CIDRE Research team
Confidentialité, Intégrité, Disponibilité et Répartition
- Leader : Valerie Viet triem tong
- Type : Project team
- Research center(s) : Rennes
- Field : Algorithmics, Programming, Software and Architecture
- Theme : Security and Confidentiality
- Partner(s) : CNRS,Université Rennes 1,CentraleSupélec
- Collaborator(s) : Institut de recherche en informatique et systèmes aléatoires (IRISA) (UMR6074)
For many aspects of our everyday life, we heavily rely on information systems, many of which are based on massively networked devices that support a population of interacting and cooperating entities. While these information systems become increasingly open and complex, accidental and intentional failures get considerably more frequent and severe.
Two research communities traditionally address the concern of accidental and intentional failures: the distributed computing community and the security community. While both these communities are interested in the construction of systems that are correct and secure, an ideological gap and a lack of communication exist between them that is often explained by the incompatibility of the assumptions each of them traditionally makes. Furthermore, in terms of objectives, the distributed computing community has favored systems availability while the security community has focused on integrity and confidentiality, and more recently on privacy.
Our long term ambition is to contribute to the building of distributed systems that are trustworthy and respectful of privacy, even when some nodes in the system have been compromised. For that purpose, we are convinced that combining classical security approaches and distributed computing paradigms is an interesting way to enforce the security of large-scale distributed systems. More specifically, since a distributed system is composed of nodes, we assert that the security of large-scale distributed systems has to be addressed at three complementary levels:
- the level of each node: each standalone node has to enforce its own security;
- the level of an identified set of trusted nodes: the trusted nodes can collaborate to enforce together their security;
- the level of fully open large-scale distributed and dynamic systems: distributed computing paradigms such as consensus algorithms can be applied to cope with the possible presence of malicious nodes.
Notice that using a distributed architecture can also be an approach allowing the nodes to enforce their security without the need of a trusted third party.
The research activities of the CIDRE project-team focus mainly on the two following research axis:
Intrusion Detection System: the objective is to detect any suspicious events with regard to the security by analyzing some data generated on the monitored system.
Privacy-preserving Services: the objective is to ensure users’ privacy even when this property seems incompatible with the provided services, like social networks or location-based services.
In all our studies, we consider a priori that the attacker is omnipotent. He can acts as he wants. Nevertheless, being not a team specialized in cryptography, we consider that we can rely on strong unbroken cryto-systems.
- Security of hardware and software systems (fault attacks, hardware-software interactions, malicious code analysis)
- Security of distributed systems (privacy, communications protocols, blockchain architecture, intrusion detection)
Research teams of the same theme :
- COMETE - Concurrency, Mobility and Transactions
- DATASPHERE - Economie des données et des plateformes
- PESTO - Proof techniques for security protocols
- PRIVATICS - Privacy Models, Architectures and Tools for the Information Society
- PROSECCO - Programming securely with cryptography
- TAMIS - Threat Analysis and Mitigation for Information Security