Don’t Reveal My Intension: Protecting User Privacy using Declarative Preferences during Distributed Query Processing Nicholas L Farnan, Adam J Lee, Panos.

Slides:



Advertisements
Similar presentations
Democracy, Innovation and Partnerships Jens Thorhauge Danish Agency for Libraries and Media.
Advertisements

HP Provider Relations October 2011 UB-04 Medicare Exhaust Claims.
Issue 3 Land cover mapping, land cover classifications, and accounting units.
NAESB OASIS Recommendation
Linked Data Activities at OCLC Ralph LeVan Senior Research Scientist OCLC Research.
Finnish Customs Customer Management
Analysis for ENPI countries of Social and Economic Benefits of Enhanced Environmental Protection WATER – ENPI South Bjorn Larsen Environmental Economist.
Practical aspects of liberalisation and re-farming of spectrum International Telecommunication Union Telecommunications Development Bureau ITU Regional.
October 21-22, 2011 Tempus QATMI Project Final Conference 1 Strategic Planning & Internationalization Strategies at Yerevan State University (YSU) Strategic.
Illustration collectées par Jean Burdy - 8/09/20111.
Saying No! to Hampshire County Council Public Meeting : Verwood Memorial Hall Monday 20 th June 2011 This slide pack will be made available on the campaign.
Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip and Nageswara S. V. Rao.
A proper motion study of the Lupus clouds using VO tools (a collaboration with the SVO) Francisco Jiménez Esteban (CAB & SVO) Belén López Martí (CAB) &
Texas Education Agency Division of IDEA Coordination August 2011.
IWMSE11Mesa: Automatic Generation of Lookup Table Optimizations5/21/20111 Mesa: Automatic Generation of Lookup Table Optimizations Chris Wilcox Michelle.
Course costing… Dr Thomas Loya, Director Planning and Management Information University of Nottingham HESA: Process Benchmarking Seminar – June 2011 and.
SC&RA June Transportation Safety Through Uniformity SC&RA Pilot Car Escort Training Program.
Communication costs of LU decomposition algorithms for banded matrices Razvan Carbunescu 12/02/20111.
HP Provider Relations February 2011 Prior Authorization via Web interChange.
The Accessibility for Ontarians with Disabilities Act, 2005 How does it affect you? The Ontario Genealogical Society Copyright 2011.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server High Availability.
Inclusion-Exclusion Selected Exercises
Slaying the Feisty Little Foxes Song of Solomon 2:15 Dr. Russell Rosser Chinese Grace Bible Church July 3, 2011.
Electronic Management of Environmental Analytical Data Anand Mudambi USEPA National Environmental Monitoring Conference 2011 August 16, /16/20111.
BCPA project, Kick off meeting, Sofia, September, 12-13, BALKAN CHILD POLICE ACADEMY PROJECT.
The Change Implications for Organisation Systems and Structures ©TPP
1 Relational Algebra* and Tuple Calculus * The slides in this lecture are adapted from slides used in Standford's CS145 course.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 Relational Algebra Chapter 4, Part A.
Fast Algorithms For Hierarchical Range Histogram Constructions
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Michael Armbrust A Functional Query Optimization Framework.
PeerDB: A P2P-based System for Distributed Data Sharing Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying Zhou Shawn Jeffery CS294-4 Peer-to-Peer Systems.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
Making Database Applications Perform Using Program Analysis Alvin Cheung Samuel Madden Armando Solar-Lezama MIT Owen Arden Andrew C. Myers Cornell.
Module 17 Storing XML Data in SQL Server® 2008 R2.
Distributed Databases Dr. Lee By Alex Genadinik. Distributed Databases? What is that!?? Distributed Database - a collection of multiple logically interrelated.
Enforcing Policies on Social Media Data Extracted from the Web Nicoletta Fornara and Truc-Vien T. Nguyen Università della Svizzera italiana Lugano, Switzerland.
Module Title? DBMS Introduction to Database Management System.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
An Integration Framework for Sensor Networks and Data Stream Management Systems.
DBSQL 14-1 Copyright © Genetic Computer School 2009 Chapter 14 Microsoft SQL Server.
EVALUATING PAPERS KMS quality- Impact on Competitive Advantage Proceedings of the 41 st Hawaii International Conference on System Sciences
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
Protecting Sensitive Labels in Social Network Data Anonymization.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
SECURE WEB APPLICATIONS VIA AUTOMATIC PARTITIONING S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, X. Zheng Cornell University.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
Methodology – Physical Database Design for Relational Databases.
QUERY PROCESSING RELATIONAL DATABASE KUSUMA AYU LAKSITOWENING
m-Privacy for Collaborative Data Publishing
Graph Data Management Lab, School of Computer Science Personalized Privacy Protection in Social Networks (VLDB2011)
Private Release of Graph Statistics using Ladder Functions J.ZHANG, G.CORMODE, M.PROCOPIUC, D.SRIVASTAVA, X.XIAO.
REED : Robust, Efficient Filtering and Event Detection in Sensor Network Daniel J. Abadi, Samuel Madden, Wolfgang Lindner Proceedings of the 31st VLDB.
Chapter 18 Query Processing and Optimization. Chapter Outline u Introduction. u Using Heuristics in Query Optimization –Query Trees and Query Graphs –Transformation.
1 Overview of Query Evaluation Chapter Outline  Query Optimization Overview  Algorithm for Relational Operations.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
1 Efficient Processing of Partially Specified Twig Queries Junfeng Zhou Renmin University of China.
BAHIR DAR UNIVERSITY Institute of technology Faculty of Computing Department of information technology Msc program Distributed Database Article Review.
Methodology – Physical Database Design for Relational Databases
 DATAABSTRACTION  INSTANCES& SCHEMAS  DATA MODELS.
Chapter 15 QUERY EXECUTION.
High-Level Synthesis for Side-Channel Defense
Declarative Creation of Enterprise Applications
Some contents are borrowed from Adam Smith’s slides
Presentation transcript:

Don’t Reveal My Intension: Protecting User Privacy using Declarative Preferences during Distributed Query Processing Nicholas L Farnan, Adam J Lee, Panos K Chrysanthis University of Pittsburgh Ting Yu North Carolina State University

Alice is Concerned her Employer Pollutes SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id; ESORICS, 14 Sept. 2011

Our Goals for this Work To empower users querying distributed database system with declarative controls over their privacy that are flexible enough to allow for a balance between privacy and performance ESORICS, 14 Sept. 2011

Roadmap Overview of Distributed Query Processing Privacy Definitions Overview of Our Methodology Proposed SQL Extensions Overview of Related Work Conclusion and Ongoing Work ESORICS, 14 Sept. 2011

Distributed Query Processing SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id; Inventory Alice Facilities Querier Pollution Watch Trusted Untrusted ESORICS, 14 Sept. 2011

How Does Optimization Affect Querier Privacy? SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id; Strikes a balance between privacy and performance Results in a large amount of network traffic Reveals sensitive information to ManuCo Reveals sensitive information to Pollution Watch ESORICS, 14 Sept. 2011

Formalizing this Intensional Knowledge Given a globally-expanded query plan Q = <N, E> We denote by κp (Q) ⊆ N ∪ E the intensional knowledge that principal p ∈ P has of the query encoded by the plan Q. At a minimum, κp (Q) contains the set of all locally-expanded query plans for each node n ∈ N annotated for execution by the principal p, and further all edges leaving or entering such nodes. κPollution_Watch κFacilities κInventory ESORICS, 14 Sept. 2011

Our Approach Have users to define intensional regions Specify constraints on those regions Construct a query plan that respects those constraints SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id; Make sure all operations involving these conditions are evaluated by a trusted server! ESORICS, 14 Sept. 2011

A Formal Definition of Querier Privacy Given an intensional region I, And a set of colluding adversaries A ⊆ P, A globally-expanded query plan Q is said to be (I, A)-private iff κA (Q) ⊭ I Where ⊨ denotes an inference procedure for extracting intensional knowledge from a collection of query plans. ESORICS, 14 Sept. 2011

Representing Query Plan Nodes <select, {(type, =, “solvent”)}, inventory> ESORICS, 14 Sept. 2011

Representing Query Plan Nodes <op, params, p> op - Relational algebra operation params - Parameters to that operation p - Principle where operation will be executed ESORICS, 14 Sept. 2011

Matching Against Query Tree Nodes <*, {('solvent')}, *> <*, {(pollutant, =, name), (location, =, location)}, *> <scan, *, *> ESORICS, 14 Sept. 2011

Constraining Dissemination of Intensional Regions Node descriptors can contain free variables Users author constraints on these free variables <*, {(pollutant)}, $l> $l = Querier ESORICS, 14 Sept. 2011

Extending SQL to Support Constraints SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id REQUIRING $l = Querier HOLDS OVER <*,{(pollutant)},$l>; ESORICS, 14 Sept. 2011

Balancing Privacy and Performance All nodes operating on the pollutant attribute are evaluated by Querier & ( Query is estimated to take less than 2 minutes to run ⊗ All join operations are evaluated by Querier ) W. Kießling. Foundations of preferences in database systems. VLDB, 2002. ESORICS, 14 Sept. 2011

Expressing Preferences in SQL SELECT * FROM Plants, Supplies, Polluted_Waters WHERE Supplies.type = "solvent", AND Supplies.name = Polluted_Waters.pollutant, AND Polluted_Waters.location = Plants.location, AND Plant.id = Supplies.plant_id PREFERRING $l = Querier HOLDS OVER <*,{(pollutant)},$l> CASCADE LESSTHAN(runtime, 2) AND $l = Querier HOLDS OVER <join,*,$l>; W. Kießling and G. Köstler. Preference SQL: Design, Implementation, Experiences. VLDB, 2002. ESORICS, 14 Sept. 2011

Related Work k-anonymity, l-diversity, t-closeness, differential privacy... All look at database privacy, though a compliment to our work Protect the privacy of those whose data is stored in the database Private Information Retrieval (PIR) Server support required for privacy to be achieved Our approach can utilize PIR techniques when they are available, applicable, and efficient Werner Kießling's work on partially ordered preferences Express preferences over query results We adapt his work to operate over query optimization ESORICS, 14 Sept. 2011

Conclusions and Ongoing Work How a query is evaluated in a distributed environment can drastically affect querier privacy We present a formalization of querier privacy, (I, A)-privacy, and further mechanisms for users to express their particular privacy preferences We have adapted Kießling's work on partially ordered preferences to query optimization as opposed to data retrieval We are currently modifying the PostgreSQL query optimizer to support (I, A)-privacy constraints. ESORICS, 14 Sept. 2011

Thank you. Questions? nlf4@pitt.edu This research was supported in part by the National Science Foundation under awards CCF–0916015, CNS–0964295, CNS–1017229, CNS–0914946, CNS–0747247, and CDI OIA– 1028162; and by the K. C. Wong Education Foundation. ESORICS, 14 Sept. 2011