Top Banner
Enforcing Privacy in Online Services Sonia Ben Mokhtar Directrice de Recherches CNRS Paris P2P Festival 09/01/2020
37

Enforcing Privacy in Online Services

Dec 18, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Enforcing Privacy in Online Services

Enforcing Privacy in Online Services

Sonia Ben Mokhtar Directrice de Recherches CNRS

Paris P2P Festival 09/01/2020

Page 2: Enforcing Privacy in Online Services

Who am I?

• Head of the distributed systems & information retrieval group @LIRIS lab, Lyon, France • liris.cnrs.fr/drim

• Research topics • Distributed systems • Fault-tolerance • Performance • Privacy

2

Page 3: Enforcing Privacy in Online Services

Today’s Distributed Systems

Page 4: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

Introduction

2

Every day, millions of

users are querying

SEARCH ENGINES

USER PROFILES

We also use this information

[that we collect from all of

our services] to offer you

tailored content – like giving

you more relevant search

results and ads.

http://www.google.com/policies/privacy/

An example: Web Search

Page 5: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

Privacy threats

3

numb �ngers

60 single men

dog that urinates on everything

Landscapers in Lilburn, Ga,

Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is

exposed for AOL searcher no. 4417749." New York Times 9.2008

(2006): 8For.

Retrieve user’s identity

User ID4417749

Web Search: Privacy Threats

Page 6: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

Privacy threats

4

numb �ngers

60 single men

dog that urinates on everything

Landscapers in Lilburn, Ga,

Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is

exposed for AOL searcher no. 4417749." New York Times 9.2008

(2006): 8For.

Retrieve user’s identity

Thelma Arnold

a 62-year-old widow who lives in Lilburn, Ga., and loves her three dogs.

Web Search: Privacy Threats

Page 7: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

Privacy threats

5

numb �ngers

60 single men

dog that urinates on everything

Landscapers in Lilburn, Ga,

Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is

exposed for AOL searcher no. 4417749." New York Times 9.2008

(2006): 8For.

Retrieve user’s identity

Thelma Arnold

a 62-year-old widow who lives in Lilburn, Ga., and loves her three dogs.

Age

Gender

Zip Code

InterestsDiseases

Religion

Infer extra information

Jones, Rosie, et al. "I know what you did last summer: query

logs and user privacy." Proceedings of the sixteenth ACM

conference on Conference on information and knowledge

management. ACM, 2007.

Web Search: Privacy Threats

Page 8: Enforcing Privacy in Online Services

Another Example: Video StreamingBackground

P�����S�����Evaluation

ContextBackgroundProblem statement

Video content consumption evolves...

P�����S����� Simon Da Silva April 17, 2019 01/23

Page 9: Enforcing Privacy in Online Services

Streaming over CDNs

Page 10: Enforcing Privacy in Online Services

Streaming with DASH

Page 11: Enforcing Privacy in Online Services

Still…Background

P�����S�����Evaluation

ContextBackgroundProblem statement

Video content consumption evolves...

P�����S����� Simon Da Silva April 17, 2019 01/23

Page 12: Enforcing Privacy in Online Services

Multi-Source StreamingBackground

P�����S�����Evaluation

Our ideaP�����S�����Technical description

MS-Stream

MS-Stream Contentservers

MS-Stream Clients

ContentDelivery

P2P

CDN

HAS

P2P

+

CDN

P2P

+

HAS

CDN

+

HAS

Reduced

scalability costHigh reliability

High QoE

Dynamic resource allocation

QoE fairnessamong users

P�����S����� Simon Da Silva April 17, 2019 07/23

Tracker

Page 13: Enforcing Privacy in Online Services

Privacy issuesBackground

P�����S�����Evaluation

Our ideaP�����S�����Technical description

MS-Stream

MS-Stream Contentservers

MS-Stream Clients

ContentDelivery

P2P

CDN

HAS

P2P

+

CDN

P2P

+

HAS

CDN

+

HAS

Reduced

scalability costHigh reliability

High QoE

Dynamic resource allocation

QoE fairnessamong users

P�����S����� Simon Da Silva April 17, 2019 07/23

Tracker

Page 14: Enforcing Privacy in Online Services

Outline• Introduction

• Motivation/Privacy Threats

• Enforcing Privacy in Online Services

• Using Intel SGX processors and P2P

• Decentralized Proxy Service for Web Search

• Edge-assisted Video Streaming

• Conclusion & Perspectives

Page 15: Enforcing Privacy in Online Services

SGX: Software Guard Extensions

16

● Limitations:

