Secure Cloud Database using Multiparty Computation.

Slides:



Advertisements
Similar presentations
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Advertisements

Querying Encrypted Data using Fully Homomorphic Encryption Murali Mani, UMFlint Talk given at CIDR, Jan 7,
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Computer Science CSC 405 Introduction to Computer Security Topic 6.2 Multi-Level Databases.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Statistical database security Special purpose: used only for statistical computations. General purpose: used with normal queries (and updates) as well.
CMPT 354, Simon Fraser University, Fall 2008, Martin Ester 52 Database Systems I Relational Algebra.
Manish Bhide, Manoj K Agarwal IBM India Research Lab India {abmanish, Amir Bar-Or, Sriram Padmanabhan IBM Software Group, USA
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Spring 2003 ECE569 Lecture ECE 569 Database System Engineering Spring 2003 Yanyong Zhang
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
Privacy Preserving Data Mining Yehuda Lindell & Benny Pinkas.
PRIVACY CRITERIA. Roadmap Privacy in Data mining Mobile privacy (k-e) – anonymity (c-k) – safety Privacy skyline.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Achieving fast (approximate) event matching in large-scale content- based publish/subscribe networks Yaxiong Zhao and Jie Wu The speaker will be graduating.
Introduction to Parallel Programming MapReduce Except where otherwise noted all portions of this work are Copyright (c) 2007 Google and are licensed under.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
Secure Database System. Introduction Database-as-a-Service is gaining popularity – Amazon Relational Database Service (RDS) – Microsoft SQL Azure DB Service.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Secure Cloud Database. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment – Adversary corrupts.
Secure Incremental Maintenance of Distributed Association Rules.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
CSCE Database Systems Chapter 15: Query Execution 1.
Wai Kit Wong 1, Ben Kao 2, David W. Cheung 2, Rongbin Li 2, Siu Ming Yiu 2 1 Hang Seng Management College, Hong Kong 2 University of Hong Kong.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
Tools for Privacy Preserving Distributed Data Mining
Wai Kit Wong, Ben Kao, David W. Cheung, Rongbin Li, Siu Ming Yiu.
Identity-Based Secure Distributed Data Storage Schemes.
Cryptographic methods for privacy aware computing: applications.
Secure Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Relational-Based Encryption for Efficient Data Sharing on Encrypted Cloud Relational Databases.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Chapter 21 Public-Key Cryptography and Message Authentication.
Efficiently Processing Queries on Interval-and-Value Tuples in Relational Databases Jost Enderle, Nicole Schneider, Thomas Seidl RWTH Aachen University,
Background on security
Secure Cloud Database. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment – Adversary corrupts.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Secure Database System. Introduction Demand of secure database systems – Cloud computing Database-as-a-Service Current cloud database systems – Amazon.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
Alternative Wide Block Encryption For Discussion Only.
Secure Query Processing in an Untrusted (Cloud) Environment.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Secure Query Processing in an Untrusted (Cloud) Environment.
Differential Privacy Some contents are borrowed from Adam Smith’s slides.
CS4432: Database Systems II Query Processing- Part 2.
Radix Sort and Hash-Join for Vector Computers Ripal Nathuji 6.893: Advanced VLSI Computer Architecture 10/12/00.
Security in Outsourced Association Rule Mining. Agenda  Introduction  Approximate randomized technique  Encryption  Summary and future work.
CSE 351 Number Representation & Operators Section 2 October 8, 2015.
Sovereign Information Sharing, Searching and Mining Rakesh Agrawal IBM Almaden Research Center.
Differential Privacy Xintao Wu Oct 31, Sanitization approaches Input perturbation –Add noise to data –Generalize data Summary statistics –Means,
CSE 351 Number Representation. Number Bases Any numerical value can be represented as a linear combination of powers of n, where n is an integer greater.
Secure Data Outsourcing
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
MPC Cloud Database with Sense of Security. Introduction Cloud computing – IT as a service from third party service provider Security in cloud environment.
Security in Outsourcing of Association Rule Mining
Database Applications (15-415) DBMS Internals- Part VII Lecture 16, October 25, 2016 Mohammad Hammoud.
A Privacy-Preserving Index for Range Queries
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Presentation transcript:

Secure Cloud Database using Multiparty Computation

Introduction Security in cloud environment – The service providers are typically third party – Goal: protect sensitive data Related paper in secure DB – NetDB2, IBM (Outsourced database) – Relational Cloud, CryptDB (MIT, CIDR 2011) – TrustedDB using secure hardware (VLDB 2011 demo, Radu Sion)

NetDB2 Tuple 1xxxyyy Tuple 2aaabbb Tuple 1!a4a3g Tuple 2L%jm*K Value-level encryption SELECT * WHERE value = `xxx’SELECT * WHERE value = `!a4’ DB Encrypted DB Tuple 1P2 Tuple 2P1 + Partition information Partition: P1: < `m’; otherwise P2 SELECT * WHERE value < `xxx’SELECT * WHERE value in [P1, P2] Simple deterministic encryption

CryptDB Onion-encryption: multiple encryption done on 1 data 10 Original data encrypt E 1 (10) = A*65h OPES: numeric comparisons E 2 (A*65h) = BB647 Deterministic encryption Equality can be done Non-deterministic encryption No computation is feasible E 3 (BB647) = If the user wants more computation power, decrypt to the desired level (one way!)

