Secure sharing in distributed information management applications: problems and directions Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar.

Slides:



Advertisements
Similar presentations
First create and sign up for a blue host account Through the help of Blue Host create a WordPress website for the business After you created WordPress.
Advertisements

The Institute for Economic and Social Research University of Indonesia
Principles of Personalisation of Service Discovery Electronics and Computer Science, University of Southampton myGrid UK e-Science Project Juri Papay,
On the Economics of P2P Systems Speaker Coby Fernandess.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
DYNAMIC ENFORCEMENT OF KNOWLEDGE-BASED SECURITY POLICIES Piotr (Peter) Mardziel, Stephen Magill, Michael Hicks, and Mudhakar Srivatsa.
Chapter 23, Ecological Economics, Daly & Farley.  Economists suggest we find monetary values for these goods and then use the market to efficiently allocate.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
Vytautas Valancius 1.  When Life Was Simple: Phone Networks  Network of Networks: The Internet  Connectivity structure  Pricing in the Internet: One-Size-Fits-All.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Robust Mechanisms for Information Elicitation Aviv Zohar & Jeffrey S. Rosenschein The Hebrew University.
A Network Measurement Architecture for Adaptive Networked Applications Mark Stemm* Randy H. Katz Computer Science Division University of California at.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Validating and Improving Test-Case Effectiveness Author: Yuri Chernak Presenter: Lam, Man Tat.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
Software Process and Product Metrics
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Determining the Significance of Item Order In Randomized Problem Sets Zachary A. Pardos, Neil T. Heffernan Worcester Polytechnic Institute Department of.
Chapter 10: Authentication Guide to Computer Network Security.
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
No, Thanks, I’ll Use a Spreadsheet
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Evaluation Assists with allocating resources what is working how things can work better.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Annual Conference of ITA ACITA 2010 Secure Sharing in Distributed Information Management Applications: Problems and Directions Piotr Mardziel, Adam Bender,
Yang Cai Oct 08, An overview of today’s class Basic LP Formulation for Multiple Bidders Succinct LP: Reduced Form of an Auction The Structure of.
Access to sensitive data in the UK: a principles-based approach Felix Ritchie.
CS 111 – Nov. 22 Chapter 7 Software engineering Systems analysis Commitment –Please read Section 7.4 (only pp ), Sections –Homework #2.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
Presented by: Sanketh Beerabbi University of Central Florida.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
PROBABILISTIC PROGRAMMING FOR SECURITY Michael Hicks Piotr (Peter) Mardziel University of Maryland, College Park Stephen Magill Galois Michael Hicks UMD.
Build Your Business by making the Right Connections.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Knock Yourself Out Secure Authentication with Short Re-Usable Passwords by Benjamin Guldenring, Volker Roth and Lars Ries PRESENTED BY EUNYOUNG CHO COLLEGE.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Computer Science and Engineering 1 Mobile Computing and Security.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
KNOWLEDGE-ORIENTED MULTIPARTY COMPUTATION Piotr (Peter) Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa (IBM TJ Watson)
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
INTRODUCTION About Project: About Project: Our project is based of the technology of cloud computing which is offering many pro’s to the world of computers.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Integrity. Commitment. Performance.™ PMA Financial Planning Program Howard Crouse, Vice President PMA Financial Network, Inc. March 17, 2014 El Paso-Gridley.
Strategic Information Systems Planning
Cost effectiveness Analysis: Valuing Health; Valuing Research!
Security.
Protecting Privacy During On-line Trust Negotiation
Shumin Guo, Keke Chen Data Intensive Analysis and Computing (DIAC) Lab
Morteza Kheirkhah University College London
Presentation transcript:

Secure sharing in distributed information management applications: problems and directions Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar Srivatsa*, Jonathan Katz * IBM Research, T.J. Watson Lab, USA University of Maryland, College Park, USA

To share or not to share Information is one of the most valuable commodities in today’s world Sharing information can be beneficial But information used illicitly can be harmful Common question: For a given piece of information, should I share it or not to increase my utility? 2

Example: On-line social nets Benefits of sharing –find employment, gain business connections –build social capital –improve interaction experience –Operator: increased sharing means increased revenue advertising Drawbacks –identity theft –exploitation easier to perpetrate –loss of social capital and other negative consequences from unpopular decisions 3

Example: Information hub Benefits of sharing –Improve overall service, which provides interesting and valuable information –Improve reputation, authority, social capital Drawbacks –Risk to social capital for poor decisions or unpopular judgments E.g., backlash for negative reviews 4

Example: Military, DoD Benefits of sharing –Increase quality information input –Increase actionable intelligence –Improve decision making –Avoid disaster scenarios Drawbacks –Misused information or access can lead to many ills, e.g.: –Loss of tactical and strategic advantage –Destruction of life and infrastructure 5

Research goals Mechanisms that help determine when to and not to share –Measurable indicators of utility –Cost-based (dis)incentives Limiting info release without loss of utility –Reconsideration of where computations take place: collaboration between information owner and consumer Code splitting, secure computation, other mechs. 6

Remainder of this talk Ideas toward achieving these goals –To date, we have more concrete results (though still preliminary), on limiting release Looking for your feedback on the most interesting, promising directions! –Talk to me during the rest of the conference –Open to collaborations 7

Evidence-based policies Actors must decide to share or not share information –What informs this decision? Idea: employ data from past sharing decisions to inform future ones –Similar, previous decisions –From self, or others 8

Research questions What (gatherable) data can shed light on cost/benefit tradeoff? How can it be gathered reliably, efficiently? How to develop and evaluate algorithms that use this information to suggest particular policies? 9

Kinds of evidence –Positive vs. negative –Observed vs. provided –In-band vs. out-of-band –Trustworthy vs. untrustworthy Gathering real-world data can be problematic; e.g., Facebook’s draconian license agreement prohibits data gathering 10

Economic (dis)incentives Explicit monetary value to information –What is my birthday worth? 11 Compensates information provider for leakage, misuse Encourages consumer not to leak, to keep the price down

Research goals Data valuation metrics, such as those discussed earlier –Based on personally collected data, and data collected by “the marketplace” Payment schemes –One-time payment –Recurring payment –One-time payment on discovered leakage 12

High-utility, limited release Now: user provides personal data to site But, the site doesn’t really need to keep it. Suppose user kept ahold of his data and –Ad selection algorithms ran locally, returning to the server the ad to provide –Components of apps (e.g., horoscope, friend counter) ran locally, accessing only the information needed Result: same utility, less release 13

Research goal Provide mechanism for access to (only) what information is needed to achieve utility –compute F(x,y) where x, y are private to server and client respectively, reveal neither x nor y Some existing work –computational splitting (Jif/Split) But not always possible, given a policy –secure multiparty computation (Fairplay) But very inefficient No work considers inferences on result 14

Privacy-preserving computation Send query on private data to owner Owner processes query –If result of query does not reveal too much about the data, it is returned, else rejected –tracks knowledge of remote party over time Wrinkles: –query code might be valuable –honesty, consistency, in response 15

WIP: Integration into Persona Persona provides encryption-based security of Facebook private data Goal: extend Persona to allow privacy-preserving computation 16

Quantifying info. release How much “information” does a single query reveal? How is this information aggregated over multiple queries? Approach [Clarkson, 2009] : track belief an attacker might have about private information –belief as a probability dist. over secret data –may or may not be initialized as uniform 17

Relative entropy measure Measure information release as the relative entropy between attacker belief and the actual secret value –1 bit reduction in entropy = doubling of guessing ability –policy: “entropy >= 10 bits” = attacker has 1 in 1024 chance of guessing secret 18

Implementing belief tracking Queries restricted to terminating programs of linear expressions over basic data types Model belief as a set of polyhedral regions with uniform distribution in each region 19

Example: initial belief Example: Protect birthyear and gender –each is assumed to be distributed in {1900,..., 1999} and {0,1} respectively –Initial belief contains 200 different possible secret value pairs 20 or as a set of polyhedrons 1900 <= byear <= 1949, 0 <= gender <= 1 states: 100, total mass: <= byear <= 1999, 0 <= gender <= 1 states: 100, total mass: 0.75 belief distribution d(byear, gender) = if byear <= 1949 then else

Example: query processing Secret value –byear = 1975, –gender = 1 Ad selection query Query result = 0 –{1900,..., 1980} X {0,1} are implied possibilities –Relative entropy revised from ~7.06 to ~6.57 Revised belief: 21 if 1980 <= byear then return 0 else if gender == 0 then return 1 else return <= byear <= 1949, 0 <= gender <= 1 states: 100, total mass: ~ <= byear <= 1980, 0 <= gender <= 1 states: 62, total mass: ~0.65

Example: query processing (2) Alt. secret value –byear = 1985, –gender = 1 Ad selection query Query result = 2 {1985,..., 1999} X {1} are the implied possibilities –Relative entropy revised from ~7.06 to ~4.24 Revised belief: 22 if 1980 <= byear then return 0 else if gender == 0 then return 1 else return <= byear <= 1999, 1 <= gender <= 1 states: 19, total mass: 1 probability of guessing becomes 1/19 = ~0.052

Security policy Denying a query for revealing too much can tip off the attacker as to what the answer would have been. Options: –Policy could deny any query whose possible answer, according to the attacker belief, could reveal too much E.g., if (birthyear == 1975) then 1 else 0 –Policy could deny only queries likely to reveal too much, rather than just those for which this is possible Above query probably allowed, as full release unlikely 23

Conclusions Deciding when to share can be hard –But not feasible to simply lock up all your data –Economic and evidence-based mechanisms can inform decisions Privacy-preserving computation can limit what is shared, but preserve utility –Implementation and evaluation ongoing 24