Restructuring the NSA Metadata Program

被引:9
|
作者
Kamara, Seny [1 ]
机构
[1] Microsoft Res, Seattle, WA 98195 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014 | 2014年 / 8438卷
关键词
ENCRYPTION;
D O I
10.1007/978-3-662-44774-1_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the Summer of 2013, it was revealed through the documents leaked by Edward Snowden that the NSA was collecting the metadata of every US-to-foreign, foreign-to-US and US-to-US call from the largest US telephone providers. This led to public outcry and to President Obama calling for the restructuring of this program. The options initially considered included keeping the data at the providers, entrusting the data to a private entity, entrusting the data to a non-NSA government agency or ending the program all-together. In this work, we show how cryptography can be used to design a privacy-preserving alternative to the NSA metadata program. We present a protocol based on structured encryption, in particular on graph encryption, and secure function evaluation that provides the following guarantees: (1) providers learn no information about NSA queries; (2) NSA queries can only be executed if validated by a given certification process; (3) the NSA learns nothing about the data beyond what can be inferred from the query results. In addition, these properties are achieved whether the data is stored at the providers, the NSA or on a third-party cloud.
引用
收藏
页码:235 / 247
页数:13
相关论文
共 30 条
  • [1] GVFS metadata: Shellbags for Linux
    Lees, Christopher John
    DIGITAL INVESTIGATION, 2016, 16 : 12 - 18
  • [2] Preparations for encrypted XML metadata querying
    Feng, L
    Jonker, W
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 163 - 171
  • [3] Efficient processing of secured XML metadata
    Feng, L
    Jonker, W
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 704 - 717
  • [4] Coordinated Metadata Management for Secure Persistent Memory
    Wei X.
    Yang M.
    Feng D.
    Liu J.
    Wu B.
    Xiao R.
    Tong W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (11): : 2437 - 2450
  • [5] An efficient Stego-OptDehaz algorithm for image dehazing and metadata concealment
    El-Hoseny, Heba M.
    Farahat, Mohammed A.
    El-Hag, Noha A.
    JOURNAL OF OPTICS-INDIA, 2024, 53 (03): : 2441 - 2451
  • [6] PSSM: Achieving Secure Memory for GPUs with Partitioned and Sectored Security Metadata
    Yuan, Shougang
    Yan Solihin
    Zhou, Huiyang
    PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, ICS 2021, 2021, : 139 - 151
  • [7] MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata
    Chowdhuryy, Md Hafizul Islam
    Zheng, Hao
    Yao, Fan
    2024 ACM/IEEE 51ST ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, ISCA 2024, 2024, : 693 - 707
  • [8] Addra: Metadata-private voice communication over fully untrusted infrastructure
    Ahmad, Ishtiyaque
    Yang, Yuntian
    Agrawal, Divyakant
    El Abbadi, Amr
    Gupta, Trinabh
    PROCEEDINGS OF THE 15TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '21), 2021, : 313 - 329
  • [9] SecNVM: An Efficient and Write-Friendly Metadata Crash Consistency Scheme for Secure NVM
    Lei, Mengya
    Li, Fan
    Wang, Fang
    Feng, Dan
    Zou, Xiaomin
    Xiao, Renzhi
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2022, 19 (01)
  • [10] Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata
    Wang, Jiabei
    Zhang, Rui
    Li, Jianhao
    Xiao, Yuting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2746 - 2760