Skip to main content

2020 | OriginalPaper | Buchkapitel

Secure Distributed Queries over Large Sets of Personal Home Boxes

verfasst von : Riad Ladjel, Nicolas Anciaux, Philippe Pucheral, Guillaume Scerri

Erschienen in: Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIV

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smart disclosure initiatives and new regulations such as GDPR allow individuals to get the control back on their data by gathering their entire digital life in a Personal Data Management Systems (PDMS). Multiple PDMS architectures exist and differ on their ability to preserve data privacy and to perform collective computations crossing data of multiple individuals (e.g., epidemiological or social studies) but none of them satisfy both objectives. The emergence of Trusted Execution Environments (TEE) changes the game. We propose a solution called Trusted PDMS, combining the TEE and PDMS properties to manage the data of each individual, and a complete framework to execute collective computation on top of them, with strong privacy and fault tolerance guarantees. We demonstrate the practicality of the solution through a real case-study being conducted over 10.000 patients in the healthcare field.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A k-equipartition of a set is the partitioning of this set in partitions of cardinality k.
 
2
We assume that each node is endowed with a public/private key pair.
 
3
Note that this formally makes the communication flow data dependent as the chosen \( k^{\prime } \) depends on the data sent to each scrambler. This, however, only leaks information on the distribution of data, not on any individual data. We do not view this as a significant threat.
 
Literatur
1.
Zurück zum Zitat Abiteboul, S., André, B., Kaplan, D.: Managing your digital life. CACM 58(5), 32–35 (2015)CrossRef Abiteboul, S., André, B., Kaplan, D.: Managing your digital life. CACM 58(5), 32–35 (2015)CrossRef
2.
Zurück zum Zitat Allard, T., Hébrail, G., Pacitti, E., Masseglia, F.: Chiaroscuro: transparency and privacy for massive personal time-series clustering. In: ACM SIGMOD (2015) Allard, T., Hébrail, G., Pacitti, E., Masseglia, F.: Chiaroscuro: transparency and privacy for massive personal time-series clustering. In: ACM SIGMOD (2015)
3.
Zurück zum Zitat Allard, T., et al.: Secure personal data servers: a vision paper. In: VLDB (2010) Allard, T., et al.: Secure personal data servers: a vision paper. In: VLDB (2010)
4.
Zurück zum Zitat Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., et al.: Personal data management systems: the security and functionality standpoint. Inf. Syst. 80, 13–35 (2019)CrossRef Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., et al.: Personal data management systems: the security and functionality standpoint. Inf. Syst. 80, 13–35 (2019)CrossRef
6.
Zurück zum Zitat Armstrong, J., Zhu, M., Hirdes, J., Stolee, P.: K-means cluster analysis of rehabilitation service users in the home health care system of Ontario: examining the heterogeneity of a complex geriatric population. Arch. Phys. Med. Rehab. 93(12), 2198–2205 (2012)CrossRef Armstrong, J., Zhu, M., Hirdes, J., Stolee, P.: K-means cluster analysis of rehabilitation service users in the home health care system of Ontario: examining the heterogeneity of a complex geriatric population. Arch. Phys. Med. Rehab. 93(12), 2198–2205 (2012)CrossRef
7.
Zurück zum Zitat Backes, M., Druschel, P., Haeberlen, A., Unruh, D.: A practical and provable technique to make randomized systems accountable. In: NDSS, vol. 9 (2009) Backes, M., Druschel, P., Haeberlen, A., Unruh, D.: A practical and provable technique to make randomized systems accountable. In: NDSS, vol. 9 (2009)
8.
Zurück zum Zitat Bajaj, S., Sion, R.: Trusteddb: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752–765 (2013)CrossRef Bajaj, S., Sion, R.: Trusteddb: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752–765 (2013)CrossRef
9.
Zurück zum Zitat Bater, J., Elliott, G., Eggen, C., Rogers, J.: SMCQL: secure query processing for private data networks. PVLDB 10(6), 673–684 (2017) Bater, J., Elliott, G., Eggen, C., Rogers, J.: SMCQL: secure query processing for private data networks. PVLDB 10(6), 673–684 (2017)
10.
Zurück zum Zitat Bindschaedler, V., Grubbs, P., Cash, D., Ristenpart, T., Shmatikov, V.: The tao of inference in privacy-protected databases. Proc. VLDB Endow. 11(11), 1715–1728 (2018)CrossRef Bindschaedler, V., Grubbs, P., Cash, D., Ristenpart, T., Shmatikov, V.: The tao of inference in privacy-protected databases. Proc. VLDB Endow. 11(11), 1715–1728 (2018)CrossRef
12.
Zurück zum Zitat Chaudhry, A., et al.: Personal data: thinking inside the box. In: Critical Alternatives (2015) Chaudhry, A., et al.: Personal data: thinking inside the box. In: Critical Alternatives (2015)
13.
Zurück zum Zitat Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority – or: breaking the SPDZ limits. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 1–18. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40203-6_1CrossRef Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority – or: breaking the SPDZ limits. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 1–18. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-40203-6_​1CrossRef
14.
Zurück zum Zitat Dwork, C.: Differential privacy. In: ICALP (2006) Dwork, C.: Differential privacy. In: ICALP (2006)
15.
Zurück zum Zitat Dinh, T.T.A., Saxena, P., Chang, E.C., Ooi, B.C., Zhang, C.: M2R: enabling stronger privacy in MapReduce computation. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 447–462 (2015) Dinh, T.T.A., Saxena, P., Chang, E.C., Ooi, B.C., Zhang, C.: M2R: enabling stronger privacy in MapReduce computation. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 447–462 (2015)
16.
Zurück zum Zitat Elbattah, M., Molloy, O.: Clustering-aided approach for predicting patient outcomes with application to elderly healthcare in Ireland. In: Workshops at AAAI (2017) Elbattah, M., Molloy, O.: Clustering-aided approach for predicting patient outcomes with application to elderly healthcare in Ireland. In: Workshops at AAAI (2017)
17.
Zurück zum Zitat Fuhry, B., Bahmani, R., Brasser, F., Hahn, F., Kerschbaum, F., Sadeghi, A.R.: Hardidx: practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5), 677–706 (2018)CrossRef Fuhry, B., Bahmani, R., Brasser, F., Hahn, F., Kerschbaum, F., Sadeghi, A.R.: Hardidx: practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5), 677–706 (2018)CrossRef
19.
Zurück zum Zitat Ge, T., Zdonik, S.: Answering aggregation queries in a secure model. In: VLDB (2007) Ge, T., Zdonik, S.: Answering aggregation queries in a secure model. In: VLDB (2007)
20.
Zurück zum Zitat Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the Internet of Things: security and privacy in untrusted environments. In: IEEE 27th International Conference on Network Protocols ICNP (2019) Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the Internet of Things: security and privacy in untrusted environments. In: IEEE 27th International Conference on Network Protocols ICNP (2019)
21.
Zurück zum Zitat Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Discov. 2, 283–304 (1998)CrossRef Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Discov. 2, 283–304 (1998)CrossRef
