Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas.

Slides:



Advertisements
Similar presentations
Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Advertisements

Private Inference Control
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Operating System Security
Cloud Computing Security Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧ nen, Pasquale Puzio December 18, 2013 – Sophia-Antipolis, France.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
PRIVACY AND SECURITY ISSUES IN DATA MINING P.h.D. Candidate: Anna Monreale Supervisors Prof. Dino Pedreschi Dott.ssa Fosca Giannotti University of Pisa.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Private Information Retrieval Benny Chor, Oded Goldreich, Eyal Kushilevitz and Madhu Sudan Journal of ACM Vol.45 No Reporter : Chen, Chun-Hua Date.
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Malicious parties may employ (a) structure-based or (b) label-based attacks to re-identify users and thus learn sensitive information about their rating.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Secure and Efficient Metering by Moni Naor and Benny Pinkas Vincent Collado Olga Toporovsky Alex Kogan Marina Lapkina Igor Iulis.
DSAC (Digital Signature Aggregation and Chaining) Digital Signature Aggregation & Chaining An approach to ensure integrity of outsourced databases.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
SSH Secure Login Connections over the Internet
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
Selective and Authentic Third-Party distribution of XML Documents - Yashaswini Harsha Kumar - Netaji Mandava (Oct 16 th 2006)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Privacy-Aware Personalization for Mobile Advertising
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Identity-Based Secure Distributed Data Storage Schemes.
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Privacy Framework for RDF Data Mining Master’s Thesis Project Proposal By: Yotam Aron.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Plethora: A Wide-Area Read-Write Storage Repository Design Goals, Objectives, and Applications Suresh Jagannathan, Christoph Hoffmann, Ananth Grama Computer.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Wei-Shinn Ku Slide 1 Auburn University Computer Science and Software Engineering Query Integrity Assurance of Location-based Services Accessing Outsourced.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
m-Privacy for Collaborative Data Publishing
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
Secure Data Outsourcing
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Privacy-Preserving Data Aggregation without Secure Channel: Multivariate Polynomial Evaluation Taeho Jung 1, XuFei Mao 2, Xiang-Yang Li 1, Shao-Jie Tang.
Verifiable Distributed Oblivious Transfer and Mobile-agent Security Speaker: Sheng Zhong (joint work with Yang Richard Yang) Yale University.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Data Security and Privacy Keke Chen
Hardware-rooted Trust for Secure Key Management & Transient Trust
MPC and Verifiable Computation on Committed Data
A Privacy-Preserving Index for Range Queries
Autonomous Aggregate Data Analytics in Untrusted Cloud
Threshold RSA Cryptography
Presentation transcript:

Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson 1, Stuart Haber 2, William G. Horne 2, Tomas Sander 2, and Danfeng Yao 1 Rutgers University Dept. of Computer Science Piscataway, NJ Hewlett-Packard Labs 5 Vaughn Dr., Suite 301 Princeton, NJ 12

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Contributions An efficient, distributed architecture for outsourcing databases A privacy-preserving protocol for computing aggregate queries that is resistant to collusion of dishonest service providers A mechanism that allows users to verify the integrity and correctness of aggregate query responses

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Simple Client-Server Model Data Owner Client queryresponse Client What if data owner has insufficient time or resources to answer all queries?

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Database-As-a-Service Outsource database to a trusted third-party service provider (SP). SP supports and maintains DBMS infrastructure, stores data and responds to queries. Applications: Census data, medical records, network monitoring, recommendation systems. Data may be private or sensitive. –Only answer queries that follow a pre-defined inference control policy. outside scope of our work

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Database-As-a-Service Data Owner Service Provider Client query Q result A Q Security threat! What if server is compromised or SP is malicious? Integrity issue! How does Client know that results are correct? sensitive data, inference control policy query rejected!

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Database-As-a-Service Encryption [HIM02, MT06] –When client is the original data owner. Publish only statistics –Limits utility for complex data mining apps. Publish representative subset –Good for approximate query results. –No privacy for individuals in released dataset.

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Our Solution: Privacy-Preserving Database-As-a-Service (PDAS) Outsource database to m service providers. Each SP gets a “share” of each data item. Each share gives zero information, but the shares can be combined to reconstruct the original data. [Shamir ’79] A homomorphic commitment scheme is used to guarantee correctness. [Pedersen ’91]

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 PDAS Architecture Data Owner SP2SP3SP1 Client aggregate query Q request shares of A Q calculate share A Q 1 calculate share A Q 3 calculate share A Q 2 calculate result A Q result A Q, proof of correctness

PDAS Protocol 1.COMMIT: Data owner generates commitment values, signs root of Merkle hash tree. 2.DISTRIBUTE: Shares of each data item are distributed to SPs using Shamir secret-sharing. 3.QUERY: Client submits aggregate query to SP. 4.RESPOND: SP requests shares of aggregate from other SPs, recovers result, returns to Client. 5.VERIFY: Client checks commitments against signed root hash, verifies commitment for result. PDAS: Privacy-Preserving Database-As-a-Service PETS 2009

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Construct a random (k-1)-degree polynomial P with P(0) = S. Each share is a point on the curve. k points are both necessary and sufficient to uniquely determine the polynomial. Secret Sharing with Polynomials Note: Computation in the field F q Note: Allows for threshold scheme [Shamir ’79]

x1x1 x2x2 x3x3 (0, A) P A (x) (x 1, P A (x 1 )) (x 2, P A (x 2 )) (x 3, P A (x 3 )) Secret Sharing with Polynomials PETS 2009

x1x1 x2x2 x3x3 (0, B) P B (x) (x 1, P B (x 1 )) (x 2, P B (x 2 )) (x 3, P B (x 3 )) Secret Sharing with Polynomials PETS 2009

x1x1 x2x2 x3x3 (0, A) P A (x) (x 1, P A (x 1 )) (x 2, P A (x 2 )) (0, B) P B (x) (x 1, P B (x 1 )) (x 2, P B (x 2 )) (x 3, P A (x 3 )) (x 3, P B (x 3 )) Task: secure computation of A + B Secret Sharing with Polynomials PETS 2009 Task: compute A + B

x1x1 x2x2 x3x3 P A (x) (x 1, P A (x 1 )) (x 2, P A (x 2 ))P B (x) (x 1, P B (x 1 )) (x 2, P B (x 2 )) P A+B (x) (0, A+B) (x 1, P A+B (x 1 )) (x 2, P A+B (x 2 )) (x 3, P A (x 3 )) (x 3, P B (x 3 )) Player 1 calculates: P A (x 1 ) + P B (x 1 ) (x 3, P A+B (x 3 )) Determined the sum A+B without revealing A or B ! Secret Sharing with Polynomials PETS 2009 Player 2 calculates: P A (x 2 ) + P B (x 2 ) Player 3 calculates: P A (x 3 ) + P B (x 3 )

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 A secret-sharing polynomial P j is constructed for each data element D j, i.e. The share of data D j for SP i is Suppose client queries for SP i computes and broadcasts Using polynomial interpolation, the SPs can derive the polynomial Secret Sharing in PDAS

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Honest SPs only contribute to a computation if the query follows the data owner’s policy. PDAS allows for a (k,m) threshold scheme, where any k of m SPs can answer a query. If less than k collaborate, they learn nothing. If there are less than k dishonest SPs, the system has information theoretic security. Privacy is preserved* – no information is leaked besides the query results! Secret Sharing in PDAS

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Verification in PDAS The Pedersen Commitment Scheme [’91] Prover: COMMIT( ) Publish generators of group Choose random Calculate commitment value: Verifier: VERIFY( ) Check commitment:

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Verification in PDAS Owner computes commitment to each data entry and signs to authenticate. Given, the client verifies the commitment:. This requires access to sensitive data ! Problem: How to verify an aggregate query result without access to individual entries? Use a homomorphic commitment scheme!

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Verification in PDAS Pedersen commitment scheme is homomorphic: What is x 1 + x 2 ? Verify: Service Provider commitments signed by data owner

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Verification in PDAS Use Merkle hash tree to improve efficiency. Data owner only signs once: the root hash. h 00 h 01 h 10 h 11 h0h0 h1h1 h root

Outline Motivation PDAS Architecture and Protocol Secure Computation of Aggregate Queries Correctness Verification Conclusions and Future Work

Security Properties of PDAS Secrecy: Only query results are revealed. Security: Commitments are computationally binding and unconditionally hiding. Correctness: Accuracy, integrity guaranteed. Collusion resistance: Privacy is protected against k-1 collaborating adversaries. Accountability: Malicious SPs will be caught. PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 In practice, may relax some properties to achieve greater functionality. Details in corrected version of paper.

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Efficiency of PDAS Setup cost is O(nm) time* for data owner, but there is no maintenance cost. Space required is O(n) for each SP. Time complexity to compute a query over subset S is only O(|S|) for each SP, plus O(|S| log n) communication cost. Verification has computational and communication cost O(min(|S| log n, n)).

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Extensions Dynamic databases –Support efficient addition/deletion Multiple data owners Load balancing Selection over insensitive attributes –“Mixed” databases –Guaranteeing completeness

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Future Work Complex queries –Nested queries –Selection over sensitive attributes –MAX, MIN Inference control –Differential privacy [Dwork06] Private Information Retrieval –[Chor, Goldreich, Kushilevitz, Sudan ‘95]

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Conclusions PDAS accomplishes the following goals: A distributed architecture for computing aggregate queries over sensitive data in outsourced databases. An efficient protocol for verifying the accuracy and integrity of query results. A secure system that is robust against a network of k-1 collaborating adversaries.

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Thank you! Corrected version to be available soon:

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Extra Slides

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 How to enforce a query response policy? SUM = ? Okay, sure! Please give me your share of Σ D j ! Our Solution: Secret Sharing

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 How to enforce a query response policy? No, I’m not supposed to... Please give me your share of x! Our Solution: Secret Sharing

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Secret Sharing

PDAS: Privacy-Preserving Database-As-a-Service PETS 2009 Related Work H. Hacigümüs, B. Iyer, S. Mehrotra. “Efficient Execution of Aggregation Queries over Encrypted Relational Databases.” DASFAA, F. Chin. “Security Problems on Inference Control for SUM, MAX, and MIN Queries.” Journal of ACM, G. Jagannathan, R. Wright. “Private Inference Control for Aggregate Database Queries.” PADM, 2007.