– Memory usage is limited to 128 MB per CPU

● New instruction set since Intel Skylake processors (2015)

● Provides a protected environment called enclave

– Memory encryption, integrity and freshness

– Not even the OS or hypervisor are able to inspect

– Suitable for using in hostile environments (cloud)

SGX: Software Guard Extensions

Page 16: Enforcing Privacy in Online Services

Outline• Introduction

• Motivation/Privacy Threats

• Enforcing Privacy in Online Services

• Using Intel SGX processors and P2P

• Decentralized Proxy Service for Web Search

• Edge-assisted Video Streaming

• Conclusion & Perspectives

Page 17: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

Problem

6

● How can users protect their privacy from curious search engines?

1 Hiding identities (IP Address)

2 Making queries and user’s interests indistinguishable

Private Web search

Page 18: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

State of the art

7

Unlinkability between user and query (Tor)

Unlinkability

Page 19: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

State of the art

8

Indistinguishability between real and fake queries (TrackMeNot)

Indistinguishability

Page 20: Enforcing Privacy in Online Services

Unlink. + Indisting.: PEASIntroduction State-of-the-art Countermeasure Conclusion

PRIVACY PROXY PROTOCOL

PRIVACY PROXY

SEARCH ENGINERECEIVER ISSUERCLIENT A

E(Qi,ki)

{Ai}ki

x,E(Qi,ki) Qi

Aix,{Ai}ki

x <> Client A

E(m) RSA encryption of message m with the public key of the issuer{m}i AES encryption of message m with key Ki

Qi i-th query of user UKi AES encryption key associated with query QiAi Answer to query QiX An anonymous identifier

Albin PETIT Towards Efficient and Accurate Privacy Preserving Web Search December 8, 2014 – 15 / 33PEAS: Private, Efficient and Accurate Web Search. IEEE TrustCom'15. 2015.

Page 21: Enforcing Privacy in Online Services

INTRODUCTION PEAS EVALUATION CONCLUSION

EvaluationFramework

16

AOL query logs

Private, Efficient and Accurate Web Search

PEAS

2/3

1/3

USER PROFILES

1

605958

2 3

SimAttack

{user, query}

{u, q} {q,fq0,…,fqk-1}

equals?

{u, q}

Measuring Privacy

SimAttack: private web search under fire. Journal of Internet Services and Applications 7(1): 2:1-2:17 (2016).

Page 22: Enforcing Privacy in Online Services

Measuring privacy

0

5

10

15

20

25

30

35

40

45

50

TOR

TrackMeN

ot

GooPIR

PEAS

X-SEARCH

CYC

LOSA

Re

-Id

en

tific

atio

n R

ate

(%

)

Page 23: Enforcing Privacy in Online Services

Measuring privacy

0

5

10

15

20

25

30

35

40

45

50

TOR

TrackMeN

ot

GooPIR

PEAS

X-SEARCH

CYC

LOSA

Re

-Id

en

tific

atio

n R

ate

(%

)

Page 24: Enforcing Privacy in Online Services

PEAS limitations

• Weak adversarial model

• Relies on two non colluding servers

• Quality of fake queries

• Scalability

Page 25: Enforcing Privacy in Online Services

X-Search: Revisiting private web search with Intel SGX

Middleware’17 – December 11-15, 2017 – Las Vegas, USA

X-Search Architecture

22

Client Untrusted Cloud Provider Search Engine

Encrypted flow

GET /search?q=Qu

Obfuscation

Past queries

Get k randomqueries

Storecurrentquery

GET /search?q=Qp1 OR Qu OR ... OR Qpk

Filtering

X-Search

X-Search: Revisiting Private Web Search using Intel SGX. Middleware 2017.

Page 26: Enforcing Privacy in Online Services

Measuring privacy

0

5

10

15

20

25

30

35

40

45

50

TOR

TrackMeN

ot

GooPIR

PEAS

X-SEARCH

CYC

LOSA

Re

-Id

en

tific

atio

n R

ate

(%

)

Page 27: Enforcing Privacy in Online Services

• Scalability

• Query limitation wrt search engine

• Accuracy

X-Search Limitations

Page 28: Enforcing Privacy in Online Services

Cyclosa Architecture

20

• Every node in the system acts as a proxy node for others

• Use Intel SGX

• Built as a browser extension

• Considers query sensitivity

Cyclosa Architecture

Page 29: Enforcing Privacy in Online Services

Cyclosa Architecture

20

Cyclosa Architecture

20

Cyclosa Architecture

20

Cyclosa Architecture

20

Cyclosa Architecture

20

Page 30: Enforcing Privacy in Online Services

Measuring privacy

0

5

10

15

20

25

30

35

40

45

50

TOR

TrackMeN

ot

GooPIR

PEAS

X-SEARCH

CYC

LOSA

Re

-Id

en

tific

atio

n R

ate

(%

)

Page 31: Enforcing Privacy in Online Services

Outline• Introduction

• Motivation/Privacy Threats

• Enforcing Privacy in Online Services

• Using Intel SGX processors and P2P

• Decentralized Proxy Service for Web Search

• Edge-assisted Video Streaming

• Conclusion & Perspectives

Page 32: Enforcing Privacy in Online Services

Back to Video StreamingBackground

P�����S�����Evaluation

Our ideaP�����S�����Technical description

MS-Stream

MS-Stream Contentservers

MS-Stream Clients

ContentDelivery

P2P

CDN

HAS

P2P

+

CDN

P2P

+

HAS

CDN

+

HAS

Reduced

scalability costHigh reliability

High QoE

Dynamic resource allocation

QoE fairnessamong users

P�����S����� Simon Da Silva April 17, 2019 07/23

Tracker

Page 33: Enforcing Privacy in Online Services

Privacy Objectives

• Allow users to access video streams while enforcing delta-unlinkability• The probability of a user u being interested in a video v is at most equal to delta

• How?

• Using TEEs to prevent information leakage (metadata server, the tracker, on the client side)

• Protecting network traffic

• Generating fake requests

Page 34: Enforcing Privacy in Online Services

Video streaming

PRIVATUBE

Evaluation

Context

Background

Problem statement

Privacy objective

CDNservers

Peers ContentDelivery

PRIVATUBE Simon Da Silva Thursday 12 December 2019 10/30

Using Intel SGXVideo streaming

PRIVATUBE

Evaluation

Overview

Architecture

Fake requests

PRIVATUBE

? ? ? ?

PrivaTubeContentservers

PrivaTubeClients

ContentDelivery

PRIVATUBE Simon Da Silva Thursday 12 December 2019 12/30

Page 35: Enforcing Privacy in Online Services

Video streaming

PRIVATUBE

Evaluation

Context

Background

Problem statement

Adversary model

CDNservers

Peers ContentDelivery

PRIVATUBE Simon Da Silva Thursday 12 December 2019 11/30

Protecting Against Insider Attacks

Page 36: Enforcing Privacy in Online Services

Video streaming

PRIVATUBE

Evaluation

Overview

Architecture

Fake requests

PRIVATUBE fake requests

? ? ? ?

PrivaTubeContentservers

PrivaTubeClients

Fakerequests E?

D?C?B?

A?

PRIVATUBE Simon Da Silva Thursday 12 December 2019 17/30

Using Fake Requests

Page 37: Enforcing Privacy in Online Services

Sum up • Enforcing privacy in online services is important

• 2 examples Video Streaming and Web Search

• Many other examples: Recommender Systems, Location-based services, …

• P2P and secure hardware can help

• More info: https://liris.cnrs.fr/drim