Restructuring the NSA Metadata Program

被引:9
|
作者
Kamara, Seny [1 ]
机构
[1] Microsoft Res, Seattle, WA 98195 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014 | 2014年 / 8438卷
关键词
ENCRYPTION;
D O I
10.1007/978-3-662-44774-1_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the Summer of 2013, it was revealed through the documents leaked by Edward Snowden that the NSA was collecting the metadata of every US-to-foreign, foreign-to-US and US-to-US call from the largest US telephone providers. This led to public outcry and to President Obama calling for the restructuring of this program. The options initially considered included keeping the data at the providers, entrusting the data to a private entity, entrusting the data to a non-NSA government agency or ending the program all-together. In this work, we show how cryptography can be used to design a privacy-preserving alternative to the NSA metadata program. We present a protocol based on structured encryption, in particular on graph encryption, and secure function evaluation that provides the following guarantees: (1) providers learn no information about NSA queries; (2) NSA queries can only be executed if validated by a given certification process; (3) the NSA learns nothing about the data beyond what can be inferred from the query results. In addition, these properties are achieved whether the data is stored at the providers, the NSA or on a third-party cloud.
引用
收藏
页码:235 / 247
页数:13
相关论文
共 30 条
  • [21] STEAM Education Program: Small Organisms Creating Energy
    Park, Soonwoo
    Park, Namje
    MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 473 - 478
  • [22] The design and implementation of an application program interface for securing XML documents
    Chang, Tao-Ku
    Hwang, Gwan-Hwan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (08) : 1362 - 1374
  • [23] A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    Seitzer, Maximilian
    Gruhn, Michael
    Mueller, Tilo
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 376 - 395
  • [24] Dynamic Encryption Lock Used for Matching Random Signals by Algorithm Program
    Liu, Yu
    ADVANCES IN APPLIED SCIENCE AND INDUSTRIAL TECHNOLOGY, PTS 1 AND 2, 2013, 798-799 : 745 - 748
  • [25] Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
    Jaeger, Joseph
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 101 - 131
  • [26] Provably secure data hiding and tamper resistance for a simple loop program
    Bazzi, RA
    Candan, KS
    Badin, R
    Fajri, A
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II, 2003, 5071 : 517 - 527
  • [27] Program Development of Science and Culture Education Tapping into Jeju's Special Characteristics for Adults
    Kim, Gyujung
    Park, Namje
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 133 - 138
  • [28] AP-EH: An Encryption Hopping Method Based on Action Program Enabled SDN
    Zhao, Zheng
    Fan, Xiaoya
    Mao, Qian
    Xue, Haixiao
    Zhao, Qi
    IEEE ACCESS, 2024, 12 : 148868 - 148879
  • [29] Using the Non-Linear Generator to Calculate the Randomness Test for Frequency Property And use it to encrypt and decrypt message by using the Matlab program
    Hamoud, Ibrahim Abdul Rasool
    Alshamri, Ayad Ghazi Naser
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (05): : 319 - 329
  • [30] Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance
    Pattanavichai, Santi
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (03) : 475 - 481