{"657507":{"#nid":"657507","#data":{"type":"news","title":"Award Recognizes Professor\u2019s Pioneering Contributions to Encryption for Cloud Computing","body":[{"value":"\u003Cp\u003EResearch in securing cloud storage conducted by a Georgia Tech professor continues to gain recognition 15-years after publication and will receive\u0026nbsp;the International Association for Cryptologic Research (IACR) Test-of-Time Award later this year.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ESasha Boldyreva\u0026rsquo;s\u0026nbsp;\u003C\/strong\u003Epaper that her former Ph.D. student,\u0026nbsp;\u003Cstrong\u003EAdam O\u0026rsquo;Neill\u003C\/strong\u003E, presented at the Crypto 2007 conference has been cited over 1,000 times according to Google Scholar and is one of the first papers to formally study the security of efficiently searchable encryptions for cloud storage.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EWhen Boldyreva first came to Georgia Tech she talked to database researchers and learned about the problems they had securing remote servers. Specifically, faculty were not able to search and retrieve encrypted data while also being able to maintain security.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;You want to keep your data secure, but also need to be able to retrieve it,\u0026rdquo; Boldyreva said. \u0026ldquo;I was constantly getting asked if there was a way to make searchable encryption more efficient.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe standard method of encryption randomizes data to maintain security. However, database researchers found when they retrieved information from a remote server it was often scrambled in a way that couldn\u0026rsquo;t be deciphered.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETo work around this, database faculty used deterministic encryption as a limited solution to search and retrieve parts of remote data without losing any information in the process. This made the process easier, but much less secure. In fact, because the coded text is always the same for a given plain text message, studying the application of deterministic encryption was ignored by cryptographers at the time due to its weak security.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;What is a good deterministic scheme? No one really knew,\u0026rdquo; Boldyreva said. \u0026ldquo;My Ph.D. student, my former Ph.D. advisor, and I decided to study the bigger problem of efficient searchable encryption.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe team began by formally defined the term \u0026ldquo;efficiently searchable encryption\u0026rdquo; and proposing specific cryptographic schemes to make deterministic encryption more secure. While the team\u0026rsquo;s results showed deterministic encryption still posed security risks, Boldyreva said the goal was to define a starting point and allow academics to build from there.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;This has become a very hot topic in cryptography,\u0026rdquo; she said. \u0026ldquo;Researchers today are targeting searchable encryption with much stronger security guarantees, but they still view our paper as a starting point.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESince the paper published in 2007, Boldyreva has continued working on searchable encryption. She recently built one of the most secure searchable encryption schemes to date with the help of her current Ph.D. students.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;This has remained my favorite area of cryptography,\u0026rdquo; she said. \u0026ldquo;It is nice to receive recognition for the challenging work we put into our research.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe award will be presented at\u0026nbsp;the Crypto 2022 conference in August. This is Boldyreva\u0026rsquo;s second test of time award. \u0026nbsp;She was also recognized in 2020 by the International Conference on Practice and Theory in Public Key Cryptography (PKC) for her work on new multi-user digital signatures in 2003.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-74143-5_30\u0022\u003E\u003Cem\u003EDeterministic and Efficiently Searchable Encryption\u003C\/em\u003E\u003C\/a\u003E\u0026nbsp;was written by Boldyreva, who currently serves as the associate chair of graduate studies at the School of Cybersecurity and Privacy, O\u0026#39;Neill, and\u0026nbsp;\u003Cstrong\u003EMihir Bellare\u003C\/strong\u003E, her former faculty advisor.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Research in securing cloud storage conducted by a Georgia Tech professor continues to gain recognition 15-years after publication and will receive a test of time award from the International Association for Cryptologic Research (IACR) later this year."}],"uid":"36253","created_gmt":"2022-04-22 14:13:33","changed_gmt":"2022-04-26 14:26:20","author":"jpopham3","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2022-04-21T00:00:00-04:00","iso_date":"2022-04-21T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39431","name":"Data Engineering and Science"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Cstrong\u003EJP Popham\u0026nbsp;\u003C\/strong\u003E\u003Cbr \/\u003E\r\nCommunications Officer | School of Cybersecurity and Privacy\u003Cbr \/\u003E\r\nGeorgia Institute of Technology\u003Cbr \/\u003E\r\n\u003Ca href=\u0022mailto:jpopham3@gatech.edu\u0022 style=\u0022color: blue; text-decoration: underline;\u0022 target=\u0022_blank\u0022 title=\u0022mailto:jpopham3@gatech.edu\u0022\u003Ejpopham3@gatech.edu\u003C\/a\u003E\u0026nbsp;| scp.cc.gatech.edu\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}