experiences implemen ng
play

Experiences Implemen.ng Usable MPC For Social Good Mayank Varia - PowerPoint PPT Presentation

Experiences Implemen.ng Usable MPC For Social Good Mayank Varia Hariri Ins.tute, Boston University Based on joint work with BU: Azer Bestavros, Eric Dunton, Frederick Jansen, Kyle Holzinger, Andrei Lapets, Nikolaj Volgushev UMass: Rose


  1. Experiences Implemen.ng Usable MPC For Social Good Mayank Varia Hariri Ins.tute, Boston University Based on joint work with • BU: Azer Bestavros, Eric Dunton, Frederick Jansen, Kyle Holzinger, Andrei Lapets, Nikolaj Volgushev • UMass: Rose Kelly, Shannon Roberts • MIT: Malte Schwarzkopf with the help of many more…

  2. Caveats Upfront A talk on deployment of secure mul.-party computa.on (MPC) – Only semi-honest MPC is discussed (though recent results indicate malicious security is becoming feasible for such applica.ons) – The func.on being computed is quite simple, ergo… – Performance of the MPC protocol itself is not a boXleneck An experience talk (not a theory talk) – LiXle discussion of cryptography – Focus on human and systems challenges – A sample size of one applica.on with three deployments, so other applica.ons and deployments may give rise to different lessons 2

  3. Social Cryptographic assump.on: Pay equity is a desirable goal Cryptographic assump.on: 3

  4. 100% Talent: The Boston Women’s Compact (April 2013) 4

  5. The Ini.al Plan (December 2013) Signatories 5

  6. Toward Cryptographically Secure Data Analysis (July 2014) Mul.-ins.tu.on cloud security effort + = Mee/ng with Mayor Menino @ BU, July 31, 2014 Katharine Lusk Lesson: To deploy MPC, find someone who has overpromised and cannot deliver 6 6

  7. Explaining MPC to Execs, HR, and Lawyers (2014-2015) Contributor A Service Provider (e.g., BU) Analyst (e.g., BWWC) (web server/database) (client running web browser) true random masked masked masked masked masked + = + = data mask data data data aggregate aggregate A A A A B data data _ Analyst can never access this data true random masked + = data mask data random random + = aggregate B B B mask mask mask random A B mask A = random mask B true aggregate Public-key Encrypted Storage data only Analyst has key; no one else (including the S.P.) can read the content of this data Contributor B Lesson: Contextualize MPC’s trust requirements 7

  8. Explaining MPC to Execs, HR, and Lawyers (2014-2015) Lesson: Iden.fy key par.cipants whom you must convince 8

  9. Developing a Data Aggrega.on System (Spring 2015) hXps://100talent.org Lesson: Simplicity increases trust, which drives adop.on Lesson: Web browsers won the “corporate environment compa.bility wars” – HR employees love spreadsheets – Data contributors only need a web browser – Modeled off of exis.ng EEO-1 form Lesson: Regula.on -> standard schemas 9

  10. Developing a Data Aggrega.on System (Spring 2015) Contributors Service Provider (e.g., BU) Analyst (e.g., BWWC) (web server/database) (client running web browser) Code Data Boston University Boston Women’s Workforce Council Distributor Analyst • Extensive IT/engineering/CS expertise • No IT staff or expertise --------------- • Production cloud environment • Literate in statistical analysis Compute • Do not store data from individual • Do not store data from individual Service contributors (liability) contributors (liability) Provider • Do not store overall outcome • Store overall outcome (necessary for (unnecessary) analysis) • Incentive not to collude • Incentive not to collude Lesson: Exploit asymmetry 10

  11. Explaining the Interface to Users (Spring 2015) – Training sessions & videos – Dry run with synthe.c data – Client-side error messages 11

  12. June 8, 2015: D(ata Collec.on) Day 12

  13. June 6, 2015 ? Lesson: The lawyers will come for you… even if you build a technology whose main benefit is to keep the lawyers away 13

  14. June 8, 2015: D(ata Collec.on) Day “If this does not work out, I will just fax you the spreadsheet for you to enter…” Lesson: BoXleneck/weak point of security solu.ons = human users (this threat cannot be removed, but it can be mi.gated) 14

  15. Usability and Heuris.c Evalua.ons Our chosen proper.es – Familiar interface – Compa.bility – Error detec.on/feedback – Asynchrony – Idempotence Standard usability components – Learnability – Efficiency (user produc.vity) – Memorability – (Low) errors – Sa.sfac.on Lesson: When designing, implemen.ng, and deploying any security tool, involve human factors experts from the start. 15

  16. Larger Collec.on (2016) – Over 150 signatories (71 appeared on collec.on day) – Aggregate data analyzed and published by the BWWC – Data encompasses about 112,600 employees • > 10% of the greater Boston area workforce • about $11 billion in wages – 2017 collec.on: 200+ signatories, of which 120+ contributed data Lesson: People will build up trust in your system, even if it’s designed so they don’t need to trust you 16

  17. Reac.ons The congresswoman, who had signed onto a bill addressing income disparity between men and women, was impressed by the relevance he outlined. “It’s linking it back for the members of Congress,” Clark said. “Nobody would think, oh, the Paycheck Fairness Act, how is that Bed into NSF funding?” BWWC co-chair Evelyn Murphy on secure MPC: “ Here, we’re beginning to show how to use this sophisBcated computer science research for public programs. ” 17

  18. Reac.ons 18

  19. Summary of Lessons Learned Deployment opportuni.es for secure solu.ons – Could deploy MPC when people have overpromised but cannot deliver on (usually simple) computa.ons – Legal restric.ons, liabili.es, and natural incen.ves can be opportunity • …to deploy “secure” techniques and technologies in unexpected ways • …to simplify solu.on requirements – Specialize (to the scenario at hand) not just the protocol(s) but the trust and compu.ng setup • iden.fy target user profiles and level of detail and confidence they require • separate roles, func.onali.es, and infrastructure (then assign as appropriate) Human factors will play a role regardless of technical details – May s.ll be necessary to follow familiar tradi.ons (NDAs) – Human users are (s.ll) a weak point when it comes to security – Conceptual simplicity, ar.fact usability/compa.bility, and community acceptance can drive confidence/adop.on 19

  20. Thanks! mul.party.org 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend