{"id":284159,"date":"2016-03-03T16:09:14","date_gmt":"2016-03-04T00:09:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=284159"},"modified":"2016-08-26T16:10:36","modified_gmt":"2016-08-26T23:10:36","slug":"efficient-secure-and-private-wide-area-services-in-untrusted-environments-2","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/efficient-secure-and-private-wide-area-services-in-untrusted-environments-2\/","title":{"rendered":"Efficient, Secure and Private Wide-Area Services in Untrusted Environments"},"content":{"rendered":"

Today, it is common to connect to Internet-based services through a variety of devices. While using the Internet, a user’s information is exposed to untrusted or unreliable environments, from the applications they are using, to the networks delivering packets, to cloud-based remote services. As personal information increases in value, the incentives for these entities to track and collect private data increases as well. Combined, these trends increase security and privacy risks. <\/p>\n

In this talk, I will present two systems that address such risks in the wide-area setting and provide users with more control over how their information is exposed. First, I will describe the IPv6 pseudonym abstraction, an architecture that allows users to have flexible control of linkability of their actions. The key ideas in this work include a cross- layer design over network and application layers and a network-layer protocol that provides seemingly random IP addresses to a host while maintaining efficiency of routing. Next, I will talk about MetaSync, a system where we combine multiple untrusted service providers to build a secure and reliable file synchronization service. The key idea here is a client-only variant of the Paxos protocol for distributed consensus.<\/p>\n","protected":false},"excerpt":{"rendered":"

Today, it is common to connect to Internet-based services through a variety of devices. While using the Internet, a user’s information is exposed to untrusted or unreliable environments, from the applications they are using, to the networks delivering packets, to cloud-based remote services. As personal information increases in value, the incentives for these entities to […]<\/p>\n","protected":false},"featured_media":275613,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-284159","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/4JVR3G_CnW8","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/284159"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/284159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/275613"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=284159"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=284159"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=284159"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=284159"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=284159"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=284159"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=284159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}