Cryptography, Security and Data Protection for Big Data in the Cloud
Big Data is rapidly becoming accepted as the future platform for data analytics and business intelligence. The natural home for Big Data is the Cloud, which delivers scalability, elasticity, and flexibility, without the overhead of on-premise infrastructure. But the largest barrier to adoption is security of both the platform and the Cloud.
ZeroDB’s solution DASHR (Delegated Access System for Hadoop based on Re-encryption) enables enterprises to securely move on-premise Hadoop clusters to the Cloud while keeping encryption keys on-premise, as well as enhances the security of existing on-premise deployments, without suffering encryption zone downtime associated with key rotation. DASHR is built on peer-reviewed, proven encryption algorithms, guaranteeing best-in-class data protection.
The role of NICS Lab is to provide our expertise in applied cryptography, in particular with respect to proxy re-encryption algorithms , and in architectures of Big Data frameworks .
- D. Nuñez, I. Agudo, and J. Lopez, “A Parametric Family of Attack Models for Proxy Re-Encryption“,
28th IEEE Computer Security Foundations Symposium, IEEE Computer Society, pp. 290-301, 07/2015. DOI
- D. Nuñez, I. Agudo, and J. Lopez, “NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU“,
10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), pp. 179-189, 04/2015. DOI
- D. Nuñez, I. Agudo, and J. Lopez, “On the Application of Generic CCA-Secure Transformations to Proxy Re-Encryption“,
Security and Communication Networks, vol. 9, issue 12, Wiley, pp. 1769-1785, 08/2016. DOI (I.F.: 1.067)
- D. Nuñez, I. Agudo, and J. Lopez, “Delegated Access for Hadoop Clusters in the Cloud“,
IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2014), IEEE, pp. 374-379, 12/2014. DOI