Abstract
This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems. We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability. A unique achievement of this project was the automation and integration of the entire test process, from the production and execution of tests to the generation of human-readable evaluation reports. We synthesize our experiences into a set of simple mantras that we recommend following in the design of any assessment framework.
- H.-J. Boehm, R. R. Atkinson, and M. F. Plass. Ropes: An alternative to strings. Software: Practice and Experience, 25(12):1315--1330, 1995. Google ScholarDigital Library
- D. Cash, S. Jarecki, C. S. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In CRYPTO, volume 8042 of LNCS, pages 353--373. Springer, 2013.Google Scholar
- J. Dean and S. Ghemawat. MapReduce: Simplified data processing on large clusters. Commun. ACM, 51(1):107--113, Jan. 2008. Google ScholarDigital Library
- Department of Homeland Security. A roadmap for cybersecurity research, November 2009.Google Scholar
- A. Hamlin and J. Herzog. A test-suite generator for database systems. In IEEE High-Performance Extreme Computing Conference, 2014.Google ScholarCross Ref
- IARPA. Broad agency announcement IARPA-BAA-11-01: Security and privacy assurance research (SPAR) program, February 2011.Google Scholar
- S. Peisert and M. Bishop. How to design computer security experiments. In IFIP, volume 237, pages 141--148. Springer, 2007.Google Scholar
- Project Gutenberg. http://www.gutenberg.org.Google Scholar
- M. Raykova, A. Cui, B. Vo, B. Liu, T. Malkin, S. M. Bellovin, and S. J. Stolfo. Usable, secure, private search. IEEE Security & Privacy, 10(5):53--60, 2012. Google ScholarDigital Library
- US Census Bureau. Census 2000 5-percent public use microdata sample (PUMS) files. http://www2.census.gov/census_2000/datasets/PUMS/FivePercent/.Google Scholar
- US Census Bureau. Genealogy data: Frequently occurring surnames from census 2000. http://www. census.gov/genealogy/www/data/2000surnames/.Google Scholar
- C. V. Wright, C. Connelly, T. Braje, J. C. Rabek, L. M. Rossey, and R. K. Cunningham. Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security. In RAID, volume 6307 of Lecture Notes in Computer Science, pages 218--237. Springer, 2010. Google ScholarDigital Library
- Y. Yang. Evaluation of somewhat homomorphic encryption schemes. Master's thesis, Massachusetts Institute of Technology, 2013.Google Scholar
Index Terms
- Automated Assessment of Secure Search Systems
Recommendations
A CMMI-Based Automated Risk Assessment Framework
APSEC '14: Proceedings of the 2014 21st Asia-Pacific Software Engineering Conference - Volume 02Risk assessment is crucial to the increase of software development project success. Current risk assessment approaches provide only a rough guide. Risk assessment experts and domain experts are required in conducting risk assessments in software ...
Automated Assessment of Programming Assignments
CSERC '13: Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education ResearchThis is a position paper in which I argue that massive open online programming courses can benefit by the application of automated assessment of programming assignments.
I gathered success factors and identified concerns related to automatic assessment ...
Comments