22.
Zurück zum Zitat Hunt, T., Zhu, Z., Xu, Y., Peter, S., Witchel, E.: Ryoan: a distributed sandbox for untrusted computation on secret data. TOCS 35(4), 1–32 (2018)CrossRef Hunt, T., Zhu, Z., Xu, Y., Peter, S., Witchel, E.: Ryoan: a distributed sandbox for untrusted computation on secret data. TOCS 35(4), 1–32 (2018)CrossRef
23.
Zurück zum Zitat Johnson, S., Bacsu, T., Jeffery, B., Novik, N.: No place like home: a systematic review of home care for older adults. Can. J. Aging 37(4), 400–419 (2018)CrossRef Johnson, S., Bacsu, T., Jeffery, B., Novik, N.: No place like home: a systematic review of home care for older adults. Can. J. Aging 37(4), 400–419 (2018)CrossRef
24.
Zurück zum Zitat Ladjel, R., Anciaux, N., Pucheral, P., Scerri, G.: A manifest-based framework for organizing the management of personal data at the edge of the network. In: ISD (2019) Ladjel, R., Anciaux, N., Pucheral, P., Scerri, G.: A manifest-based framework for organizing the management of personal data at the edge of the network. In: ISD (2019)
25.
Zurück zum Zitat Ladjel, R., Anciaux, N., Pucheral, P., Scerri, G.: Trustworthy distributed computations on personal data using trusted execution environments. In: TrustCom (2019) Ladjel, R., Anciaux, N., Pucheral, P., Scerri, G.: Trustworthy distributed computations on personal data using trusted execution environments. In: TrustCom (2019)
26.
Zurück zum Zitat Liao, M., Li, Y., Kianifard, F., Obi, Z., Arcona, S.: Cluster analysis and its application to healthcare claims data: a study of end-stage renal disease patients who initiated hemodialysis. BMC Nephrol. 17, 25 (2016)CrossRef Liao, M., Li, Y., Kianifard, F., Obi, Z., Arcona, S.: Cluster analysis and its application to healthcare claims data: a study of end-stage renal disease patients who initiated hemodialysis. BMC Nephrol. 17, 25 (2016)CrossRef
27.
Zurück zum Zitat Merkle, C.: Protocols for public key cryptosystems. In: S&P (1980) Merkle, C.: Protocols for public key cryptosystems. In: S&P (1980)
28.
Zurück zum Zitat De Montjoye, Y., Shmueli, E., Wang, S., Pentland, A.: OpenPDS: protecting the privacy of metadata through SafeAnswers. PloS One 9(7), e98790 (2014)CrossRef De Montjoye, Y., Shmueli, E., Wang, S., Pentland, A.: OpenPDS: protecting the privacy of metadata through SafeAnswers. PloS One 9(7), e98790 (2014)CrossRef
29.
Zurück zum Zitat Pires, R., Gavril, D., Felber, P., Onica, E., Pasin, M.: A lightweight MapReduce framework for secure processing with SGX. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 1100–1107. IEEE (2017) Pires, R., Gavril, D., Felber, P., Onica, E., Pasin, M.: A lightweight MapReduce framework for secure processing with SGX. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 1100–1107. IEEE (2017)
30.
Zurück zum Zitat Popa, R.A., Redfield, C.M., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef Popa, R.A., Redfield, C.M., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103–111 (2012)CrossRef
31.
Zurück zum Zitat Priebe, C., Vaswani, K., Costa, M.: EnclaveDB: a secure database using SGX. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 264–278. IEEE (2018) Priebe, C., Vaswani, K., Costa, M.: EnclaveDB: a secure database using SGX. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 264–278. IEEE (2018)
32.
Zurück zum Zitat Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: TrustCom/BigDataSE/ISPA, vol. 1 (2015) Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: TrustCom/BigDataSE/ISPA, vol. 1 (2015)
33.
Zurück zum Zitat Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: 2015 IEEE Symposium on Security and Privacy, pp. 38–54. IEEE (2015) Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: 2015 IEEE Symposium on Security and Privacy, pp. 38–54. IEEE (2015)
34.
Zurück zum Zitat That, D.H.T., Popa, I.S., Zeitouni, K., Borcea, C.: PAMPAS: privacy-aware mobile participatory sensing using secure probes. In: Proceedings of the 28th International Conference on Scientific and Statistical Database Management, pp. 1–12 (2016) That, D.H.T., Popa, I.S., Zeitouni, K., Borcea, C.: PAMPAS: privacy-aware mobile participatory sensing using secure probes. In: Proceedings of the 28th International Conference on Scientific and Statistical Database Management, pp. 1–12 (2016)
35.
Zurück zum Zitat Tramèr, F., Zhang, F., Lin, H., Hubaux, J., Juels, A., Shi, E.: Sealed-glass proofs: using transparent enclaves to prove and sell knowledge. In: EuroS&P (2017) Tramèr, F., Zhang, F., Lin, H., Hubaux, J., Juels, A., Shi, E.: Sealed-glass proofs: using transparent enclaves to prove and sell knowledge. In: EuroS&P (2017)
36.
Zurück zum Zitat To, Q.C., Nguyen, B., Pucheral, P.: Privacy-preserving query execution using a decentralized architecture and tamper resistant hardware. In: EDBT, pp. 487–498 (2014) To, Q.C., Nguyen, B., Pucheral, P.: Privacy-preserving query execution using a decentralized architecture and tamper resistant hardware. In: EDBT, pp. 487–498 (2014)
37.
Zurück zum Zitat Wang, W., et al.: Leaky cauldron on the dark land: understanding memory side-channel hazards in SGX. In: CCS (2017) Wang, W., et al.: Leaky cauldron on the dark land: understanding memory side-channel hazards in SGX. In: CCS (2017)
Metadaten
Titel
Secure Distributed Queries over Large Sets of Personal Home Boxes
verfasst von
Riad Ladjel
Nicolas Anciaux
Philippe Pucheral
Guillaume Scerri
Copyright-Jahr
2020
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-62271-1_4