YoVDO

Cryptographically Protected Database Search

Offered By: IEEE via YouTube

Tags

Database Security Courses Cryptography Courses Risk Management Courses Encryption Courses Data Protection Courses Differential Privacy Courses

Course Description

Overview

Explore the intricacies of cryptographically protected database search systems in this IEEE Symposium on Security & Privacy conference talk. Delve into the challenges of balancing security, functionality, performance, and usability in protected search systems. Examine the evolution of databases and the need for adaptable protection methods. Discover key contributions, including the identification of important primitive operations across database paradigms, evaluation of current protected search systems, analysis of potential attacks, and a roadmap for transforming protected search into protected databases. Gain insights into topics such as data value, encryption, leakage, differential privacy, and database instrumentation. Learn about the speaker's approach to systematizing knowledge in this rapidly growing field and understand the importance of accurately characterizing tradeoffs between different approaches.

Syllabus

Intro
Data has tremendous value
Data creates risk
Encryption
Cryptographically Protected Search
Why Systematize
Leakage
Example Data
Differential Privacy
Utility
Database instrumentation
Functionality
Questions


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera