privacy preserving statistical data analysis on federated
play

Privacy-Preserving Statistical Data Analysis on Federated Databases - PowerPoint PPT Presentation

Privacy-Preserving Statistical Data Analysis on Federated Databases Dan Bogdanov Liina Kamm Sven Laur Pille Pruulmann-Vengerfeldt Riivo Talviste Jan Willemson Annual Privacy Forum Athens, Greece May 20, 2014 UaESMC Problem Statement


  1. Privacy-Preserving Statistical Data Analysis on Federated Databases Dan Bogdanov Liina Kamm Sven Laur Pille Pruulmann-Vengerfeldt Riivo Talviste Jan Willemson Annual Privacy Forum Athens, Greece May 20, 2014 UaESMC

  2. Problem Statement • State has many databases • Many of these contain personally identifiable information (PII) 1/8

  3. X-Road Infrastructure • Today, state databases are • interconnected by secure authenticated channels • interoperable using standardized protocols and data formats 2/8

  4. The Risks of Linking Databases • Combining them would support state decisions Super database 3/8

  5. The Risks of Linking Databases • Combining them would support state decisions Super database • Creating “super databases” is a privacy risk • Data is decrypted for analysis 3/8

  6. The Risks of Linking Databases • Combining them would support state decisions HACK ME Super database • Creating “super databases” is a privacy risk • Data is decrypted for analysis • Interesting target for attackers 3/8

  7. Secure Multi-party Computation • Solution that does not require creating super database and preserves data utility • Allows to compute on encrypted data • All values are secret shared 4/8

  8. Secure Multi-party Computation • Solution that does not require creating super database and preserves data utility • Allows to compute on encrypted data • All values are secret shared 4/8

  9. Secure Multi-party Computation • Solution that does not require creating super database and preserves data utility • Allows to compute on encrypted data • All values are secret shared 4/8

  10. Secure Multi-party Computation • Solution that does not require creating super database and preserves data utility • Allows to compute on encrypted data • All values are secret shared • Distributed responsibility • No individual computation party has control over any inputs 4/8

  11. Our Practical Results • We asked end-users whether they can see themselves using such a technology and the results were positive • We used the Sharemind secure multi-party computation platform to implement a statistics suite • Database linking is performed without declassifying the data • We implemented a set of statistical functions and tests using Sharemind secure floating point operations 5/8

  12. Privacy-Preserving Linking and Analysis 6/8

  13. Privacy-Preserving Linking and Analysis 6/8

  14. Privacy-Preserving Linking and Analysis 6/8

  15. Privacy-Preserving Linking and Analysis 6/8

  16. Future Work The PRIST study will be carried out in the autumn of 2014. Our goal is to help researchers, companies and governments understand the possibilities of secure multi-party computation technology. We believe that secure computation can be used for sharing confidential data so that leaders in both private and public sectors can make better decisions without compromising privacy. 7/8

  17. Thank you! https://sharemind.cyber.ee The work of Riivo Talviste is supported by European Social Fund Doctoral Studies and Internationalisation Programme DoRa. “Usable and Efficient Secure Multiparty Computation” (UaESMC) project is funded by the European Union Seventh Framework Programme for research, technological development and demonstration under grant agreement no FP7-284731. http://www.usable-security.eu/en “Privacy-preserving statistical studies on linked databases” (PRIST) project is funded by the European Regional Development Fund through the Implementing Agency Archimedes Foundation. http://cyber.ee/en/research/research-projects/prist/ The work of Jan Willemson is supported by Competence Centre in Electronics-, Info- and Communication Technologies (ELIKO). All research done by employees of Cybernetica AS is also supported by the European Regional Development Fund through Centre of Excellence in Computer Science (EXCS), and by the Estonian Research Council under Institutional Research Grant IUT27-1. 8/8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend