Download presentation
Presentation is loading. Please wait.
Published byDarrell Butler Modified over 8 years ago
1
CMSC 818J: Privacy enhancing technologies Lecture 2
2
Logistics Piazza? Short presentations sign-up
3
Users Devices/ Client-side software Network Application Cloud platform (provides computation and storage) [Recap] Privacy: End-to-End Solution
4
This Week Software architectures that offer data protection from the ground up For cloud services On client devices A more in-depth overview for the rest of the semester Today: the vision, the glue, and the challenges Rest of semester: components
5
[Recap] Cloud computing Cloud computing – storage and computation move into the cloud
6
[Recap] Paradigm Shift TodayFuture
7
Storage provider Computation provider Applications User Cloud Model 7
8
Trust Model Applications can be buggy, compromised, or malicious Cloud platform may be buggy, compromised or malicious including computation and storage provider Cloud operators can be nosey or malicious
9
How can we secure our data in the cloud?
10
Why is the problem hard? Solution 1: Encrypt data stored in cloud How does the cloud compute over your data? Fully homomorphic encryption? Data mining over multiple users’ data? Spam detection, advertising Economics Tension between privacy and utility
11
Usability, functionality, performance User Application provider Platform provider Easy app development, $$ Stake holders
12
Storage provider Computation provider Applications User Cloud Model 12
13
User Key Challenges How can we protect our data against compromised applications? How can we protect our data against a compromised computation provider? How can we protect our data against a compromised storage provider? 13
14
Roadmap Step 1: Assume cloud platform is trusted, how can we secure against untrusted applications? Application confinement Information flow control/access control Cloud platform is root of trust Step 2: How to secure against an untrusted cloud platform? Trusted computing and code attestation Secure software systems Secure storage
15
Roadmap Step 1: Assume cloud platform is trusted, how can we secure against untrusted applications? Application confinement Information flow control/access control Cloud platform is root of trust Step 2: How to secure against an untrusted cloud platform? Trusted computing and code attestation Secure software systems Secure storage
16
Untrusted Applications: The Threats Tax filing app Trusted computation/storage provider Untrusted 3 rd -party application User
17
Untrusted Applications: The Threats Tax filing app Trusted computation/storage provider Untrusted 3 rd -party application User
18
Application confinement Tax filing app Trusted computation/storage provider User
19
Application confinement Tax filing app Trusted computation/storage provider User
20
Medical advisory app Medical advisory app Trusted computation/storage provider User Share data with my doctor Access and information flow control
21
Google docs Google docs Trusted computation/storage provider User Share data with my friend
22
Access and information flow control Application Trusted computation/storage provider Finance User Photos Work Medical Readers: [Alice][Alice, Bob][Alice, Charles] [Alice, David]
23
Pros, cons, and challenges
24
Scalability, scalability, scalability! Usability Economics Applicability What about data mining applications? What about applications and services that call each other (e.g., google maps API) Pros, cons, and challenges
25
Two Types of Applications Bob’s financial documents Bob …. David Charlie Bob Alice Recommendations Traffic advice Type 2: Data intelligence 25 Type 1: Silo-based applications
26
Alice …… Bob Location Database I want information about Batman’s whereabouts Mean, std Classification Clustering Threats for statistical releases Data mining
27
Is releasing aggregate statistics safe? Amazon People who bought also bought
28
Platform for Private Data (PPD) Defense: differential privacy, data sanitization … Charlie Bob Alice Recommendations Traffic advice Sealed container
29
Roadmap Step 1: Assume cloud platform is trusted, how can we secure against untrusted applications? Application confinement Information flow control/access control Cloud platform is root of trust Step 2: How to secure against an untrusted cloud platform? Trusted computing and code attestation Secure software systems Secure storage
30
How can you trust a remote system? Trusted Platform Module (TPM)
31
Code attestation Verifier What code are you running? Here’s a digest of my code. Trusted Platform Module (TPM)
32
Bootstrapping Trust Through Trusted Hardware Trusted Platform Module (TPM) Cloud Server Monitor, enforce! Untrusted components Privacy policy 32 Privacy evidence
33
Securing storage Confidentiality Encryption Integrity checking Authenticated data structures Hiding access patterns Oblivious storage
34
Support for untrusted storage backend modules Integrity check File system, DB Key/value store
35
Sealed container Privacy evidence TPM Putting it All Together: Platform for Private Data 35 Privacy policy Monitor Enforce Usable API App developer User
36
Apps Privacy evidence Data sanitization … Secure data capsules Information flow control Isolation Audit engine
37
BStore BStore authors’ slides
38
BStore discussions: pros, cons, challenges?
39
Pros: Users can choose storage provider Centralizes access control Centralizes storage security Lowers bar of entry for small vendors? Cons, challenges: Does not support cross-user sharing Does not defend against untrusted apps Should users trust apps to delegate access rights? Incremental deployment? BStore discussions: pros, cons, challenges?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.