1
The Privacy of Secured Computations
Adam Smith Penn State Crypto & Big Data Workshop December 15, 2015 Cartoon:
The Privacy of Secured Computations Adam Smith Penn State Crypto - - PowerPoint PPT Presentation
The Privacy of Secured Computations Adam Smith Penn State Crypto & Big Data Workshop Relax it can only December 15, 2015 see metadata. Cartoon: 1 Big Data Every <length of time> your <household object> generates
1
Adam Smith Penn State Crypto & Big Data Workshop December 15, 2015 Cartoon:
4
5
6
7
queries answers)
Government, researchers, businesses (or) Malicious adversary
8
9
10
queries answers)
Government, researchers, businesses (or) Malicious adversary
11
12
Anonymized NetFlix data Alice Bob Charlie Danielle Erica Frank Public, incomplete IMDB data Identified NetFlix Data
Alice Bob Charlie Danielle Erica Frank
Image credit: Arvind Narayanan
13
14
15
people
reconstruction
attributes
16
reconstruction
[Dwork, S., Steinke, Ullman, Vadhan ‘15]
[Frederiksson et al ‘15]
17
18
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
½ ¾ ½ ½ ¾ ½ ¼ ¼ ½
𝒐𝟑 𝒏
19
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
½ ¾ ½ ½ ¾ ½ ¼ ¼ ½
20
False positive rate True positive rate
that I am at risk for cancer
21
* Model inversion used two few different ways in [Frederickson et al.] ** Details later.
22
23
24
25
local random coins
A(x)
26
local random coins
A(x’)
local random coins
A(x)
27
local random coins
A(x’)
local random coins
A(x)
Neighboring databases induce close distributions
28
local random coins
A(x’)
local random coins
A(x)
Neighboring databases induce close distributions
29
Neighboring databases induce close distributions
1 𝑜 𝑗 𝑦𝑗
30
local random coins
31
local random coins
x x’ f(x) f(x’)
32
local random coins
33
local random coins
proportion
34
Neighboring databases induce close distributions
35
37
Downside: tricky to instantiate
38
local random coins
A(x’)
local random coins
A(x)
40
41
2006]
42
local random coins
43
44
45
46
adding noise
47
48
49
52
53
54
55
56
57
58