1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students.

Slides:



Advertisements
Similar presentations
PHINMS: Application Integration
Advertisements

Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Computer Science CSC 405 Introduction to Computer Security Topic 6.2 Multi-Level Databases.
Vishal Patil Paresh Rawat Pratik Nikam Satish Patil By: Under The Guidance Of Prof.Rucha Samant.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Query Optimization over Web Services Utkarsh Srivastava Jennifer Widom Jennifer Widom Kamesh Munagala Rajeev Motwani.
1 Oct 30, 2006 LogicSQL-based Enterprise Archive and Search System How to organize the information and make it accessible and useful ? Li-Yan Yuan.
Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb.
1 The PORTIA Project: Research Overview Dan Boneh PORTIA Project Site Visit Stanford CA, May 12-13, 2005
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Cloud Usability Framework
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Database Access Control & Privacy: Is There A Common Ground? Surajit Chaudhuri, Raghav Kaushik and Ravi Ramamurthy Microsoft Research.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Protecting data privacy and integrity in clouds By Jyh-haw Yeh Computer Science Boise state University.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Sharable Information Workspace William Lee Computer Science University of Illinois at Urbana-Champaign.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
HomeViews: P2P Middleware for Personal Data Sharing Applications Roxana Geambasu, Magdalena Balazinska, Steve Gribble, Hank Levy University of Washington.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Data Leakage Detection by Akshay Vishwanathan ( ) Joseph George ( ) S. Prasanth ( ) Guided by: Ms. Krishnapriya.
SEC835 Practical aspects of security implementation Part 1.
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Cryptography, Authentication and Digital Signatures
1 Two Can Keep a Secret: A Distributed Architecture for Secure Database Services Gagan Aggarwal, Mayank Bawa, Prasanna Ganesan, Hector Garcia-Molina, Krishnaram.
When data is encrypted: 1. It must be reasonably encrypted to ensure confidentiality and integrity 2. It must be available even in the event the encryption.
Data-Centric Human Computation Jennifer Widom Stanford University.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Distributing Data for Secure Data Services Vignesh Ganapathy, Dilys Thomas, Tomas Feder, Hector Garcia Molina, Rajeev Motwani April 8th, 2011 Stanford,
Intro – Part 2 Introduction to Database Management: Ch 1 & 2.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
OAIS Rathachai Chawuthai Information Management CSIM / AIT Issued document 1.0.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
CS573 Data Privacy and Security Secure data outsourcing – Combining encryption and fragmentation.
Generic Entity Resolution: Identifying Real-World Entities in Large Data Sets Hector Garcia-Molina Stanford University Work with: Omar Benjelloun, Qi Su,
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
By : SAG3 Members.  Cross platform client interface for Time recording/capturing  MS Project integration to Time tracker  integration to Time.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
1 Information Retrieval and Use De-normalisation and Distributed database systems Geoff Leese September 2008, revised October 2009.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Developing and testing enterprise Java applications
A Distributed Tabling Algorithm for Rule Based Policy Systems
Presentation transcript:

1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students

2 DB Perspective Performance Preservation Distribution (P2P) Bad Guys: eavesdrop corrupt Trust

3 DB Perspective Preservation privacy + - preservation + - easy goal

4 Privacy Spectrum Prevention Detection Containment

5 Prevention: Our Work Privacy-Preserving OLAP Distributed Architecture for Secure DBMS (P) Data Preservation in P2P Systems P2P Trust and Reputation Management (P) P2P Privacy Preserving Indexing (P)

6 Distributed Architecture for Secure DBMS Motivation: Outsourcing –Secure Database Provider (SDP) Encrypt Client Service Provider

7 Performance Problem Encrypt Client Client-side Processor Query Q Q’ “Relevant Data” Answer Problem: Q’  “SELECT *” Service Provider

8 The Power of Two Client DSP1 DSP2

9 Basic Idea { CC#, expDate, name } { expDate, name } { CC# }

10 Another Example { salary } { rand } { salary + rand }

11 The Power of Two DSP1 DSP2 Client-side Processor Query Q Q1 Q2 Key: Ensure Cost (Q1)+Cost (Q2)  Cost (Q)

12 Challenges Find a decomposition that –Obeys all privacy constraints –Minimizes execution cost for given workload For given query, find good plan

13 Example R(id, a, b, c), privacy constraint: { a, b, c } R1(id, a) R2(id, b, c) R1(id, a, b) R2(id, c) R1(id, a, b) R2(id, b, c) R1(id, a, c) R2(id, b, c) … Most popular queries: Select on a, b Select on b, c R1(id, a, b) R2(id, b, c)

14 Detection: Our Work Simulatable Auditing (P) k-Anonymity –algorithms and hardness

15 Containment: Our Work Paranoid Platform for Privacy Preferences (P) Entity Resolution

16 Containment Trusting –privacy policies Paranoid

17 Example: Trusting alice dealsRus (1) browse policy (2) give info (3) cross fingers Example P3P Policies: –Current purpose: completion and support of the recurring subscription activity –Recipients: DealsRUs and/or entities acting as their agents or entities for whom DealsRUs are acting as an agent...

18 Example: alice dealsRus (1) temp alice’s agent (2) (3) (4) To:

P4P: Paranoid Platform for Privacy Preferences Framework Data/Control Types: t 1... t n API Strategy/ Reference Implementation

20 Private Information ownership function control individual organization complete privacy limited time use no predicate input no integration accountable sharable identifier service handle input to predicate copy

21 Entity Resolution N: a A: b CC#: c Ph: e e1 N: a Exp: d Ph: e e2 Applications: –mailing lists, customer files, counter-terrorism,...

22 Privacy Nm: Alice Ad: 32 Fox Ph: Nm: Alice Ad: 32 Fox Ph: Nm: Alice Ad: 32 Fox 1.0 Nm: Alice Ad: 32 Fox Ph: Nm: Alice Ad: 32 Fox Ph: Ad: 14 Cat 1.0 Bob Alice

23 Leakage Nm: Alice Ad: 32 Fox Ph: Nm: Alice Ad: 32 Fox Ph: Bob Alice L = 0.6 (between 0 and 1)

24 Multi-Record Leakage Nm: Alice Ad: 32 Fox Ph: Bob Alice LL = 0.9 (between 0 and 1, e.g., max L) r1, L = 0.9 r2, L = 0.8 r3, L = 0.7

25 Q1: Added Vulnerability? Bob Alice ΔLL = ?? r1r2 r3 r4 p r4 may cause Bob’s records to snap together!

26 Q2: Disinformation? Bob Alice ΔLL = ?? r1r2 r3 r4 (lies) p What is most cost effective disinformation?

27 Q3: Verification? Bob Alice p What is best fact to verify to increase confidence in hypothesis? r1, 0.9 r2, 0.8 r3, hypothesis h (0.6)

28 Privacy Spectrum Prevention Detection Containment