Matrices . 61 3.4.2 The Integrity-Preserving Scheme . 62 3.5 FindingOptimalParameters........................... 64 3.5.1 Detection Probability . 65 3.5.2 OptimalBucketPartition ........................ 66 3.6 Query Over Multi-dimensional Data . 68 3.6.1 Privacy for Multi-dimensional Data . 68 3.6.2 Integrity for Multi-dimensional Data . 69 3.7 Evaluation..................................... 72 3.7.1 EvaluationSetup ............................. 72 vi 3.7.2 Resultsfor1-dimensionalData . 73 3.7.3 Results for Multi-dimensional Data . 75 4 Privacy Preserving Cross-Domain Cooperative Firewall Optimization 78 4.1 Introduction.................................... 78 4.1.1 BackgroundandMotivation . 78 4.1.2 Limitation of Prior Work . 79 4.1.3 Cross-domain Inter-firewall Optimization . 80 4.1.4 Technical Challenges and Our Approach . 81 4.1.5 KeyContributions ............................ 82 4.2 SystemandThreatModels............................ 83 4.2.1 SystemModel............................... 83 4.2.2 ThreatModel ............................... 84 4.3 Privacy-Preserving Inter-Firewall Redundancy Removal . ........ 84 4.3.1 Privacy-Preserving Range Comparison . 85 4.3.2 Processing Firewall F W1 ......................... 87 4.3.3 Processing Firewall F W2 ......................... 90 4.3.4 Single-Rule Coverage Redundancy Detection . 93 4.3.5 Multi-Rule Coverage Redundancy Detection . 95 4.3.6 Identification and Removal of Redundant Rules . 98 4.4 Firewall Update After Optimization . 100 4.5 Security and Complexity Analysis . 100 4.5.1 SecurityAnalysis ............................. 100 4.5.2 Complexity Analysis . 102 4.6 ExperimentalResults............................... 103 4.6.1 EvaluationSetup ............................. 103 4.6.2 Methodology ............................... 104 4.6.3 Effectiveness and Efficiency on Real Policies . 105 4.6.4 Efficiency on Synthetic Policies . 111 5 Privacy Preserving Cross-Domain Network Reachability Quantification 113 5.1 Introduction.................................... 113
Recommended publications
  • Diamondoid Mechanosynthesis Prepared for the International Technology Roadmap for Productive Nanosystems
    IMM White Paper Scanning Probe Diamondoid Mechanosynthesis Prepared for the International Technology Roadmap for Productive Nanosystems 1 August 2007 D.R. Forrest, R. A. Freitas, N. Jacobstein One proposed pathway to atomically precise manufacturing is scanning probe diamondoid mechanosynthesis (DMS): employing scanning probe technology for positional control in combination with novel reactive tips to fabricate atomically-precise diamondoid components under positional control. This pathway has its roots in the 1986 book Engines of Creation, in which the manufacture of diamondoid parts was proposed as a long-term objective by Drexler [1], and in the 1989 demonstration by Donald Eigler at IBM that individual atoms could be manipulated by a scanning tunelling microscope [2]. The proposed DMS-based pathway would skip the intermediate enabling technologies proposed by Drexler [1a, 1b, 1c] (these begin with polymeric structures and solution-phase synthesis) and would instead move toward advanced DMS in a more direct way. Although DMS has not yet been realized experimentally, there is a strong base of experimental results and theory that indicate it can be achieved in the near term. • Scanning probe positional assembly with single atoms has been successfully demonstrated in by different research groups for Fe and CO on Ag, Si on Si, and H on Si and CNHCH3. • Theoretical treatments of tip reactions show that carbon dimers1 can be transferred to diamond surfaces with high fidelity. • A study on tip design showed that many variations on a design turn out to be suitable for accurate carbon dimer placement. Therefore, efforts can be focused on the variations of tooltips of many kinds that are easier to synthesize.
