Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ariel Hamlin is active.

Publication


Featured researches published by Ariel Hamlin.


Operating Systems Review | 2015

Automated Assessment of Secure Search Systems

Mayank Varia; Benjamin Price; Nicholas Hwang; Ariel Hamlin; Jonathan Herzog; Jill Poland; Michael Reschly; Sophia Yakoubov; Robert K. Cunningham

This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems. We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability. A unique achievement of this project was the automation and integration of the entire test process, from the production and execution of tests to the generation of human-readable evaluation reports. We synthesize our experiences into a set of simple mantras that we recommend following in the design of any assessment framework.


ieee symposium on security and privacy | 2017

SoK: Cryptographically Protected Database Search

Benjamin Fuller; Mayank Varia; Arkady Yerukhimovich; Emily Shen; Ariel Hamlin; Vijay Gadepally; Richard Shay; John Darby Mitchell; Robert K. Cunningham

Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly, systems are offered by academia, start-ups, and established companies. However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between security, functionality, performance, and usability. This challenge is made more difficult by ongoing database specialization, as some users will want the functionality of SQL, NoSQL, or NewSQL databases. This database evolution will continue, and the protected search community should be able to quickly provide functionality consistent with newly invented databases. At the same time, the community must accurately and clearly characterize the tradeoffs between different approaches. To address these challenges, we provide the following contributions:1) An identification of the important primitive operations across database paradigms. We find there are a small number of base operations that can be used and combined to support a large number of database paradigms.2) An evaluation of the current state of protected search systems in implementing these base operations. This evaluation describes the main approaches and tradeoffs for each base operation. Furthermore, it puts protected search in the context of unprotected search, identifying key gaps in functionality.3) An analysis of attacks against protected search for different base queries.4) A roadmap and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.


international conference on information theoretic security | 2015

Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy

Benjamin Fuller; Ariel Hamlin

Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect.


public key cryptography | 2018

Multi-Key Searchable Encryption, Revisited

Ariel Hamlin; Abhi Shelat; Mor Weiss; Daniel Wichs

We consider a setting where users store their encrypted documents on a remote server and can selectively share documents with each other. A user should be able to perform keyword searches over all the documents she has access to, including the ones that others shared with her. The contents of the documents, and the search queries, should remain private from the server.


ieee high performance extreme computing conference | 2014

A test-suite generator for database systems

Ariel Hamlin; Jonathan Herzog

In this paper, we describe the SPAR Test Suite Generator (STSG), a new test-suite generator for SQL style database systems. This tool produced an entire test suite (data, queries, and ground-truth answers) as a unit and in response to a users specification. Thus, database evaluators could use this tool to craft test suites for particular aspects of a specific database system. The inclusion of ground-truth answers in the produced test suite, furthermore, allowed this tool to support both benchmarking (at various scales) and correctness-checking in a repeatable way. Lastly, the test-suite generator of this document was extensively profiled and optimized, and was designed for test-time agility.


IACR Cryptology ePrint Archive | 2015

Cryptography for Big Data Security

Arkady Yerukhimovich; Nabil Schear; Emily Shen; Mayank Varia; Ariel Hamlin; Sophia Yakoubov


IACR Cryptology ePrint Archive | 2018

Private Anonymous Data Access.

Ariel Hamlin; Rafail Ostrovsky; Mor Weiss; Daniel Wichs


Archive | 2017

PACE: Proactively Secure Accumulo with Cryptographic Enforcement

Scott I Ruoti; Ariel Hamlin; Emily Shen; Robert K. Cunningham


Archive | 2016

Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S)

Ariel Hamlin; Nabil Schear; Emily Shen; Mayank Varia; Sophia Yakoubov; Arkady Yerukhimovich


Archive | 2015

Security and Privacy Assurance Research (SPAR) Pilot Final Report

Benjamin Fuller; Darby Mitchell; Robert K. Cunningham; Uri Blumenthal; Patrick T. Cable; Ariel Hamlin; Lauren Milechin; Mark Rabe; Nabil Schear; Richard Shay; Mayank Varia; Sophia Yakoubov; Arkady Yerukhimovich

Collaboration


Dive into the Ariel Hamlin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arkady Yerukhimovich

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Benjamin Fuller

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Emily Shen

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert K. Cunningham

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sophia Yakoubov

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nabil Schear

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mor Weiss

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daniel Wichs

Northeastern University

View shared research outputs
Top Co-Authors

Avatar

Benjamin Price

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge