Tutorials
Sushmita Ruj
Assistant Professor at Indian Statistical Institute, Kolkata

TITLE :
Blockchain Technologies


ABSTRACT :
Blockchain is a verifiable distributed ledger that can be used for a variety of applications like financial transactions, smart properties, credential management, internet-of-things, supply chain management and even decentralizied autonomous organizations (DAO). The emergence of Bitcoin in 2008 and its subsequent popularity has resulted in creation of alternate cryptocurrencies based on Blockchain technology. The hype about blockchain has been fuelled by the increasing demand for transparency in all types of operations, be it financial management or organizational management. In contrast to the permissionless blockchain which can be accessed and verified by anyone in the network, permissioned blockchain demand controlled access. It is widely believed that permissioned blockchains can reduce the operational cost of many application including financial transactions. No doubt, Governments around the world are promoting blockchain research, development and deployment. Smart contracts can translate any business logic into computer programs and can reduce administrative, legal and execution costs drastically. Smart contracts on blockchains have been considered the most disruptive technology in the 21st century. In this tutorial, we will look into the basics of blockchain, how it is built on cryptographic primitives, consensus protocols, peer-to-peer networks. We will look at cryptocurrencies in general and Bitcoin in particular. Various application will be discussed. We will give a brief overview of blockchain platforms and some ideas about smart contracts. We will discuss challenges in deploying blockchains in various situations. No prerequisites.


BIOGRAPHY:
Sushmita Ruj is an Assistant Professor at Indian Statistical Institute, Kolkata. She received her B.E. degree Bengal Engineering and Science University, Shibpur, India and Masters and Ph.D. from Indian Statistical Institute, India, all in Computer Science. She was a Erasmus Mundus Post Doctoral Fellow at Lund University, Sweden Post Doctoral Fellow at University of Ottawa, Canada. She was an Assistant Professor at Indian Institute of Technology, IIT, Indore. She was a visiting researcher at KDDI R&D Labs, Japan, University of Wollongong, Australia, INRIA, France, Kyushu University, Japan and intern at Microsoft Research Labs, India and has been on short visits to many universities around the world.

Her research interests are in applied cryptography, security and network analysis. She has published in Tier 1 conferences and journals like IEEE Infocom, IPDPS, CCGrid, IEEE TC, IEEE TPDS, ACM TOSN. She is currently working in cryptocurrencies, cloud security, security and privacy in IoT, mobile ad hoc networks, vehicular networks, smart grids, social networks, cloud security, analysis of complex networks, combinatorics and cryptography. She has collaborated with researchers from academia and industry across five continents and has delivered more that 50 technical lectures around the world. She is on the Editorial Board of Ad Hoc and Sensor Wireless Networks. Sushmita has served as Program Co-Chair for ICCC’2015 (Privacy and Security track), ICDCS workshop, NFSP’2013, ICC-14 Workshop Secure Networking and Forensic Computing (SNFC) and has served as TPC member for many conferences like ACM ASIACCS, Indocrypt, IEEE Globecom, IEEE ICC, IEEE MASS, IEEE PIMRC, ICDCN and many others. She won best paper awards at ISPA 2007 and IEEE PIMRC 2 2011. She received Samsung GRO award in 2014 and NetApp Faculty Fellowship in 2016. Sushmita is a Senior member of ACM and IEEE. Besides being a young dynamic researcher she tries to be a good mentor.

More information can be found on her website and Google Scholar page

Sandeep K. Shukla
Poonam and Prabhu Goel chair professor of Computer Science and Engineering at IIT Kanpur

TITLE :
Cyber Security of Cyber Physical Systems -- Resilient Critical Infrastructure Design


