Monday, February 16, 2015

Currently AGI Provides Space Database - crypto could shield private data while sharing collision data

AGI Satellite Tracking « Google Earth Library
Cryptography to prevent satellite collisions - Space News - redOrbit
Cryptographers Could Prevent Satellite Collisions - Scientific American
“In the current working solution, the world’s four largest satellite communications providers have teamed up with a trusted third party: Analytical Graphics. The company aggregates their orbital data and alerts participants when satellites are at risk,” wrote Hemenway and Welser, adding that the arrangement “requires that all participants maintain mutual trust of the third party.”
Analytical Graphics, also known as AGI, makes commercial modeling and analysis software for the aerospace, defense, and intelligence communities. The company was founded in 1989 and is headquartered in Exton, Pennsylvania, though it also has offices located in Colorado, California, Washington DC, the UK, and Singapore. Its current CEO is Paul Graziani.
Satellite Database for PC - Analytical Graphics, Inc. (AGI)

Secure multi-party computation | The MPC Lounge
As more and more satellites are launched into orbit, and new companies and countries start to launch probes of their own, experts are looking for an easier way to keep track of the locations of different satellites. The belief, Hemenway and Welser said, is that adopting cryptography would eliminate the need for a mutually trusted third party altogether.
“In the 1980s, specialists developed algorithms that allowed many people to jointly compute a function on private data without revealing any number of secrets,” they wrote. “In 2010 DARPA tasked teams of cryptographers to apply this technology to develop so-called secure multiparty computation (MPC) protocols for satellite data sharing.”
“In this method, each participant loads proprietary data into its own software, which then sends messages back and forth according to a publicly specified MPC protocol,” the duo added. “The design of the protocol guarantees that participants can compute a desired output (for example, the probability of collision) but nothing else. And because the protocol design is public, anyone involved can write their own software client,” eliminating the need for mutual trust.
Such a plan is not without drawbacks, however, and foremost among them is speed. The calculations needed to determine the odds of collisions between two orbiting satellite would require intense data crunching that could take 90 seconds when performed on commodity hardware, Welser and Hemenway explained.

Read more at http://www.redorbit.com/news/space/1113334629/cryptography-to-prevent-satellite-collisions-021615/#EkoMLWU1KdgJ1TiF.99
 Ramifications of DARPA's Programming Computation on Encrypted Data Program | RAND

Programming Computation on Encrypted Data (PROCEED) is a Defense Advanced Research Projects Agency program whose primary purpose is to improve the efficiency of algorithms that allow people to carry out computations on encrypted data — without having to decrypt the data itself. RAND was asked to evaluate whether PROCEED — which expands the knowledge base of the global cryptographic community — is likely to provide more benefits to the United States than it does to its global rivals. The research team's assessment focused on the degree to which PROCEED technologies may be adopted, under what circumstances, and for what purpose. The team then used the analytic framework generated to understand technological uptake decisions as a way of ascertaining how such factors would work in Russia and China vis-à-vis the United States (and, by extension, countries similar to the United States).
Analysis of online searches for information about data encryption, information security, and data protection in Russia and China concluded that, given government approval of PROCEED technologies, their diffusion will be more rapid in China than in Russia. Whether PROCEED technologies will be adopted in the face of the processing penalties that will be associated with using them is difficult to determine at this time. If PROCEED is adopted, it is likely to be adopted more rapidly in the United States (and similar developed countries) than it is in Russia and China, in large part because PROCEED is compatible with the U.S. political culture, and in smaller part because it better accords to the U.S. business environment.
Satellite Anomalies: Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators | RAND
Satellite anomalies are mission-degrading events that negatively affect on-orbit operational spacecraft. All satellites experience anomalies of some kind during their operational lifetime. They range in severity from temporary errors in noncritical subsystems to loss-of-contact and complete mission failure. There is a range of causes for these anomalies, and investigations by the satellite operator or manufacturer to determine the cause of a specific anomaly are sometimes conducted at significant expense.
Maintaining an anomaly database is one way to build an empirical understanding of what situations are more or less likely to result in satellite anomalies, and help determine causal relationships. These databases can inform future design and orbital regimes, and can help determine measures to prolong the useful life of an on-orbit spacecraft experiencing problems. However, there is no centralized, up-to-date, detailed, and broadly available database of anomalies covering many different satellites.
This report describes the nature and causes of satellite anomalies, and the potential benefits of a shared and centralized satellite anomaly database. Findings indicate that a shared satellite anomaly database would bring significant benefits to the commercial community, and the main obstacles are reluctance to share detailed information with the broader community, as well as a lack of dedicated resources available to any trusted third party to build and manage such a database. Trusted third parties and cryptographic methods such as secure multiparty computing or differential privacy are not complete solutions, but show potential to be further tailored to help resolve the issue of securely sharing anomaly data.

No comments: