Differentially Private Oblivious RAM Sameer Wagh , Paul Cuff , - - PowerPoint PPT Presentation

differentially private oblivious ram
SMART_READER_LITE
LIVE PREVIEW

Differentially Private Oblivious RAM Sameer Wagh , Paul Cuff , - - PowerPoint PPT Presentation

Differentially Private Oblivious RAM Sameer Wagh , Paul Cuff , Prateek Mittal July 24, 2019 Princeton University, Renaissance Technologies Introduction: Oblivious RAM Access data privately from private database. 1


slide-1
SLIDE 1

Differentially Private Oblivious RAM

Sameer Wagh∗, Paul Cuff†, Prateek Mittal∗ July 24, 2019

∗Princeton University, †Renaissance Technologies

slide-2
SLIDE 2

Introduction: Oblivious RAM

Access data privately from private database.

1

slide-3
SLIDE 3

Introduction: Oblivious RAM

User receives record R

2

slide-4
SLIDE 4

Introduction: Oblivious RAM

Obliviousness: Adversary should not know R

3

slide-5
SLIDE 5

ORAM Application I

Client-server environments

4

slide-6
SLIDE 6

ORAM Application II

Trusted Execution Environments such as SGX-based enclaves

5

slide-7
SLIDE 7

The Problem?

6

slide-8
SLIDE 8

The Problem?

7

slide-9
SLIDE 9

The Problem: Overhead

8

Overheads

  • Logarithmic bandwidth overhead (≥ 100×)
  • Logarithmic storage overhead
slide-10
SLIDE 10

Key Insight

9

Overheads

  • Logarithmic bandwidth overhead (≥ 100×)
  • Logarithmic storage overhead

Key Insight

Can we improve performance by relaxing privacy?

slide-11
SLIDE 11

Key Insight: Improve Performance by Relaxing Privacy

  • Statistically private ORAM

◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?

10

slide-12
SLIDE 12

Key Insight: Improve Performance by Relaxing Privacy

  • Statistically private ORAM

◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?

  • Efficiency

◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources

10

slide-13
SLIDE 13

Key Insight: Improve Performance by Relaxing Privacy

  • Statistically private ORAM

◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?

  • Efficiency

◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources

11

Differential Privacy

  • Formalize Differentially Private ORAM
  • Introduce Root ORAM
slide-14
SLIDE 14

Key Insight: Improve Performance by Relaxing Privacy

  • Statistically private ORAM

◮ Better performance at the cost of privacy loss ◮ Challenge: Can we provide rigorous guarantees?

  • Efficiency

◮ Reduce performance overheads – bandwidth, local storage ◮ Achieve privacy proportional to application resources

12

Differential Privacy

  • Formalize Differentially Private ORAM
  • Introduce Root ORAM

Root ORAM

  • Theoretical Results
  • Empirical Results
  • Private Information Retrieval
slide-15
SLIDE 15

Differentially Private Oblivious RAM

slide-16
SLIDE 16

DP-ORAM Intuition

13

slide-17
SLIDE 17

DP-ORAM Intuition

14

slide-18
SLIDE 18

DP-ORAM Intuition

15

slide-19
SLIDE 19

Statistical closeness - Differential Privacy

Pr[ORAM(a1) ∈ S] ≤ eǫPr[ORAM(a2) ∈ S] + δ

16

slide-20
SLIDE 20

Protocol Construction

slide-21
SLIDE 21

Root ORAM: Storage

17

slide-22
SLIDE 22

Root ORAM: Invariant

18

slide-23
SLIDE 23

Root ORAM: Updated mapping

19

slide-24
SLIDE 24

Root ORAM: Updated mapping

20

slide-25
SLIDE 25

Root ORAM: Updated mapping

21

Key Insight

  • Uniform mapping ⇒ Conventional Security
  • Non-uniform mapping ⇒ DP-ORAM Security
slide-26
SLIDE 26

Root ORAM: Updated mapping

22

Key Insight

  • Uniform mapping ⇒ Conventional Security
  • Non-uniform mapping ⇒ DP-ORAM Security
slide-27
SLIDE 27

