Differentially Private Oblivious RAM
Sameer Wagh∗, Paul Cuff†, Prateek Mittal∗ July 24, 2019
∗Princeton University, †Renaissance Technologies
Differentially Private Oblivious RAM Sameer Wagh , Paul Cuff , - - PowerPoint PPT Presentation
Differentially Private Oblivious RAM Sameer Wagh , Paul Cuff , Prateek Mittal July 24, 2019 Princeton University, Renaissance Technologies Introduction: Oblivious RAM Access data privately from private database. 1
Sameer Wagh∗, Paul Cuff†, Prateek Mittal∗ July 24, 2019
∗Princeton University, †Renaissance Technologies
Access data privately from private database.
1
User receives record R
2
Obliviousness: Adversary should not know R
3
Client-server environments
4
Trusted Execution Environments such as SGX-based enclaves
5
6
7
8
9
◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?
10
◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?
◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources
10
◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?
◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources
11
◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?
◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources
12
13
14
15
Pr[ORAM(a1) ∈ S] ≤ eǫPr[ORAM(a2) ∈ S] + δ
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Differentially Private ORAM Protocol The Root ORAM protocol with parameters k, p is (ǫ, δ)-differentially private for the following choice of ǫ and δ ǫ = 2 log 1 + (2k − 1) · p 1 − (1 − δk0)p
1 + (2k − 1) · p N M (1) where δk0 is the Kronecker delta, M is the size of the access sequence and M > total stash size.
31
Improvement in stash usage for (L, k, Z) = (15, 1, 4)
32
Improvement in stash usage for (L, k, Z) = (15, 1, 4)
33
DP-ORAM can enhance performance at the cost of privacy
Access data privately from public database.
[46] Mittal, Prateek, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, and Ian
Retrieval.” In USENIX Security Symposium, p. 31. 2011.
34
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
35
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
35
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
36
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
37
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
38
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
39
[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.
40
Security-Bandwidth trade-offs for DP-PIR protocols (Toledo et.al. [54], Path-PIR [42], and Path ORAM [53]).
41
Security-Bandwidth trade-offs for DP-PIR protocols (Toledo et.al. [54], Path-PIR [42], and Path ORAM [53]).
42
DP-ORAMs provide significant performance benefits for DP-PIR
43
43
Source code is available at https://github.com/inspire-group/Root-ORAM
43
43
43