Summary Mainly on encryption technique – Provide limited computation capabilities Also note that security strength depends on the encryption function – For example, deterministic encryption may allow a frequency analysis attack `Male’, `Female’ => `%k9)2’, `Ah475’ `Ah475’ x 21; `%k9)2’ x 5 in DB group

Secure multiparty computation Background

Secret sharing (around 1980) 10 Secret 4 6 shares AliceBob 6+4 = 10 What is the secret value? Alice’s share would be 5? 20? -3? The secret is recovered only when the two parties exchange their shares

Secret sharing General case s Secret s1s1 s2s2 …snsn The secret can be divided into n parties, for any n s = g(s 1, s 2, …, s n ) Example: Sum of all shares (modular) Bitwise XOR of all shares Product, string concatenation, etc… Security requirement: Given k < n shares, it is hard to recover s

Secure multiparty computation Party 1 x1x1 Party 2 x2x2 Party n xnxn … Objective: Every party obtains f(x 1, x 2, …, x n ) but cannot observe any other information apart from its own data r = f(x 1, x 2, …, x n ) r r r

Secure multiparty computation Any function f that can be expressed as a circuit can be computed securely in SMC – Limitation of the generic solution Not efficient Many efficient protocols are developed to support certain operations

Building a secure database system To hide the data – Secret sharing To provide query processing functionality – Secure multiparty computation (SMC) Done?

Secure Cloud Database = Secret Sharing + SMC? DB A B C Service Provider 1 Service Provider 2 Service Provider 3 DB = A + B + C SMC Queries Result R R R

Difference Security requirement – SMC allows all party obtain the result vs SDB allows only the user obtain the result Computational model – SMC: a single function computation vs SDB: follow-up queries

An adaption of SMC + secret sharing Example: SHAREMIND – Outsourced privacy preserving data mining DB A B C Service Provider 1 Service Provider 2 Service Provider 3 DB = A + B + C

An adaption of SMC + secret sharing Example: SHAREMIND – Key: computational result is also shared among parties A B C Service Provider 1 Service Provider 2 Service Provider 3 Query Result A B C A + B + C = Result

SHAREMIND Toolkit Provide several basic operations to build mining application – Arithmetic (add, multiply, divide), bitwise operations (XOR), equality

SHAREMIND – Recursive processing SMC operations Workspaces in different parties Result in shares Intermediate results as part of data of future processing Example: SELECT * WHERE A > AVERAGE(B) Query execution: SMC1. Compute average(B) SMC2. Filter with result from SMC1

Research problem

Secure DB Model DB A B C Service Provider 1 Service Provider 2 Service Provider 3 DB = A + B + C Owner/User

Before we proceed…. Clarifying the security Negative result – Ideal security: Querying workflow: user issues query => service providers compute result and return to user Knowledge gained by service providers: NONE. Not even anything about query and result! – A solution achieving ideal security is not more efficient than a non-outsourcing solution (not using cloud)

Knowledge gained by service provider Output space of a simple selection query: varies from no tuple to the entire database – Even larger space if we consider joins Example knowledge gain – If the output size is small, the service provider knows it is not the case that the query selects entire table To hide the above information, each returned query result should be at least of size = entire table

Security in secure database Each service provider can observe – Query content The tables that are related to the query Number of conditions, types of conditions, attributes that are related But not other info about query – Query answer the set of shares of tuples in some query answer But not other content

Example query SELECT Name FROM Employer WHERE Salary > 6000 Transformed query may look like to one service provider SELECT ATTRIBUTE_7 FROM TABLE_A WHERE ATTRIBUTE_3 > X WITH SHARE_X = 1000 Answer Tom Kitty Answer T Ki Answer o t m ty The other two parties may get SHARE_X = 2000 and SHARE_X = 3000

Building a secure database Baseline solution – Use the existing SHAREMIND Toolkit Each value is divided into shares Selection using equality operation or greater than (detailed protocol not found ????)

One efficiency problem SMC is distributed computing – Number of rounds should be as small as possible! – Handshaking is expensive Naïve compiling of query – May result in series of SMC protocols – Example SELECT A+B+C+D 3 sum operations separately? 3X latency Sum in 1 round!

Better solution? 1. Query execution plan optimization – We have different possible ways to translate the query into SMC primitives, how to optimize in terms of number of rounds of communication? Even better is to have a cost model to consider everything 2. Shortcut operator – Example: (X+Y) mod 5, original two individual SMC operators, but we can use a single SMC operator to replace this combination 3. Index – How to implement index efficiently and securely?

Solutions? No solid ideas now……