540 likes | 766 Views
Privacy-Preserving Distributed Information Sharing. Nan Zhang and Wei Zhao Texas A&M University, USA. Outline. Motivation Dealing with malicious adversaries Existing and new protocols Conclusion. Information Sharing between Autonomous Entities Problem definition. Knowledge. Supplier
E N D
Privacy-Preserving Distributed Information Sharing Nan Zhang and Wei Zhao Texas A&M University, USA
Outline • Motivation • Dealing with malicious adversaries • Existing and new protocols • Conclusion
Information Sharing between Autonomous EntitiesProblem definition Knowledge
Supplier Product list Consumer Shopping list Secret Weapon I Secret Weapon I Secret Weapon I Secret Weapon V Secret Weapon II Secret Weapon V … Dream Machine Secret Weapon III Cancer Medicine Secret Weapon IV Perpetual Machine Secret Weapon V … … Example SECRET SECRET Contract
Health Insurance Portability and Accountability Act Privacy Concern • Privacy laws Countries with enacted or pending omnibus privacy laws HIPAA [www.privacy.org, 2002]
Privacy-Preserving Information Sharing • Sharing information across private databases without violating each party’s privacy.
Objectives • To ensure accuracy of information sharing results • To guarantee privacy of each party How do we measure accuracy and privacy?
fails accomplishes 1–la la Measurement of Accuracy • Traditional measure of accuracy 1, if all parties obtain correct information sharing results 0, otherwise • We measure accuracy by the expected value of traditional measure • Probability that all parties obtain correct information sharing results 0 1
undisclosed disclosed 1–lp lp Measurement of Privacy Disclosure • Traditional measure in Cryptography 0, if no privacy disclosure 1, otherwise • Our measure in information sharing • Percentage of private information compromised 0 1
Baseline Architecture • With trusted third party • Without trusted third party TTP
System Architecture INTERNET Local Processing Module Database
INTERNET Local Processing Module Database External Attacks Defense against these attacks can occur by using traditional system security measures
INTERNET Local Processing Module Database Internal AttacksInternal party as adversary
INTERNET Semi-honest Adversaries Private information of the other party • Properly follow the protocol • Record intermediate computation and communication • Passive attack
Protocols Against Semi-honest Adversaries • Almost all existing protocols • Can be efficient • Unrealistic assumption: semi-honest
INTERNET Malicious Adversaries Private information of the other party • Can do whatever it wants • May revise local processing module and/or alter inputs • Active attack
Protocols Against Malicious Adversaries • A few protocols exist, with sporadic restrictions • Inefficient
A Dilemma UNREALISTIC TOO DIFFICULT Semi-honest Malicious
Our Goal: Defend Against Malicious Adversaries Effectively and Efficiently But how?
Continuous accuracy measure Continuous privacy measure fails accomplishes 1–la la Our Approach IGeneralization of privacy & accuracy measures undisclosed 1–lp lp disclosed RECALL RECALL
Priority Behavior Our Approach IIClassification of malicious adversaries
Outline • Motivation • Dealing with malicious adversaries • Existing and new protocols • Conclusion
Classification of Adversaries • Priority of Adversary • To obtain the privacy of other parties • To accomplish information sharing
Supplier Product list Secret Weapon I Secret Weapon V … Secret Weapon I Secret Weapon I Secret Weapon V Secret Weapon II Dream Machine Secret Weapon III Cancer Medicine Secret Weapon IV Perpetual Machine Secret Weapon V … … Adversaries that Care About Information Sharing • Consumer • Shopping list Secret Weapon IV Secret Weapon IV PRIVACY BREACH Consumer needs Secret Weapon IV
Secret Weapon I Secret Weapon I Secret Weapon V Secret Weapon V … … Secret Weapon I Secret Weapon I Secret Weapon V Secret Weapon II Dream Machine Secret Weapon III Cancer Medicine Secret Weapon IV Perpetual Machine Secret Weapon V … … Adversaries that Care About Information Sharing • Supplier • Product list • Consumer • Shopping list Secret Weapon IV Secret Weapon IV Secret Weapon IV An adversary may be penalized if some parties cannot obtain the accurate information sharing results.
Priority of Adversary Information sharing as the first priority Priority of adversary Privacy intrusion as the first priority
Measure of Adversary’s Priority • Priority is measured by , such that the goal of the adversary is to maximize u = (1 – )la+ lp. la : {0,1}, probability that all parties obtain correct information sharing results lp : [0,1], percentage of other parties’ private information that is compromised by the adversary.
Classification of Malicious Adversaries by Their Priority u = (1 – )la+ lp = 0 Honest 0 < < 1/2 Weakly malicious Information sharing as the first priority Priority of adversary 1/2 1 Strongly malicious Privacy intrusion as the first priority
Adversary Space Priority Semi-honest Weakly Malicious Strongly Malicious Behavior
Outline • Problem definition • Dealing with malicious adversaries • Existing and new protocols • Conclusion
a a A B AB Protocol DEDouble Encryption • Existing Protocol [R. Agrawal et. al, 2003] • For intersection of two datasets • Basic idea:
Same order A B A A A B A A A A A A A A A A A A A A A B A A A A A B B B Protocol DE • Input: Datasets A, B. Output: AB. Alice Bob A:8 B:10 AB AB AB
Protocol TPSTrust Party with the Smallest Dataset • Our New Protocol I • Basic Idea: TRUST Size: 8 Size: 10
Assumptions • The distribution of the number of data points of each party is known by all parties • For the sake of simplicity, we assume that both parties have the same distribution
A A A A B A A A A B A A A A A A A A B A A B A A A A A A B B Protocol TPS • Input: Datasets A, B. Output: AB. Alice Bob 8 10 A:8 B:10 10 10 8 8 AB AB AB
Protocol RPLReject Parties with the Too Large Dataset • Our New Protocol II • Basic Idea: Reject parties whose datasets are larger than a threshold set by the honest parties
A A A B A A A A B A A B A A B A A A A A B A A A A A A A B A A A A A A A A A AB Protocol RPL • Input: Datasets A, B. Output: AB. Alice Bob A:8 B:10 10 8 Is 10 too large? Is 8 too large? AB AB AB
Lower bound to be secure against semi-honest adversaries Lower bound to be secure against weakly malicious adversaries Performance: Efficiency 4|V0| Communication Overhead 3|V0| 2|V0| DE TPS RPL
Performance: Defense Against Weakly Malicious Adversaries Privacy Disclosure Protocol DE 100 Protocol TPS Protocol RPL 80 Percentage of data compromised by the adversary Accuracy 60 lp(sA, sD0) (%) 100 80 40 Probability that all parties obtain accurate information sharing results 60 la(sA, sD0) (%) 20 40 20 0 0 102 102.3 102.6 102.9 103.2 103.5 TPS RPL DE |V|
Defense Against Strongly Malicious AdversariesPerformance Evaluation Privacy Disclosure Protocol DE Protocol TPS 100 Protocol RPL when = 10 Protocol RPL when = 2 80 Protocol RPL when 1 System parameter Penalty / Benefit on Privacy intrusion attack Accuracy 60 lp(sA, sD0) (%) 100 80 40 60 la(sA, sD0) (%) 20 40 20 0 0 102 102.3 102.6 102.9 103.2 103.5 DE TPS RPL |V|
Outline • Problem definition • Dealing with malicious adversaries • Existing and new protocols • Conclusion
Final Remarks • Simple and efficient protocols exist if we • Adopt the continuous measure of privacy disclosure • Constrain the adversary goal to be weakly malicious • Future work • Additional set operation protocols • Multiple correlated attacks
Q&A Thank you
Weakly and Strongly Malicious u = (1 – )la+ lp = 0 Honest 0 < < 1/2 Weakly malicious Information sharing as first priority Priority of adversary If successful intrusion failed information sharing then the adversary will not perform the intrusion 1/2 1 Strongly malicious Privacy intrusion as first priority
Defense Against Weakly Malicious AdversariesMethodology • Goal of adversary: Maximize u =(1 – )la+ lp . • Weakly malicious means < 1/2. • The optimal strategy for weakly malicious adversaries (sA) is to alter its dataset by V1′s.t.V1 V1′ RECALL RECALL If successful intrusion failed information sharing then the adversary will not perform the intrusion
Basic Idea of Defense Against Weakly Malicious Adversaries • Give them a dilemma No intrusion Successful Information Sharing ? Intrusion Failed Information Sharing Weakly Malicious If successful intrusion failed information sharing then the adversary will not perform the intrusion RECALL
Alice Alice Eve Eve Justin Justin … … Strongly Malicious Honest Defense AgainstStrongly Malicious Adversaries • We have to sacrifice some honest parties. • Because we cannot distinguish them from strongly malicious adversaries. ?
Privacy Disclosure w/Weakly Malicious Adversaries • When an honest party takes the strategy (sD0) to strictly follow the protocol, there is lp(sA,sD0) Pr{vV0 | vV}/|V|