effjcient private set intersection for a decentralised
play

Effjcient Private Set Intersection for a Decentralised Web of Trust - PowerPoint PPT Presentation

Effjcient Private Set Intersection for a Decentralised Web of Trust lvaro Garca-Recuero October 31, 2017 Privacy-preserving protocols for the WWW in the age of mass surveillance and adversarial learning lvaro Garca-Recuero


  1. Effjcient Private Set Intersection for a Decentralised Web of Trust Álvaro García-Recuero October 31, 2017

  2. “Privacy-preserving protocols for the WWW in the age of mass surveillance and adversarial learning” Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 2 / 40

  3. Why is that? Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 3 / 40

  4. Strong and Malicious Mass-surveillance AND personal data collection by third-parties on the WWW are a real threat to liberal societies and citizens! a . a https://www.theguardian.com/technology/2017/aug/01/ data-browsing-habits-brokers Countermeasures A truly decentralised WWW will require the network to provide privacy and trust by design. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 4 / 40

  5. Strong and Malicious Mass-surveillance AND personal data collection by third-parties on the WWW are a real threat to liberal societies and citizens! a . a https://www.theguardian.com/technology/2017/aug/01/ data-browsing-habits-brokers Countermeasures A truly decentralised WWW will require the network to provide privacy and trust by design. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 4 / 40

  6. How safe is Big Data? Adversarial learning Manipulating or inserting corrupted samples in the dataset to obtain a desired outcome (e.g., fjnancial credit score in OSNs). De-anonymisation Possible to use external data sources to re-identify users and their preferences. Privacy breaches a https://en.wikipedia.org/wiki/WOT_Services Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 5 / 40 WoT a extension collecting users’ metadata in the browser.

  7. How safe is Big Data? Adversarial learning Manipulating or inserting corrupted samples in the dataset to obtain a desired outcome (e.g., fjnancial credit score in OSNs). De-anonymisation Possible to use external data sources to re-identify users and their preferences. Privacy breaches a https://en.wikipedia.org/wiki/WOT_Services Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 5 / 40 WoT a extension collecting users’ metadata in the browser.

  8. How safe is Big Data? Adversarial learning Manipulating or inserting corrupted samples in the dataset to obtain a desired outcome (e.g., fjnancial credit score in OSNs). De-anonymisation Possible to use external data sources to re-identify users and their preferences. Privacy breaches a https://en.wikipedia.org/wiki/WOT_Services Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 5 / 40 WoT a extension collecting users’ metadata in the browser.

  9. What is the Web-of-Trust about? Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 6 / 40

  10. What is decentralised PSI useful for? Trust for a non-public Web-of-Trust We should be able to establish trust without a centralised Certifjcation Authority (CA). Going Decentralised The user should able to establish direct trust with its peers, similarly to what happens with PGP, GnuPG and others, but without exposing who the signers are, etc. Why is it desirable? Centralised data silos prone to privacy breach, e.g., third-party apps as the WoT plugin. Governments and powerful authorities, e.g., NSA, GCHQ. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 7 / 40

  11. What is decentralised PSI useful for? Trust for a non-public Web-of-Trust We should be able to establish trust without a centralised Certifjcation Authority (CA). Going Decentralised The user should able to establish direct trust with its peers, similarly to what happens with PGP, GnuPG and others, but without exposing who the signers are, etc. Why is it desirable? Centralised data silos prone to privacy breach, e.g., third-party apps as the WoT plugin. Governments and powerful authorities, e.g., NSA, GCHQ. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 7 / 40

  12. What is decentralised PSI useful for? Trust for a non-public Web-of-Trust We should be able to establish trust without a centralised Certifjcation Authority (CA). Going Decentralised The user should able to establish direct trust with its peers, similarly to what happens with PGP, GnuPG and others, but without exposing who the signers are, etc. Why is it desirable? Centralised data silos prone to privacy breach, e.g., third-party apps as the WoT plugin. Governments and powerful authorities, e.g., NSA, GCHQ. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 7 / 40

  13. Abusing the WWW Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 8 / 40

  14. Defjnition Modeling Abuse Deny Deceive Degrade Disrupt Government Communications Headquarters Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 9 / 40

  15. Defjning Deceive Modeling Abuse Supplanting a known user identity (impersonation) for infmuencing other users behaviour and activities, including assuming false identities (but not pseudonyms). SYLVESTER: framework for automated interaction & alias management in Online Social Networks. UNDERPASS Change outcome of online polls. SCRAPHEAP CHALLENGE: perfect spoofjng of emails from Blackberry targets. BURLESQUE: capability to send spoofed SMS text messages. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 10 / 40

  16. Defjning Degrade Modeling Abuse Disclosing personal and private data of others without their approval as to harm their public image or reputation. BIRDSTRIKE is a Twitter monitoring and profjle data collection tool. SPRING BISHOP: fjnds private photographs of targets in Facebook. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 11 / 40

  17. Defjning Deny Modeling Abuse Encouraging self-harm to other users, promoting violence (direct or indirect), terrorism or similar activities. CLEAN SWEEP: masquerades Facebook wall posts for individuals or entire countries, efgectively denying access to information (censorship). ROLLING THUNDER: distributed denial of service using P2P. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 12 / 40

  18. Defjning Disrupt Modeling Abuse Distracting provocations, denial-of-service, fmooding with messages, promote abuse. BIRDSONG: automated posting of Twitter updates. CANNONBALL: capability to send repeated text messages to a single target. PITBULL: enabling large scale delivery of a tailored message to users of instant messaging services. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 13 / 40

  19. Abuse detection Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 14 / 40

  20. Abuse ground truth Trollslayer tool 1 github.com/algarecu/trollslayer 1 Repo Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 15 / 40

  21. Mutual Subscriptions subscriptions of author of abusive Effjcient Private Set Intersection for a Decentralised Web of Trust Álvaro García-Recuero information. potential victim if that is public in overlap of subscriptions of Security? Hard to prevent increase protect metadata. Privacy: it needs a protocol to potential victim. messages and subscriptions of CCDF shows less overlap among 16 / 40 Feature analysis | Subscription ∩ Subscription | CCDF of mutual followees in log−log scale acceptable abusive 0.20 log[P(X > x)] 0.10 0.05 0.02 10 0 log(x)

  22. Straw-man version Privacy Protocol The set up is as follows: used for a D-H exchange). used for a D-H exchange). Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 17 / 40 Problem: Alice wants to compute n := |L A ∩ L B | Suppose each user has a private key c i and the corresponding public key is C i := g c i where g is some generator L A : set of public keys representing Alice’s subscriptions L B : set of public keys representing Bob’s subscriptions Alice picks an ephemeral private scalar t A ∈ Z / p Z (set of scalars Bob picks an ephemeral private scalar t B ∈ Z / p Z (set of scalars

  23. Privacy Protocol: straw-man version C tA Effjcient Private Set Intersection for a Decentralised Web of Trust Álvaro García-Recuero C tB C tB Bob Alice 18 / 40 C tA X A := { � } � C ∈ L A � X A X B := { � } � C ∈ L B � Y A := Y B X B , Y B := { � } ˆ � ˆ C ∈ X B { � } � � C ∈ X A � = { � } { � } � C ∈ L A � C ∈ L B C tA · tB � = C tB · tA � Alice can get |Y A ∩ Y B | within linear cost

  24. Straw-man Protocol 1 Attack 1 Attack 1: insertion of sock-puppet accounts to infer size of the potential’s victim contact list. Solution: defeat it with shuffming of contact list before sending it to other party. Álvaro García-Recuero Effjcient Private Set Intersection for a Decentralised Web of Trust 19 / 40

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend