CS 5412/LECTURE 17 LEAVE NO TRACE BEHIND
Ken Birman Spring, 2019
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 1
CS 5412/LECTURE 17 Ken Birman LEAVE NO TRACE BEHIND Spring, 2019 - - PowerPoint PPT Presentation
CS 5412/LECTURE 17 Ken Birman LEAVE NO TRACE BEHIND Spring, 2019 HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 1 THE PRIVACY PUZZLE FOR I O T We have sensors everywhere, including in very sensitive settings. They are capturing information
Ken Birman Spring, 2019
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 1
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 2
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 3
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 4
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 5
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 6
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 7
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 8
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 9
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 10
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 11
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 12
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 13
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 14
External client system, or IoT Sensor HTTPS connection (secure!) Intel.com Evil cloud operator Drat! I can’t see anything!
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 15
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 16
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 17
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 18
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 19
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 20
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 21
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 22
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 23
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 24
xe891a1 X32e1dc xdd0135 x63ab12 xd51db5 X9ce568 xab2356 x453a32
Secret Secret Secret
Secret Secret
Result Secret Secret Secret Secret
Strawman:
[Rivest-Adleman-Dertouzos’78]
Server under attack: web app server
[Usenix Security’09]
mobile app server
[Oakland’13]
System: Theory:
Server under attack: web app server
mobile app server
System:
Theory:
[SOSP’11: Popa-Redfield-Zeldovich-Balakrishnan]
[Hacigumus et al.’02][Damiani et al.’03][Ciriani et al’09] [Amanatidis et al.’07][Song et al.’00][Boldyreva et al.’09]
[Gentry’09]
Application
DB server
transformed query plain query
Application
decrypted results encrypted results
DB server
encrypted DB
Proxy
Secret Secret
computation on encrypted data ≈ regular computation
and master key
col1/rank col2/name table1/emp SELECT * FROM emp SELECT * FROM table1
x2ea887
col3/salary
60 100 800 100
Application Proxy
x95c623 x4be219 x17cea7 x2ea887 x95c623 x4be219 x17cea7
col1/rank col2/name table1/emp SELECT * FROM emp WHERE salary = 100
x934bc1 x5a8c34 x5a8c34 x84a21c
SELECT * FROM table1 WHERE col3 = x5a8c34
?
x5a8c34 x5a8c34
?
x5a8c34 x5a8c34 x4be219 x95c623 x2ea887 x17cea7
col3/salary
60 100 800 100
Application Proxy
col1/rank col2/name table1 (emp)
x934bc1 x5a8c34 x5a8c34 x84a21c x578b34 x638e5 4 x122eb4 x9eab8 1
SELECT cdb_sum(col3) FROM table1
x72295 a col3/salary 60 100 800 100
SELECT sum(salary) FROM emp
1060
Application Proxy
e.g., =, !=, IN, GROUP BY, DISTINCT
data moving
e.g., >, <, ORDER BY, ASC, DESC, MAX, MIN, GREATEST, LEAST restricted ILIKE e.g., SUM, +
[Oakland’13]
e.g., SELECT, UPDATE, DELETE, INSERT, COUNT
reveals
pattern
reveals
≈ semantic security
SQL operations:
rank
col1- RND col1- HOM col1- SEARCH col1- DET col1- JOIN col1- OPE ‘CEO’ ‘worker’
value OPE DET RND
int value HOM
Onion Add
value JOIN DET RND
Onion Equality Onion Search
OR
each value value OPE RND
Onion Order
text value SEARCH
emp: rank name salary ‘CEO’ ‘worker’ ‘CEO’ JOIN DET RND Onion Equality col1- OnionEq col1- OnionOrder col1- OnionSearch col2- OnionEq table 1:
… … …
Logical table: Physical table:
RND
‘CEO’ JOIN DET RND
DET Onion Equality
col1- OnionEq col1- OnionOrder col1- OnionSearch col2- OnionEq table 1 … …
equality repeats
common in practice
sum semantic no filter semantic
HOM
CryptDB SQL UDFs
(user-defined functions)
unmodified DBMS
query results
SQL Interface
Application CryptDB Proxy
1.
2.
3.
Application Encrypted columns phpBB 23 HotCRP 22 grad-apply 103 TPC-C 92 sql.mit.edu 128,840 # cols with queries not supported 1,094
apps with sensitive columns tens of thousands
Application Encrypted columns phpBB 23 HotCRP 22 grad-apply 103 TPC-C 92 sql.mit.edu 128,840 Min level: ≈semantic 21 18 95 65 80,053 Min level: DET/JOIN 1 1 6 19 34,212 Min level: OPE 1 2 2 8 13,131
Final onion state
CryptDB Proxy Encrypted DB Application 1
Plain database Application 1
CryptDB Proxy Application 2 Application 2
Homomorphic addition
Encrypted BigQuery
Úlfar Erlingsson, head of security research, Google
Encrypted version of the D4M Accumulo NoSQL engine SEEED implemented on top of the SAP HANA DBMS Users opted-in to run Wordpress over our CryptDB source code
[http://code.google.com/p/encrypted-bigquery-client/]
http://css.csail.mit.edu/cryptdb/
“CryptDB was really eye-opening in establishing the practicality
“CryptDB was [..] directly influential on the design and implementation of Encrypted BigQuery.”
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 64
HTTP://WWW.CS.CORNELL.EDU/COURSES/CS5412/2019SP 65