    [Show full text]
  • Nanorobot Construction Crews
    Nanorobot Construction Crews Jaeseung Jeong, Ph.D Department of Bio and Brain engineering, KAIST Nanorobotics • Nanorobotics is the technology of creating machines or robots atltthit or close to the microscopi c scal lfe of a nanomet res (10-9 metres). More specifically, nanorobotics refers to the still largely ‘hypothetical’ nanotechnology engineering discipline of designing and building nanorobots. • Nanorobots ((,,nanobots, nanoids, nanites or nanonites ) would be typically devices ranging in size from 0.1-10 micrometers and constructed of nanoscale or molecular components. As no artificial non-biological nanorobots have yet been created, they remain a ‘hypothetical’ concept. • Another definition sometimes used is a robot which allows precision interactions with nanoscale objects , or can manipulate with nanoscale resolution. • Followingggpp this definition even a large apparatus such as an atomic force microscope can be considered a nanorobotic instrument when configured to perform nanomanipulation. • Also, macroscalble robots or mi crorob ots which can move wi th nanoscale precision can also be considered nanorobots. The T-1000 in Terminator 2: Judggyment Day • Since nanorobots would be microscopic in size , it would probably be necessary for very large numbers of them to work together to perform microscopic and macroscopic tasks. • These nanorobot swarms are fdifound in many sci ence fi fitiction stories, such as The T-1000 in Terminator 2: Judgment Day, nanomachine i n Meta l G ear So lid. • The word "nanobot" (also "nanite",,g, "nanogene", or "nanoant") is often used to indicate this fictional context and is a n info rma l o r eve n pejo rat ive term to refer to the engineering concept of nanorobots.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • The Molecular Epair of the Rain, Part II by Ralph Merkle, Ph.D
    THIS ISSUE'S FEATURE: The Molecular epair of the rain, Part II By Ralph Merkle, Ph.D. Michael Perry, Ph.D. introduces us to "The Realities of Patient Storage" in this issue's For the Record lUS: Book Reviews, Relocation Reports, and Cryonics Fiction by Linda Dunn and Richard Shock ISSN 1054-4305 $4.50 "What is Cryonics?" Cryonics is the ultra-low-temperature preservation (biostasis) of terminal patients. The goal of biostasis and the technology of cryonics is the transport of today's terminal patients to a time in the future when cell and tissue repair technology will be available, and restoration to full function and health will be possible, a time when cures will exist for virtually all of today's diseases, including aging. As human knowledge and medical technology continue to expand in scope, people considered beyond hope of restoration (by today's medical standards) will be restored to health. (This historical trend is very clear.) The coming control over living systems should allow fabrication of new organisms and sub-cell-sized devices for repair and revival of patients waiting in cryonic suspension. The challenge for cryonicists today is to devise techniques that will ensure the patients' survival. Subscribe to CRY 0 ICS Magazine! CRYONICS magazine explores the practical, research, nanotechnology and molecular scientific, and social aspects of ultra­ engineering, book reviews, the physical low temperature pre­ format of memory and personality, the servation of humans. nature of identity, cryonics history, and As the quarterly much more. ·s FEAfURE' • .r h< • • f h THISISSUE oena\f'JI pu bl 1cat1on o t e •Ao\ecu\ar"' ~"h~>~'"''·~··o· C r If you're a first- The IV\ Bg Ra~1 RYfl'J\ Alcor Foundation-the THIS issuE's • ~L vJcs time subscriber, you p\1.\l.
