skip to main content
10.1145/1315245.1315307acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Privacy-preserving remote diagnostics

Published:28 October 2007Publication History

ABSTRACT

We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a branching diagnostic program with classification labels in the leaves to the user's attribute vector. The user learns only the label assigned by the program to his vector; the diagnostic program itself remains secret. The program's owner does not learn anything. Our construction is significantly more efficient than those obtained by direct application of generic secure multi-party computation techniques.

We use our protocol to implement a privacy-preserving version of the Clarify system for software fault diagnosis, and demonstrate that its performance is acceptable for many practical scenarios.

References

  1. R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proc. ACM SIGMOD International Conference on Management of Data, pages 439--450. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Beaver. Foundations of secure interactive computing. In Proc. Advances in Cryptology - CRYPTO 1991, volume 576 of LNCS, pages 377--391. Springer, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Blake and V. Kolesnikov. Strong conditional oblivious transfer and computing on intervals. In Proc. Advances in Cryptology - ASIACRYPT 2004, volume 3329 of LNCS, pages 515--529. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proc. 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 128--138. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Broadwell, M. Harren, and N. Sastry. Scrash: A system for generating secure crash information. In Proc. 12th USENIX Security Symposium, pages 273--284. USENIX, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Proc. Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 126--144. Springer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Canetti. Security and composition of multiparty cryptograpic protocols. J. Cryptology, 13(1):143--202, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Canetti, Y. Ishai, R. Kumar, M. Reiter, R. Rubinfeld, and R. Wright. Selective private function evaluation with applications to private statistics. In Proc. 20th ACM Symposium on Principles of Distributed Computing (PODC), pages 293--304. ACM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Davis, J. Ha, C. Rossbach, H. Ramadan, and E. Witchel. Cost-sensitive decision tree learning for forensic classification. In Proc. 17th European Conference on Machine Learning (ECML), volume 4212 of LNCS, pages 622--629. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. Wright. Secure multiparty computation of approximations. In Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP), volume 2076 of LNCS, pages 927--938. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Feigenbaum, B. Pinkas, R. Ryger, and F. Saint-Jean. Secure computation of surveys. In Proc. EU Workshop on Secure Multiparty Protocols, 2004.Google ScholarGoogle Scholar
  12. M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 1--19. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gateway. System management services agreement. http://www.gateway.com/about/legal/warranties/20461r10.pdf, 1999.Google ScholarGoogle Scholar
  14. E. Goh, L. Kruger, D. Boneh, and S. Jha. Secure function evaluation with ordered binary decision diagrams. In Proc. 13th ACM Conference on Computer and Communications Security (CCS), pages 410--420. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Goldreich. Foundations of Cryptography: Volume II (Basic Applications). Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proc. 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218--229. ACM, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Ha, C. Rossbach, J. Davis, I. Roy, H. Ramadan, D. Porter, D. Chen, and E. Witchel. Improved error reporting for software that uses black box components. In Proc. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pages 101--111. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Q. Huang, D. Jao, and H. Wang. Applications of secure electronic voting to automated privacy-preserving troubleshooting. In Proc. 12th ACM Conference on Computer and Communications Security (CCS), pages 68--80. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Ishai and A. Paskin. Evaluating branching programs on encrypted data. In Proc. 4th Theory of Cryptography Conference (TCC), volume 4392 of LNCS, pages 575--594. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Jarecki and V. Shmatikov. Efficient two-party secure computation on committed inputs. In Proc. Advances in Cryptology - EUROCRYPT 2007, volume 4515 of LNCS, pages 97--114. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Kilian. Founding cryptography on oblivious transfer. In Proc. 20th Annual ACM Symposium on Theory of Computing (STOC), pages 20--31. ACM, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptology, 15(3):177--206, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Y. Lindell and B. Pinkas. A proof of Yao's protocol for secure two-party computation. http://eprint.iacr.org/2004/175, 2004.Google ScholarGoogle Scholar
  24. D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In Proc. 13th USENIX Security Symposium, pages 287--302. USENIX, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. McGraw and J. Viega. Making your software behave: Security by obscurity. http://www.ibm.com/developerworks/java/library/s-obs.html,2000.Google ScholarGoogle Scholar
  26. Microsoft. Privacy statement for the Microsoft error reporting service. http://oca.microsoft.com/en/dcp20.asp,2006.Google ScholarGoogle Scholar
  27. Microsoft. Reporting and solving computer problems. http://windowshelp.microsoft.com/Windows/en-US/Help/d97ba15e-9806-4ff3-8ead-71b8d62123fe1033.mspx, 2006.Google ScholarGoogle Scholar
  28. Microsoft. How to: Configure microsoft error reporting. http://msdn2.microsoft.com/en-us/library/bb219076.aspx, 2007.Google ScholarGoogle Scholar
  29. M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proc. 33rd ACM Symposium on Theory of Computing (STOC), pages 590--599. ACM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In Proc. 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 448--457. SIAM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Naor, B. Pinkas, and R. Sumner. Privacy preserving auctions and mechanism design. In Proc. 1st ACM Conference on Electronic Commerce, pages 129--139. ACM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. Naraine. Dr. Watson's Longhorn makeover raises eyebrows. http://www.eweek.com/article2/0,1759,1822142,00.asp, 2005.Google ScholarGoogle Scholar
  33. Oracle. Oracle sues SAP. http://www.oracle.com/sapsuit/index.html, 2007.Google ScholarGoogle Scholar
  34. P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. Advances in Cryptology - EUROCRYPT 1999, volume 1592 of LNCS, pages 223--238. Springer, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  35. M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.Google ScholarGoogle Scholar
  36. T. Sander, A. Young, and M. Yung. Non-interactive CryptoComputing for NC1. In Proc. 40th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 554--566. IEEE, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. B. Stone. A lively market, legal and not, for software bugs. New York Times, Jan 30 2007.Google ScholarGoogle Scholar
  38. H. Wang, Y.-C. Hu, C. Yuan, Z. Zhang, and Y.-M. Wang. Friends troubleshooting network: Towards privacy-preserving, automatic troubleshooting. In 3rd International Workshop on Peer-to-Peer Systems (IPTPS), volume 3279 of LNCS, pages 184--194. Springer, 2004.Google ScholarGoogle Scholar
  39. J. Weideman. Automated problem reports. https://wiki.ubuntu.com/AutomatedProblemReports,2006.Google ScholarGoogle Scholar
  40. A. Yao. How to generate and exchange secrets. In Proc. 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 162--167. IEEE, 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-preserving remote diagnostics

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
            October 2007
            628 pages
            ISBN:9781595937032
            DOI:10.1145/1315245

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 October 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            CCS '07 Paper Acceptance Rate55of302submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader