SFB CROSSING - Our research on Privacy-Aware Distributed Computation
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 14 | |
Author | ||
License | CC Attribution 3.0 Germany: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48696 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Software engineeringQuantumAreaPhysical systemJSONXML
00:10
Information privacyContext awarenessPoint cloudPower (physics)NeuroinformatikProcess (computing)Projective planeComputer simulationComputer animation
00:25
Information privacyDistribution (mathematics)ResultantNeuroinformatikInternet der DingeSource codeDomain nameRight angleFlow separationPoint cloudMobile WebClient (computing)Mathematical optimizationProjective planeInformationInformation privacy
01:47
ResultantQuery languageDifferent (Kate Ryan album)ComputerProjective planeInclusion mapOrder (biology)NeuroinformatikPhysical systemInformation securitySensitivity analysisExecution unitProcess (computing)AuthorizationComputer animation
02:32
Information privacyType theoryLatent heatFormal languageCategory of beingMechanism designInformation securityPhysical systemServer (computing)NeuroinformatikComputer
03:11
WebsiteComputer animation
Transcript: English(auto-generated)
00:03
Crossing is a joint effort of scientists from quantum physics, cryptography, system security, and software engineering who collaborate in three interconnected project areas. In Project E5, we're doing research on privacy-aware distributed computation.
00:23
Edge computing models take advantage of the processing power of decentralized cloud infrastructures, such as geo-distributed data centers, as well as smaller devices such as mobiles and IoT devices. Edge computing enables the distribution of data processing, which maximizes efficiency, optimizes resource
00:46
usage, improves cost-effectiveness, and achieves the latency requirements that IoT applications require. However, in such a setting, data and computations may be transferred and processed in variable, potentially untrusted domains which compromise their security.
01:06
The result is either lack of privacy or significant inefficiency, as the privacy-performance trade-off is not considered during deployment. This is where Project E5 will advance the design of edge computing systems.
01:23
More specifically, we focus on scenarios where a client wants to query and aggregate data from several data sources located on separate hosts that may contain sensitive information. The client relies on distributed computation resources, including cloud nodes and other edge devices,
01:42
which may or may not have the rights to access all such data sources. To enable secure and efficient processing of sensitive data, the main goal of Project E5 is to design an edge computing system that automatically distributes subcomputations, such as query language operators, among processing units
02:03
of the system in order to optimize performance, while also protecting the processed data from unauthorized access. For data protection, we will consider various cryptography-based techniques in conjunction with privacy-aware placement of data and computations on processing units.
02:22
This will also include research results on privacy-preserving computations achieved in other crossing projects like E4 and S6. As privacy-preserving techniques come with different performance security trade-offs, we will model their properties and make the mechanisms interoperable, composable, and uniformly accessible.
02:44
To be able to label data with privacy requirements, we will design a specification language and a type system and will develop methods to formally reason about the specification language and the security properties it enforces via cryptographic methods. We will also develop an engine that automatically determines how to distribute encrypted data and computations among trusted and untrusted servers.
03:11
With our research, we aim to design edge computing systems that are not only capable of meeting the challenges of an interconnected world, but also enable security by design.
03:22
To learn more about privacy-aware distributed computation, please visit our website.