Visible to the public Secure Computation with Differentially Private Access Patterns

TitleSecure Computation with Differentially Private Access Patterns
Publication TypeConference Paper
Year of Publication2018
AuthorsMazloom, Sahar, Gordon, S. Dov
Conference NameProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5693-0
Keywordscontrol theory, Cyber physical system, cyber physical systems, Differential privacy, graph parallel computation, Human Behavior, privacy, pubcrawl, resilience, Resiliency, Scalability, secure computation
Abstract

We explore a new security model for secure computation on large datasets. We assume that two servers have been employed to compute on private data that was collected from many users, and, in order to improve the efficiency of their computation, we establish a new tradeoff with privacy. Specifically, instead of claiming that the servers learn nothing about the input values, we claim that what they do learn from the computation preserves the differential privacy of the input. Leveraging this relaxation of the security model allows us to build a protocol that leaks some information in the form of access patterns to memory, while also providing a formal bound on what is learned from the leakage. We then demonstrate that this leakage is useful in a broad class of computations. We show that computations such as histograms, PageRank and matrix factorization, which can be performed in common graph-parallel frameworks such as MapReduce or Pregel, benefit from our relaxation. We implement a protocol for securely executing graph-parallel computations, and evaluate the performance on the three examples just mentioned above. We demonstrate marked improvement over prior implementations for these computations.

URLhttps://dl.acm.org/citation.cfm?doid=3243734.3243851
DOI10.1145/3243734.3243851
Citation Keymazloom_secure_2018