TOCS Event-Silicon Valley Campus - Carnegie Mellon University

TOCS Event


Petros Maniatis
Senior Research Scientist at Intel Labs


Nov. 8, 1:30pm PT



CMUSV, Rm 118 [directions]

Title: Trusting Your Data In the Hands Of Others
Abstract: Today, once a user’s data leave his custody, they are out of his control. That includes user data on the cloud---financial, medical, social---but also user files entrusted on friends, customers, or anyone else with a legitimate, but limited, permission to view and modify. Enforcing a user’s ‘data-use controls’ (DUCs), his policy for allowed use of his data, can be challenging in the face of threats such as accidental disclosure and corruption, vulnerability to exfiltration malware, and intentional abuse.
In this talk, I will describe some recent work on restoring the user’s control on how his data are used while out of his custody. I will describe some general challenges with solving this problem given prior contributions in this space, and will focus on two design points for potential solutions: one targeting extreme backward compatibility, and one that allows some modifications to existing software (in particular, web-service software). A combination of trusted execution, data encryption in motion and at rest, and limited dynamic software analysis, can lead to point solutions for narrow slices of the problem, as I will describe. Nevertheless, deriving general principles for protecting user data out of the user’s custody is a fertile, open research area with great opportunities for innovation.
Speaker Bio: Petros Maniatis is a Senior Research Scientist at Intel Labs. He is currently a member of the Intel Science and Technology Center on Secure Computing at UC Berkeley. Between 2003 and 2011, he was a Research Scientist at Intel Labs Berkeley. He received his MSc and Ph.D. from the Computer Science Department at Stanford University. Prior to Stanford, he obtained his BSc with honors at the Department of Informatics of the University of Athens in Greece. His research interests lie primarily in the confluence of distributed systems, security, and fault tolerance.