Root ORAM: Updated mapping

23

slide-28
SLIDE 28

Root ORAM: Non-Uniform mapping

24

Impact

  • Lower average placement ⇒ Improved performance
  • Privacy loss
slide-29
SLIDE 29

Root ORAM: Write back

25

slide-30
SLIDE 30

Root ORAM: Lowest Common Intersection

26

slide-31
SLIDE 31

Root ORAM: Lowest Common Intersection

27

slide-32
SLIDE 32

Root ORAM: Lowest Common Intersection

28

slide-33
SLIDE 33

Database view before access

29

slide-34
SLIDE 34

Database view after access

30

slide-35
SLIDE 35

Results

slide-36
SLIDE 36

Security Result: Root ORAM is DP-ORAM

Differentially Private ORAM Protocol The Root ORAM protocol with parameters k, p is (ǫ, δ)-differentially private for the following choice of ǫ and δ ǫ = 2 log 1 + (2k − 1) · p 1 − (1 − δk0)p

  • δ = M ·

1 + (2k − 1) · p N M (1) where δk0 is the Kronecker delta, M is the size of the access sequence and M > total stash size.

31

slide-37
SLIDE 37

Performance Improvements

Improvement in stash usage for (L, k, Z) = (15, 1, 4)

32

slide-38
SLIDE 38

Performance Improvements

Improvement in stash usage for (L, k, Z) = (15, 1, 4)

33

Key takeaway

DP-ORAM can enhance performance at the cost of privacy

slide-39
SLIDE 39

Application: Private Information Retrieval

slide-40
SLIDE 40

Private Information Retrieval (PIR)

Access data privately from public database.

[46] Mittal, Prateek, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, and Ian

  • Goldberg. ”PIR-Tor: Scalable Anonymous Communication Using Private Information

Retrieval.” In USENIX Security Symposium, p. 31. 2011.

34

slide-41
SLIDE 41

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

35

slide-42
SLIDE 42

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

35

slide-43
SLIDE 43

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

36

slide-44
SLIDE 44

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

37

slide-45
SLIDE 45

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

38

slide-46
SLIDE 46

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

39

slide-47
SLIDE 47

ORAM based PIR

  • ORAM has been used previously for PIR [7, 59]

[7] Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. ObliviAd: Provably secure and practical online behavioral advertising. In IEEE Symposium on Security and Privacy (S&P), 2012. [59] Peter Williams and Radu Sion. Usable PIR. In Symposium on Network and Distributed System Security (NDSS), 2008.

40

slide-48
SLIDE 48

DP-PIR Bandwidth Comparison

Security-Bandwidth trade-offs for DP-PIR protocols (Toledo et.al. [54], Path-PIR [42], and Path ORAM [53]).

41

slide-49
SLIDE 49

DP-PIR Bandwidth Comparison

Security-Bandwidth trade-offs for DP-PIR protocols (Toledo et.al. [54], Path-PIR [42], and Path ORAM [53]).

42

DP-ORAMs provide significant performance benefits for DP-PIR

slide-50
SLIDE 50

Conclusion

slide-51
SLIDE 51

Summary

  • Formalized Differentially Private ORAMs
  • Introduced a family of DP-ORAM protocols
  • Analyzed security, performance
  • Showcased utility for Private Information Retrieval

43

slide-52
SLIDE 52

Summary

  • Formalized Differentially Private ORAMs
  • Introduced a family of DP-ORAM protocols
  • Analyzed security, performance
  • Showcased utility for Private Information Retrieval
  • Possible to enhance performance by relaxing privacy

43

slide-53
SLIDE 53

Summary

  • Formalized Differentially Private ORAMs
  • Introduced a family of DP-ORAM protocols
  • Analyzed security, performance
  • Showcased utility for Private Information Retrieval
  • Possible to enhance performance by relaxing privacy

Source code is available at https://github.com/inspire-group/Root-ORAM

43

slide-54
SLIDE 54

Thank you!

43

slide-55
SLIDE 55

Thank you!

Questions?

43