    [Show full text]
  • Molecular Nanotechnology - Wikipedia, the Free Encyclopedia
    Molecular nanotechnology - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Molecular_manufacturing Molecular nanotechnology From Wikipedia, the free encyclopedia (Redirected from Molecular manufacturing) Part of the article series on Molecular nanotechnology (MNT) is the concept of Nanotechnology topics Molecular Nanotechnology engineering functional mechanical systems at the History · Implications Applications · Organizations molecular scale.[1] An equivalent definition would be Molecular assembler Popular culture · List of topics "machines at the molecular scale designed and built Mechanosynthesis Subfields and related fields atom-by-atom". This is distinct from nanoscale Nanorobotics Nanomedicine materials. Based on Richard Feynman's vision of Molecular self-assembly Grey goo miniature factories using nanomachines to build Molecular electronics K. Eric Drexler complex products (including additional Scanning probe microscopy Engines of Creation Nanolithography nanomachines), this advanced form of See also: Nanotechnology Molecular nanotechnology [2] nanotechnology (or molecular manufacturing ) Nanomaterials would make use of positionally-controlled Nanomaterials · Fullerene mechanosynthesis guided by molecular machine systems. MNT would involve combining Carbon nanotubes physical principles demonstrated by chemistry, other nanotechnologies, and the molecular Nanotube membranes machinery Fullerene chemistry Applications · Popular culture Timeline · Carbon allotropes Nanoparticles · Quantum dots Colloidal gold · Colloidal
    [Show full text]
  • Practical Forward Secure Signatures Using Minimal Security Assumptions
    Practical Forward Secure Signatures using Minimal Security Assumptions Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor rerum naturalium (Dr. rer. nat.) von Dipl.-Inform. Andreas H¨ulsing geboren in Karlsruhe. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Tanja Lange Tag der Einreichung: 07. August 2013 Tag der m¨undlichen Pr¨ufung: 23. September 2013 Hochschulkennziffer: D 17 Darmstadt 2013 List of Publications [1] Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas H¨ulsing,and Markus R¨uckert. On the security of the Winternitz one-time signature scheme. In A. Ni- taj and D. Pointcheval, editors, Africacrypt 2011, volume 6737 of Lecture Notes in Computer Science, pages 363{378. Springer Berlin / Heidelberg, 2011. Cited on page 17. [2] Johannes Buchmann, Erik Dahmen, and Andreas H¨ulsing.XMSS - a practical forward secure signature scheme based on minimal security assumptions. In Bo- Yin Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture Notes in Computer Science, pages 117{129. Springer Berlin / Heidelberg, 2011. Cited on pages 41, 73, and 81. [3] Andreas H¨ulsing,Albrecht Petzoldt, Michael Schneider, and Sidi Mohamed El Yousfi Alaoui. Postquantum Signaturverfahren Heute. In Ulrich Waldmann, editor, 22. SIT-Smartcard Workshop 2012, IHK Darmstadt, Feb 2012. Fraun- hofer Verlag Stuttgart. [4] Andreas H¨ulsing,Christoph Busold, and Johannes Buchmann. Forward secure signatures on smart cards. In Lars R. Knudsen and Huapeng Wu, editors, Se- lected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, pages 66{80. Springer Berlin Heidelberg, 2013. Cited on pages 63, 73, and 81. [5] Johannes Braun, Andreas H¨ulsing,Alex Wiesmaier, Martin A.G.
    [Show full text]
  • Whitfield Diffie Interview; 2011-03-25
    Whitfield Diffie Interview Interviewer: Jon Plutte Recorded: March 28, 2011 Mountain View, California CHM Reference number: X6075.2011 © 2011 Computer History Museum Whitfield Diffie Interview Jon Plutte: So what is public-key cryptography? Public-key cryptography, I can't even say, but I'm sure you can say it. And whenever you're ready to roll. Whitfield Diffie: Okay. Plutte: Okay. Diffie: You're rolling, so I have my opening statement, this interview is given in terms of Copyleft. If you're hearing it and seeing it, you're entitled to record it. If you have a recording, you're entitled to redistribute it under the same terms. Plutte: Okay, thank you. Today it is March 28, 2011. This is John Plutte interviewing Whit Diffie at the Computer History Museum for the Fellow Awards. Thank you for joining us. Diffie: So now we have a technicality. You asked if I liked to be called Whit, that's fine, but I like [it] to be written as "Whitfield." Plutte: My words will never be on camera. Diffie: I understand that, but you may have influence over copy or something. Plutte: Okay, all right. That's great, okay, so we'll make sure that that gets done, and I'm pretty sure that that is the way it is written out in the paper here. I'm going to start off with some basic questions for us people who aren't that familiar with the field, and the first one is, what is cryptography? Diffie: Cryptography is any technique for transforming information from a usable, comprehensible form into a scrambled, useless form from which it can only be recovered by people who know what are called "secret keys." Plutte: How did you get interested in cryptography? I understand this is a long story.