ABSTRACT :
An increasing trend in cyber attacks on national critical infrastructures such as power grid, water and sewage systems, manufacturing systems, and nuclear plants has raised serious concern about the resilience of these critical infrastructures in the face of attacks from organized terrorists, and nation state actors. Most recently in the past one year, we have seen attacks on the power grid of Ukraine, and Israel, Hydroelectric generator in the USA, Steel plant in Germany, and many more. Stuxnet back in 2009 in the Iranian nuclear plant of course woke up the world community to the dangers of attacks on such critical cyber physical systems. In this tutorial we will discuss these trends, and how fortification of cyber security in these systems leads to the problem of designing resilient infrastructure. Then we will discuss formal models of cyber physical systems in the context of which various attack surfaces can be recognized, and classified. We will further discuss 'defense in depth' strategies for the cyber security of these systems as there is no full proof solution. Threat models determine the security controls to be placed, but with the limitations of the threat models, attackers can find vulnerabilities and exploit them. So it becomes a multi-stage non-cooperative game to defend such systems against attackers. Finally we will discuss various research problems, laboratory scale experimental set up, and methodological exploration of this problem.


BIOGRAPHY:
Prof. Sandeep K. Shukla is currently the Poonam and Prabhu Goel chair professor of Computer Science and Engineering at IIT Kanpur. Before July 15, he was a professor of Electrical and Computer Engineering at Virginia Tech from 2002. He was the director of the FERMAT lab, and a founder, and the director during 2010-2012, of the Center for Embedded Systems for Critical Infrastructure at Virginia Tech. He is an IEEE Fellow, an ACM Distinguished Scientist, an ACM Distinguished speaker. He is currently the editor-in-chief of ACM Transactions on Embedded Computing Systems, and an associate editor of the ACM transactions on cyber physical systems. He served as associate editor for IEEE Transactions on Computers, IEEE Embedded Systems Letters, IEEE Design and Test, IEEE Transactions on Industrial Informatics, and few other journals. He was a recipient of the Presidential Early Career Award for Scientists and Engineers (PECASE) in 2005 from the US president, Humboldt Bessel Award, a Virginia Tech Faculty Fellow award, a SUNY Distinguished Alumnus in Technology award among others. He has published more than 200 research articles, and book chapters, and authored and edited 9 books. Currently is a coordinator of the center for cyber security and defense of critical infrastructure at IIT Kanpur.

Bruhadeshwar Bezawada
Associate Professor of Computer Sciences at MEC in the School of Engineering Sciences, Hyderabad

TITLE :
Privacy Preserving Rich Querying Techniques over Encrypted Cloud Data


ABSTRACT :
Cloud computing has made an immense impact in data management services. At the same time, this has also brought about challenges in privacy and confidentiality of the data. The stored data is at risk of leakage due to external as well internal attacks. To defend against such attacks, organizations have resorted to encryption of data prior to storing it on the cloud. However, the encryption makes it difficult to query the data for user specified patterns. In the recent years, the problem of querying encrypted data has received much attention due to its theoretical under-pinning as well as due to its practical impact on computational applications.
This tutorial will focus on the algorithmic techniques and the approaches that have been proposed in the recent times for this problem. Specifically, the tutorial will explore privacy-preserving rich querying techniques such as sub-string matching, range querying, top-k querying and so on, on the outsourced encrypted data. Such techniques bring about higher usability of data without sacrificing privacy. The focus will be more on the intuitive nature of these solutions and the innovations therein. Also, we will cover the various privacy models that are necessary to quantify the security of these solutions. Finally, we will highlight the various trade-offs involved in performance and cost when using each of these techniques. This will be of help to system designers and practitioners who are looking for the best possible data outsourcing solutions.


BIOGRAPHY:
Dr. Bruhadeshwar Bezawada is an Associate Professor of Computer Sciences at MEC in the School of Engineering Sciences. He holds a Ph.D. in Computer Science and Engineering, Michigan State University, USA. He has 15 years of experience in performing top quality Network Security research in world class universities like Michigan State University (USA), International Institute of Information Technology, Hyderabad (India) and Nanjing University (China). He has 30+ top-quality publications in world-renowned journals like IEEE Transactions and Elsevier, and in top-class conferences like ICNP, INFOCOM, NDSS, ESORICS, VLDB and ICDCS. He performed research in cutting-edge areas like secure group communication, broadcast authentication, rewall optimization, cloud computing and sensor networks. He developed state-of-the-art algorithms for privacy preserving search for rich querying in cloud computing. These solutions represent a significant development in this domain.