SlideShare a Scribd company logo
Massimo Bertaccini | CEO
Searching Engine on Encrypted Data
Cryptolab is a Cryptography and Cyber
Security Innovative Start Up 

Financed by VC and Investors for
about 1MIL$
Cryptolab has developed the
first Search Engine on Encrypted data CSE a
platform for Security and Privacy of data

CSE enables an efficient Searching Engine
on encrypted files without decrypting them.
Who is Cryptolab
If the data are Encrypted how can I search for the
informations without decrypt the files?
Before CSE if data were encrypted was
impossible to search inside the files without
decryption
If the data remain unencrypted the Cloud
Provider can spy inside my files!
The Problem
Encryption on the Cloud
The Solution
No decryption is necessary to manage and search data in the cloud, thus eliminating
unauthorized access and risk of exposure. The performances of CSE are about
0.35 Sec/Searching semi-independently by the amount of bit and the number of
files stored.
CSE enables analytics on encrypted data preserving the customer's privacy (HIPAA
compatible) for Health Information Privacy.
Analytics on encrypted data
CSE provides to search inside the encrypted data independently by the algorithm
used to store them. It allows storing sensitive files on the Cloud with a complete key
management solution for each client with a Total zero knowledge (only the client
detect the encryption keyes).
Searching Engine for security and privacy
No decryption and better performances
Cryptolab Presentation: Crypto Searching Engine
CSE Screenshot
The technical architecture
and the integration
Encrypted with DB Encryption system
Lorem Ipsum Dolor
Telcos
Industries
Business Model
B2B Model in the beginning
B2C after the dissemination
Cloud
Computing
Providers
&
System Int.
Corporate
Health Care,
Banks,
Government
Agencies
18
19.3
20.5
21.8
23
2012 2013 2014 2015
18.8
19.8
20.9
22.3
Global forecast for Electronic Health Records (EHR),
2012 - 2015 (in $BN)

Source: Accenture Ananlysis, 2014
Market examples: Health, Fitness, IoT
0
25
50
75
100
2013 2014 2015 2016
73.01
70.02 68.01
91.03
Worldwide Wearable Electronic Fitness Devices
Shipments Forecast, 2013-2016 (Milions of Units)

Source: Gartner 2014 Analysis, 2014
Next Steps
Tests on CSE were done with
good result
Contracts signed with :
-Itway (SI - ITA)
-Acantho (CP- ITA)
-Teebase (SI- UK)
-One Step Cloud (USA)
Dissemination and Distributors :
- Cloud Providers
- System Integrators
- Government and Public Admin
- Health Care
- Insurance Co.
The team
Massimo Bertaccini
CEO
Areas of expertise:
Mathematical cryptography
Tiziana Landi
SW Engineer
Areas of expertise:
Software design and
development
Alessandro Passerini
CTO
Areas of expertise:
Software design and
development
Oana CalugarFabio Carati
Areas of expertise:
Business, Strategy,
advanced Technologies
Areas of expertise:
Business, Finance
ADVISOR ADVISOR
Marco Massari
Technical Support
Areas of expertise:
System Administrator 

(Windows , Linux)
Patents and Know How
- MB 09 : Encryption System based on Public/Private Keys
- MB 11: Encryption System based on Public/Private Keys with Digital Signatures
- Z/K 13 : Zero knowledge Protocol used in CSE for VM Authentication
- Compression Algorithm : for transmission of very large keys
- MB23: Fully Homomorphic Encryption System (used in CSE as ME)
- CRYPTOON: Platform written in C++
Cryptolab US Office
2040 Martin Ave
Santa Clara CA 95050, USA
+1 415 7126269

m.bertaccini@cryptolab.us
www.cryptolab.us
Cryptolab ITA Office
Via Livia Venturini 15M

48026 Imola ITA

m.bertaccini@cryptolab.it

More Related Content

PDF
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
PPTX
Integris software ppt
PPTX
Internet of things
PDF
5 IoT challenges to be faced in 2018- Infographic
PPTX
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
PPTX
Driving IT Transformation with Agile Analytics
PPTX
Edge intelligence slide share
PDF
Realizing the Value of Social: Evolving from Social Media to Customer Experience
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
Integris software ppt
Internet of things
5 IoT challenges to be faced in 2018- Infographic
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
Driving IT Transformation with Agile Analytics
Edge intelligence slide share
Realizing the Value of Social: Evolving from Social Media to Customer Experience

What's hot (20)

PDF
Solving Industrial Data Integration with Machine Intelligence
PPTX
PDF
IoT Edge Intelligence - The need for new software development approaches
PPTX
Safeguarding customer and financial data in analytics and machine learning
PDF
5 questions to ask before bringing AI to your business
PPTX
The future of big data analytics
PPTX
Top 5 real world applications of blockchain
PDF
Security Posture Management Enters the Cloud
PDF
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
PDF
Smart contract use case examination: insurance linked securities
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PPTX
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
PDF
Neo4j Graph Data Platform: Making Your Data More Intelligent
PDF
Trust :: Data: Beyond blockchain hype, Tradestreaming Money Conference, Novem...
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PPTX
IoT Trends
PDF
Cloud centric multi-level authentication as a service for secure public safet...
PPTX
Xanadu Based Blockchain Integration System Development
PPTX
Machine learning and ai in a brave new cloud world
DOCX
Cloud computing to have a big impact on IT careers: Gartner
Solving Industrial Data Integration with Machine Intelligence
IoT Edge Intelligence - The need for new software development approaches
Safeguarding customer and financial data in analytics and machine learning
5 questions to ask before bringing AI to your business
The future of big data analytics
Top 5 real world applications of blockchain
Security Posture Management Enters the Cloud
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
Smart contract use case examination: insurance linked securities
Identity Live Sydney: Identity Management - A Strategic Opportunity
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Neo4j Graph Data Platform: Making Your Data More Intelligent
Trust :: Data: Beyond blockchain hype, Tradestreaming Money Conference, Novem...
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IoT Trends
Cloud centric multi-level authentication as a service for secure public safet...
Xanadu Based Blockchain Integration System Development
Machine learning and ai in a brave new cloud world
Cloud computing to have a big impact on IT careers: Gartner
Ad

Similar to Cryptolab Presentation: Crypto Searching Engine (20)

PDF
The Weakest Point of Security in IoT
PDF
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
PDF
SPUnite17 Microsoft Cloud Deutschland
PPTX
Zero Trust 20211105
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Decentralized AI Demystified A Beginners Guide.pdf
DOCX
5 Infrastructure Trends That Will Reshape IT By 2023.docx
PPTX
DEVOLSAFGSDFHGKJHJGHFGDFSDFDSDASFDGFUC.pptx
PDF
Security Implications of Accenture Technology Vision 2015 - Executive Report
DOCX
the world of technology is changing at an unprecedented pace, and th.docx
DOCX
Semantic Computing will make the Internet of Things 2
PPTX
Iot 7-12-2021
PDF
Decentralized AI Demystified A Beginners Guide.pdf
PDF
IoT devices enabled for data analytics intelligent decision making using mach...
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
Security, Compliance and Cloud - Jelecos
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PPTX
Jul 16 isaca london data protection, security and privacy risks - on premis...
PDF
MBA-TU-Thailand:BigData for business startup.
PDF
Gartner Top 10 Strategy Technology Trends 2018
The Weakest Point of Security in IoT
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
SPUnite17 Microsoft Cloud Deutschland
Zero Trust 20211105
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Decentralized AI Demystified A Beginners Guide.pdf
5 Infrastructure Trends That Will Reshape IT By 2023.docx
DEVOLSAFGSDFHGKJHJGHFGDFSDFDSDASFDGFUC.pptx
Security Implications of Accenture Technology Vision 2015 - Executive Report
the world of technology is changing at an unprecedented pace, and th.docx
Semantic Computing will make the Internet of Things 2
Iot 7-12-2021
Decentralized AI Demystified A Beginners Guide.pdf
IoT devices enabled for data analytics intelligent decision making using mach...
Cloud assisted mobile-access of health data with privacy and auditability
Security, Compliance and Cloud - Jelecos
I want you to Read intensively papers and give me a summary for ever.pdf
Jul 16 isaca london data protection, security and privacy risks - on premis...
MBA-TU-Thailand:BigData for business startup.
Gartner Top 10 Strategy Technology Trends 2018
Ad

Recently uploaded (20)

PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PDF
Introduction to Data Science and Data Analysis
PPTX
A Complete Guide to Streamlining Business Processes
PPTX
modul_python (1).pptx for professional and student
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PDF
Microsoft Core Cloud Services powerpoint
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PPTX
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
PPTX
Leprosy and NLEP programme community medicine
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PDF
Microsoft 365 products and services descrption
PPTX
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
PPTX
IMPACT OF LANDSLIDE.....................
PPT
Predictive modeling basics in data cleaning process
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
Pilar Kemerdekaan dan Identi Bangsa.pptx
SAP 2 completion done . PRESENTATION.pptx
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
Introduction to Data Science and Data Analysis
A Complete Guide to Streamlining Business Processes
modul_python (1).pptx for professional and student
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
Microsoft Core Cloud Services powerpoint
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
retention in jsjsksksksnbsndjddjdnFPD.pptx
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
Leprosy and NLEP programme community medicine
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
Microsoft 365 products and services descrption
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
IMPACT OF LANDSLIDE.....................
Predictive modeling basics in data cleaning process

Cryptolab Presentation: Crypto Searching Engine

  • 1. Massimo Bertaccini | CEO Searching Engine on Encrypted Data
  • 2. Cryptolab is a Cryptography and Cyber Security Innovative Start Up Financed by VC and Investors for about 1MIL$ Cryptolab has developed the first Search Engine on Encrypted data CSE a platform for Security and Privacy of data CSE enables an efficient Searching Engine on encrypted files without decrypting them. Who is Cryptolab
  • 3. If the data are Encrypted how can I search for the informations without decrypt the files? Before CSE if data were encrypted was impossible to search inside the files without decryption If the data remain unencrypted the Cloud Provider can spy inside my files! The Problem
  • 5. The Solution No decryption is necessary to manage and search data in the cloud, thus eliminating unauthorized access and risk of exposure. The performances of CSE are about 0.35 Sec/Searching semi-independently by the amount of bit and the number of files stored. CSE enables analytics on encrypted data preserving the customer's privacy (HIPAA compatible) for Health Information Privacy. Analytics on encrypted data CSE provides to search inside the encrypted data independently by the algorithm used to store them. It allows storing sensitive files on the Cloud with a complete key management solution for each client with a Total zero knowledge (only the client detect the encryption keyes). Searching Engine for security and privacy No decryption and better performances
  • 8. The technical architecture and the integration Encrypted with DB Encryption system
  • 10. Telcos Industries Business Model B2B Model in the beginning B2C after the dissemination Cloud Computing Providers & System Int. Corporate Health Care, Banks, Government Agencies
  • 11. 18 19.3 20.5 21.8 23 2012 2013 2014 2015 18.8 19.8 20.9 22.3 Global forecast for Electronic Health Records (EHR), 2012 - 2015 (in $BN)
 Source: Accenture Ananlysis, 2014 Market examples: Health, Fitness, IoT 0 25 50 75 100 2013 2014 2015 2016 73.01 70.02 68.01 91.03 Worldwide Wearable Electronic Fitness Devices Shipments Forecast, 2013-2016 (Milions of Units) Source: Gartner 2014 Analysis, 2014
  • 12. Next Steps Tests on CSE were done with good result Contracts signed with : -Itway (SI - ITA) -Acantho (CP- ITA) -Teebase (SI- UK) -One Step Cloud (USA) Dissemination and Distributors : - Cloud Providers - System Integrators - Government and Public Admin - Health Care - Insurance Co.
  • 13. The team Massimo Bertaccini CEO Areas of expertise: Mathematical cryptography Tiziana Landi SW Engineer Areas of expertise: Software design and development Alessandro Passerini CTO Areas of expertise: Software design and development Oana CalugarFabio Carati Areas of expertise: Business, Strategy, advanced Technologies Areas of expertise: Business, Finance ADVISOR ADVISOR Marco Massari Technical Support Areas of expertise: System Administrator (Windows , Linux)
  • 14. Patents and Know How - MB 09 : Encryption System based on Public/Private Keys - MB 11: Encryption System based on Public/Private Keys with Digital Signatures - Z/K 13 : Zero knowledge Protocol used in CSE for VM Authentication - Compression Algorithm : for transmission of very large keys - MB23: Fully Homomorphic Encryption System (used in CSE as ME) - CRYPTOON: Platform written in C++
  • 15. Cryptolab US Office 2040 Martin Ave Santa Clara CA 95050, USA +1 415 7126269 m.bertaccini@cryptolab.us www.cryptolab.us Cryptolab ITA Office Via Livia Venturini 15M 48026 Imola ITA m.bertaccini@cryptolab.it