    [Show full text]
  • IACR Fellows Ceremony Crypto 2010
    IACR Fellows Ceremony Crypto 2010 www.iacr.org IACR Fellows Program (°2002): recognize outstanding IACR members for technical and professional contributions that: Advance the science, technology, and practice of cryptology and related fields; Promote the free exchange of ideas and information about cryptology and related fields; Develop and maintain the professional skill and integrity of individuals in the cryptologic community; Advance the standing of the cryptologic community in the wider scientific and technical world and promote fruitful relationships between the IACR and other scientific and technical organizations. IACR Fellows Selection Committee (2010) Hugo Krawczyk (IBM Research) Ueli Maurer (IBM Zurich) Tatsuaki Okamoto (NTT research), chair Ron Rivest (MIT) Moti Yung (Google Inc and Columbia University) Current IACR Fellows Tom Berson Ueli Maurer G. Robert Jr. Blakley Kevin McCurley Gilles Brassard Ralph Merkle David Chaum Silvio Micali Don Coppersmith Moni Naor Whitfield Diffie Michael O. Rabin Oded Goldreich Ron Rivest Shafi Goldwasser Martin Hellman Adi Shamir Hideki Imai Gustavus (Gus) Simmons Arjen K. Lenstra Jacques Stern James L. Massey New IACR Fellows in 2010 Andrew Clark Ivan Damgård Yvo Desmedt Jean-Jacques Quisquater Andrew Yao Ivan Damgard IACR Fellow, 2010 For fundamental contributions to cryptography, for sustained educational leadership in cryptography, and for service to the IACR. Jean-Jacques Quisquater IACR Fellow, 2010 For basic contributions to cryptographic hardware and to cryptologic education and for
    [Show full text]
  • Oral History Interview with Martin Hellman
    An Interview with MARTIN HELLMAN OH 375 Conducted by Jeffrey R. Yost on 22 November 2004 Palo Alto, California Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright 2004, Charles Babbage Institute Martin Hellman Interview 22 November 2004 Oral History 375 Abstract Leading cryptography scholar Martin Hellman begins by discussing his developing interest in cryptography, factors underlying his decision to do academic research in this area, and the circumstances and fundamental insights of his invention of public key cryptography with collaborators Whitfield Diffie and Ralph Merkle at Stanford University in the mid-1970s. He also relates his subsequent work in cryptography with Steve Pohlig (the Pohlig-Hellman system) and others. Hellman addresses his involvement with and the broader context of the debate about the federal government’s cryptography policy—regarding to the National Security Agency’s (NSA) early efforts to contain and discourage academic work in the field, the Department of Commerce’s encryption export restrictions (under the International Traffic of Arms Regulation, or ITAR), and key escrow (the so-called Clipper chip). He also touches on the commercialization of cryptography with RSA Data Security and VeriSign, as well as indicates some important individuals in academe and industry who have not received proper credit for their accomplishments in the field of cryptography. 1 TAPE 1 (Side A) Yost: My name is Jeffrey Yost. I am from the Charles Babbage Institute and am here today with Martin Hellman in his home in Stanford, California. It’s November 22nd 2004. Yost: Martin could you begin by giving a brief biographical background of yourself—of where you were born and where you grew up? Hellman: I was born October 2nd 1945 in New York City.
    [Show full text]
  • Metadata of the Chapter That Will Be Visualized Online
    Metadata of the chapter that will be visualized online Chapter Title Diamondoid Mechanosynthesis for Tip-Based Nanofabrication Chapter Sub-Title Chapter CopyRight - Year Springer Science+Business Media, LLC 2011 (This will be the copyright line in the final PDF) Book Name Tip-Based Nanofabrication Corresponding Author Family Name Freitas Particle Given Name Robert A. Suffix Jr Division Organization Institute for Molecular Manufacturing Address Palo Alto, CA, 94301, USA Email [email protected] Abstract Diamond mechanosynthesis (DMS), or molecular positional fabrication, is the formation of covalent chemical bonds using precisely applied mechanical forces to build nanoscale diamondoid structures via manipulation of positionally controlled tooltips, most likely in a UHV working environment. DMS may be automated via computer control, enabling programmable molecular positional fabrication. The Nanofactory Collaboration is coordinating a combined experimental and theoretical effort involving direct collaborations among dozens of researchers at institutions in multiple countries to explore the feasibility of positionally controlled mechanosynthesis of diamondoid structures using simple molecular feedstocks, the first step along a direct pathway to developing working nanofactories. Keywords (separated by '-') Carbon placement - Diamond - Diamondoid - DMS - Hydrogen abstraction - Hydrogen donation - Mechanosynthesis - Minimal toolset - Molecular manufacturing - Nanofactory - Nanofactory Collaboration - Nanopart - Positional assembly - Positional fabrication - tooltips SPB-217859 Chapter ID 11 April 11, 2011 Time: 04:18pm Proof 1 01 Chapter 11 02 Diamondoid Mechanosynthesis for Tip-Based 03 04 Nanofabrication 05 06 07 Robert A. Freitas Jr. 08 09 10 Abstract Diamond mechanosynthesis (DMS), or molecular positional fabrication, 11 is the formation of covalent chemical bonds using precisely applied mechanical 12 forces to build nanoscale diamondoid structures via manipulation of positionally 13 controlled tooltips, most likely in a UHV working environment.
    [Show full text]
  • Some Limits to Global Ecophagy by Biovorous Nanoreplicators, With
    make no preparation. We have trouble enough controlling viruses and Some Limits to Global Ecophagy fruit flies. by Biovorous Nanoreplicators, with Among the cognoscenti of nanotechnology, this threat has become known as the "gray goo problem." Though masses of uncontrolled Public Policy Recommendations replicators need not be gray or gooey, the term "gray goo" emphasizes that replicators able to obliterate life might be less inspiring than a single species of crabgrass. They might be superior in an evolutionary Robert A. Freitas Jr. sense, but this need not make them valuable. Research Scientist, Zyvex LLC , 1321 North Plano Road, The gray goo threat makes one thing perfectly clear: We cannot afford Richardson, TX 75081 © April 2000 Robert A. Freitas Jr. certain kinds of accidents with replicating assemblers. http://www.foresight.org/nano/Ecophagy.html Gray goo would surely be a depressing ending to our human adventure on Earth, far worse than mere fire or ice, and one that could Abstract stem from a simple laboratory accident. The maximum rate of global ecophagy by biovorous self- Lederberg [ 3] notes that the microbial world is evolving at a replicating nanorobots is fundamentally restricted by the fast pace, and suggests that our survival may depend upon replicative strategy employed; by the maximum dispersal embracing a "more microbial point of view." The emergence velocity of mobile replicators; by operational energy and of new infectious agents such as HIV and Ebola demonstrates chemical element requirements; by the homeostatic resistance that we have as yet little knowledge of how natural or of biological ecologies to ecophagy; by ecophagic thermal technological disruptions to the environment might trigger pollution limits (ETPL); and most importantly by our mutations in known organisms or unknown extant organisms determination and readiness to stop them.
    [Show full text]
  • Nanotechnology and Regulatory Policy: Three Futures
    Harvard Journal of Law & Technology Volume 17, Number 1 Fall 2003 NANOTECHNOLOGY AND REGULATORY POLICY: THREE FUTURES Glenn Harlan Reynolds* TABLE OF CONTENTS I. INTRODUCTION..............................................................................180 II. A BEGINNER’S GUIDE TO NANOTECHNOLOGY ............................181 A. How Nanotechnology Works....................................................181 B. What Nanotechnology Can Do.................................................185 III. REGULATORY RESPONSES ..........................................................187 A. “Relinquishment” and Prohibition ..........................................188 1. The Case for Prohibition: Children of Our Minds.................188 2. Problems with Turning a Blind Eye ......................................190 B. Restriction to the Military Sphere ............................................193 1. The Case for “Painting It Black”...........................................193 2. Problems with Military Classification...................................194 C. Modest Regulation and Robust Civilian Research...................197 1. Early Biotechnology Regulation ...........................................198 2. Evaluating the Biotechnology Model....................................199 IV. LESSONS FOR NANOTECHNOLOGY .............................................200 A. Research...................................................................................201 B. Beyond the Lab.........................................................................202
    [Show full text]