Experiences Implemen.ng Usable MPC For Social Good Mayank Varia - - PowerPoint PPT Presentation

experiences implemen ng
SMART_READER_LITE
LIVE PREVIEW

Experiences Implemen.ng Usable MPC For Social Good Mayank Varia - - PowerPoint PPT Presentation

Experiences Implemen.ng Usable MPC For Social Good Mayank Varia Hariri Ins.tute, Boston University Based on joint work with BU: Azer Bestavros, Eric Dunton, Frederick Jansen, Kyle Holzinger, Andrei Lapets, Nikolaj Volgushev UMass: Rose


slide-1
SLIDE 1

Experiences Implemen.ng Usable MPC For Social Good

Based on joint work with

  • BU: Azer Bestavros, Eric Dunton,

Frederick Jansen, Kyle Holzinger, Andrei Lapets, Nikolaj Volgushev

  • UMass: Rose Kelly, Shannon Roberts
  • MIT: Malte Schwarzkopf

with the help of many more…

Mayank Varia

Hariri Ins.tute, Boston University

slide-2
SLIDE 2

A talk on deployment of secure mul.-party computa.on (MPC)

– Only semi-honest MPC is discussed (though recent results indicate malicious security is becoming feasible for such applica.ons) – The func.on being computed is quite simple, ergo… – Performance of the MPC protocol itself is not a boXleneck

An experience talk (not a theory talk)

– LiXle discussion of cryptography – Focus on human and systems challenges – A sample size of one applica.on with three deployments, so other applica.ons and deployments may give rise to different lessons

Caveats Upfront

2

slide-3
SLIDE 3

Cryptographic assump.on: Pay equity is a desirable goal Cryptographic assump.on: Social

3

slide-4
SLIDE 4

100% Talent: The Boston Women’s Compact (April 2013)

4

slide-5
SLIDE 5

The Ini.al Plan (December 2013)

Signatories

5

slide-6
SLIDE 6

6

Mul.-ins.tu.on cloud security effort

Katharine Lusk

Mee/ng with Mayor Menino @ BU, July 31, 2014

= +

Lesson: To deploy MPC, find someone who has overpromised and cannot deliver

Toward Cryptographically Secure Data Analysis (July 2014)

6

slide-7
SLIDE 7

Service Provider (e.g., BU) (web server/database)

Analyst can never access this data

Contributor B

masked data B

Contributor A

random mask A true data A

+

masked data A

=

Analyst (e.g., BWWC) (client running web browser)

random mask B

+ =

true data B

Public-key Encrypted Storage

  • nly Analyst has key;

no one else (including the S.P.) can read the content of this data

masked data A masked data B masked aggregate data

+ =

random mask A random mask B random mask A random mask B

+ =

aggregate mask masked aggregate data

_ =

true aggregate data

Explaining MPC to Execs, HR, and Lawyers (2014-2015)

Lesson: Contextualize MPC’s trust requirements

7

slide-8
SLIDE 8

Lesson: Iden.fy key par.cipants whom you must convince

8

Explaining MPC to Execs, HR, and Lawyers (2014-2015)

slide-9
SLIDE 9

– HR employees love spreadsheets – Data contributors only need a web browser – Modeled off of exis.ng EEO-1 form Lesson: Web browsers won the “corporate environment compa.bility wars”

Developing a Data Aggrega.on System (Spring 2015)

hXps://100talent.org

Lesson: Simplicity increases trust, which drives adop.on

Lesson: Regula.on -> standard schemas

9

slide-10
SLIDE 10

Service Provider (e.g., BU) (web server/database) Contributors Analyst (e.g., BWWC) (client running web browser)

Developing a Data Aggrega.on System (Spring 2015)

Lesson: Exploit asymmetry

Data Analyst Code Distributor

  • Compute

Service Provider

Boston Women’s Workforce Council

  • Do not store data from individual

contributors (liability)

  • Store overall outcome (necessary for

analysis) Boston University

  • No IT staff or expertise
  • Literate in statistical analysis
  • Do not store data from individual

contributors (liability)

  • Do not store overall outcome

(unnecessary)

  • Extensive IT/engineering/CS expertise
  • Production cloud environment
  • Incentive not to collude
  • Incentive not to collude

10

slide-11
SLIDE 11

Explaining the Interface to Users (Spring 2015)

11

– Training sessions & videos – Dry run with synthe.c data – Client-side error messages

slide-12
SLIDE 12

June 8, 2015: D(ata Collec.on) Day

12

slide-13
SLIDE 13

?

Lesson: The lawyers will come for you… even if you build a technology whose main benefit is to keep the lawyers away

June 6, 2015

13

slide-14
SLIDE 14

June 8, 2015: D(ata Collec.on) Day

“If this does not work

  • ut, I will just fax you

the spreadsheet for you to enter…”

Lesson: BoXleneck/weak point of security solu.ons = human users (this threat cannot be removed, but it can be mi.gated)

14

slide-15
SLIDE 15

Our chosen proper.es

– Familiar interface – Compa.bility – Error detec.on/feedback – Asynchrony – Idempotence

Standard usability components

– Learnability – Efficiency (user produc.vity) – Memorability – (Low) errors – Sa.sfac.on

Usability and Heuris.c Evalua.ons

Lesson: When designing, implemen.ng, and deploying any security tool, involve human factors experts from the start.

15

slide-16
SLIDE 16

– Over 150 signatories (71 appeared on collec.on day) – Aggregate data analyzed and published by the BWWC – Data encompasses about 112,600 employees

  • > 10% of the greater Boston area

workforce

  • about $11 billion in wages

– 2017 collec.on: 200+ signatories,

  • f which 120+ contributed data

Larger Collec.on (2016)

Lesson: People will build up trust in your system, even if it’s designed so they don’t need to trust you

16

slide-17
SLIDE 17

Reac.ons

The congresswoman, who had signed

  • nto a bill addressing income disparity

between men and women, was impressed by the relevance he outlined. “It’s linking it back for the members of Congress,” Clark said. “Nobody would think, oh, the Paycheck Fairness Act, how is that Bed into NSF funding?” BWWC co-chair Evelyn Murphy on secure MPC: “Here, we’re beginning to show how to use this sophisBcated computer science research for public programs.”

17

slide-18
SLIDE 18

Reac.ons

18

slide-19
SLIDE 19

Deployment opportuni.es for secure solu.ons

– Could deploy MPC when people have overpromised but cannot deliver on (usually simple) computa.ons – Legal restric.ons, liabili.es, and natural incen.ves can be opportunity

  • …to deploy “secure” techniques and technologies in unexpected ways
  • …to simplify solu.on requirements

– Specialize (to the scenario at hand) not just the protocol(s) but the trust and compu.ng setup

  • iden.fy target user profiles and level of detail and confidence they require
  • separate roles, func.onali.es, and infrastructure (then assign as appropriate)

Human factors will play a role regardless of technical details

– May s.ll be necessary to follow familiar tradi.ons (NDAs) – Human users are (s.ll) a weak point when it comes to security – Conceptual simplicity, ar.fact usability/compa.bility, and community acceptance can drive confidence/adop.on

Summary of Lessons Learned

19

slide-20
SLIDE 20

Thanks!

mul.party.org

20