SlideShare a Scribd company logo
1 of 31
Private and Secure Secret
Shared MapReduce
Shlomi Dolev1, Yin Li2, and Shantanu Sharma1
1 Ben-Gurion University of the Negev, Israel
2 Xinyang Normal University, China
30th Annual IFIP WG 11.3 Conference on Data and Applications Security
and Privacy (DBSec 2016), Trento, Italy
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
2
• Why is it required to ensure privacy?
– Users send data on the clouds
– Curious mappers and reducers can
• Store useful data
• Know the given job
• Where is it required?
– Banking, financial, retail, and healthcare
Introduction
3
Introduction
• What others do?
4
Work on encrypted data
Authentication & Compress + Encrypt data
Encrypt data-at-rest
Secure storage of data in HDFS
Provide authentication before using Hadoop cluster
They are making ‘computational secure’ data.
But, for how long is it secured??
Make information secure data
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
5
STEP 4:
Interpolatio
n and obtain
the final
results
Database
STEP3: Master
Process
Secret-
shares of
the
database
Data owner User-side
M
M
M
R
R
STEP3: Master
Process
Secret-
shares of
the
database
M
M
M
R
R
STEP3: Master
Process
Secret-
shares of
the
database
M
M
M
R
R
Notations:
M: Mapper
R: Reducer
System
Settings
Adversarial Setting
• Honest-but-curious adversary
– Wants to gain knowledge
– But executes computations honestly
7
Parameters of Analysis
• Communication cost
• Computational cost
• Number of rounds
8
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
9
Overview of the Approach
• Accumulating Automata*
– Make shares of data (or input split)
– Send these shares to mappers
• Mappers do not know the computation and data
– Mappers have a defined accumulating automata
– Example: Search a pattern “LO” in the string
“LOXLO”
10
*S. Dolev, N. Giboa, X. Li, “Accumulating Automata and Cascaded Equations
Automata for Communicationless Information Theoretically Secure Multi-Party
Computation: Extended Abstract,” SCC@ASIACCS, pages 21—29, 2015.
Overview of the Approach
11
L = {v3,v4}
O = {v5,v10}
X ={v1,v1}
L = {v4,v5}
O = {v15,v20}
N1 N2 N3
Mapper 1
2 1 1
L = {v5,v6}
O = {v10,v19}
X = {v2,v2}
L = {v6,v7}
O = {v20,v29}
N1 N2 N3
Mapper 2
3 4 8
Example: Search a pattern “LO” in
the string “LOXLO”
L = {v7,v9}
O ={v15,v28}
X = {v3,v3}
L = {v7,v9}
O ={v15,v28}
N1 N2 N3
Mapper 3
4 9 27
L = {v9,v12}
O={v20,v37}
X = {v4,v4}
L = {v9,v12}
O={v20,v37}
N1 N2 N3
Mapper 4
5 16 64
Reducer
v140
v698
v1964
v4226
𝑁1 𝑀
𝑘+1
= 𝑣0
𝑁2 𝑀
𝑘+1
= 𝑁1 𝑀
𝑘
. 𝑣1
𝑁3 𝑚
𝑘+1
= 𝑁3 𝑀
𝑘
+ 𝑁2 𝑀
𝑘
. 𝑣2
LO, 2
Creating Secret-Shares
• Consider only English words
– Represent an alphabet as:
• ‘A’ is represented as (11, 02, 03, . . ., 026)
– Make secret-shares of every bit by selecting
different polynomials of an identical degree
– Since we use different polynomials for creating
secret-shares of each bit, multiple occurrences
of a word in a database have different secret-
shares
12
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
13
Count Operation
• String-matching based
– Matches a value of a relation with a pattern, where
the value and the pattern are of the form of
secret-shares
• Two phases
– Phase 1: Privacy-preserving counting in the clouds
– Phase 2: Result reconstruction at the user-side
14
Count Operation
• Working in the cloud: A mapper
– Creates an automaton of x+1 nodes where x is the
length of p
– Initializes values of these nodes
– The first node is assigned a value one (N1 = 1) and
all the other nodes are assigned values zero (Ni =
0)
15
Count Operation
• Working in the cloud: Count ‘John’
16
Name
Adam
John
John
N1 = 1
v1
N2 = 0 N3 = 0 N4 = 0 N5 = 0
v1 v2 v3 v4
v1 = J * A v2 = o * d v3 = a * h v4 = m * n
N1 = 1 N2 = 0 N3 = 0 N4 = 0 N5 = 1
v1 = J * J v2 = o * o v3 = h * h v4 = n * n
N1 = 1 N2 = 0 N3 = 0 N4 = 0 N5 = 2
Count Operation
• Working at the user side
• Result construction – a simple interpolation
operation
17
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
18
Search and Fetch Operation
• Working in the cloud: A mapper
– PHASE 1: Finding addresses of tuples containing p
– PHASE 2: Fetching all the tuples containing p
19
Search and Fetch Operation
Unary Occurrence
• Working in the cloud: A mapper
– No need to know the address
– Multiply
• Results will be 0 or 1 of the form of secret-shares
• Multiply the result with the tuple
– Add the values of an attribute
20
Name Department
Adam CS
John EC
John CS
Adam
Name Department
1 1
0 0
0 0
1 1
Search and Fetch Operation
Unary Occurrence
• Working at the user side
– A simple interpolation
21
Search and Fetch Operation
Multiple Occurrences
• Tradeoff
– Number of rounds vs computational load at the
user side
– Naïve algorithm and a database partitioning
algorithm
22
Search and Fetch Operation
Multiple Occurrences
• The first way: Naïve Algorithm
– Requires a lot of computation at the user side
while only 2 rounds are required
– Now the user can know the address
23
Name Department
Adam CS
John EC
John CS
John
Name
0
1
1Multiply
Search and Fetch Operation
Multiple Occurrences
• The first way: Naïve Algorithm – But HOW
TO FETCH
– Say L occurrences are there
– Create a matrix M of L*n
24
Name Department
Adam CS
John EC
John CS
0 1 0
0 0 1
Name
0
1
1
Name Department
John EC
John CS*
M
Search and Fetch Operation
Multiple Occurrences
• The second way
– Requires less computation at the user side while
more than 2 rounds are required
– Partitions database and knows address
– Then fetches tuples using the solution suggested
in the naïve algorithm
25
#Occurrences = 2
#Occurrences = 2
Q&A Round 1 Q&A Round 2
Database
#Occurrence = 0
#Occurrences = 2
#Occurrence = 0
#Occurrence = 1
#Occurrence = 1
Q&A Round 3
Search and Fetch Operation
Multiple Occurrences
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
27
Other Operations
• Equijoin
– Use two layers of clouds, where the first layer
performs fetch operation and the second layer
performs equijoin operation
• Range query
– By using 2’s complement
– Count the occurrence of number that lies in the range and
then fetch those tuples
28
Outline
• Introduction
• System Settings
• Overview of the Approach
• Count Operation
• Search and Fetch Operation
• Other Operations
• Conclusion
29
Conclusion
• Privacy-preserving operations based on
MapReduce
– A way to create secret-shares
– Count, search, and fetch operations
– Equijoin and range quires
30
Shlomi Dolev1, Yin Li2, and Shantanu Sharma1
1 Department of Computer Science, Ben-Gurion University of the
Negev, Israel
{dolev,sharmas}@cs.bgu.ac.il
2 Department of Computer Science, Xinyang Normal University, China
yunfeiyangli@gmail.com
Presentation is available at
http://www.cs.bgu.ac.il/~sharmas/publication.html

More Related Content

Similar to Private and secure secret shared map reduce

Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesLife Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesSean Chittenden
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVictor Pillac
 
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...eXascale Infolab
 
Continuous and Parallel LiDAR Point-cloud Clustering
Continuous and Parallel LiDAR Point-cloud ClusteringContinuous and Parallel LiDAR Point-cloud Clustering
Continuous and Parallel LiDAR Point-cloud ClusteringHannaneh Najdataei
 
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitr
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitrWiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitr
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitrAnn Loraine
 
Follow the money with graphs
Follow the money with graphsFollow the money with graphs
Follow the money with graphsStanka Dalekova
 
Clickstream data with spark
Clickstream data with sparkClickstream data with spark
Clickstream data with sparkMarissa Saunders
 
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...Codemotion
 
Web-Scale Graph Analytics with Apache Spark with Tim Hunter
Web-Scale Graph Analytics with Apache Spark with Tim HunterWeb-Scale Graph Analytics with Apache Spark with Tim Hunter
Web-Scale Graph Analytics with Apache Spark with Tim HunterDatabricks
 
Bekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesBekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesdiannepatricia
 
Bekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesBekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesdiannepatricia
 
Einführung in Neo4j
Einführung in Neo4jEinführung in Neo4j
Einführung in Neo4jNeo4j
 
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesOBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesShantanu Sharma
 

Similar to Private and secure secret shared map reduce (20)

Masters Thesis Defense Presentation
Masters Thesis Defense PresentationMasters Thesis Defense Presentation
Masters Thesis Defense Presentation
 
Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in MicroservicesLife Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
Life Cycle of Metrics, Alerting, and Performance Monitoring in Microservices
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRP
 
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...
ZenCrowd: Leveraging Probabilistic Reasoning and Crowdsourcing Techniques for...
 
Continuous and Parallel LiDAR Point-cloud Clustering
Continuous and Parallel LiDAR Point-cloud ClusteringContinuous and Parallel LiDAR Point-cloud Clustering
Continuous and Parallel LiDAR Point-cloud Clustering
 
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitr
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitrWiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitr
WiNGS 2014 Workshop 2 R, RStudio, and reproducible research with knitr
 
Follow the money with graphs
Follow the money with graphsFollow the money with graphs
Follow the money with graphs
 
Clickstream data with spark
Clickstream data with sparkClickstream data with spark
Clickstream data with spark
 
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...
Il tempo vola: rappresentare e manipolare sequenze di eventi e time series co...
 
Web-Scale Graph Analytics with Apache Spark with Tim Hunter
Web-Scale Graph Analytics with Apache Spark with Tim HunterWeb-Scale Graph Analytics with Apache Spark with Tim Hunter
Web-Scale Graph Analytics with Apache Spark with Tim Hunter
 
Apriori algorithm
Apriori algorithmApriori algorithm
Apriori algorithm
 
Apriori algorithm
Apriori algorithmApriori algorithm
Apriori algorithm
 
Bekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesBekas for cognitive_speaker_series
Bekas for cognitive_speaker_series
 
Bekas for cognitive_speaker_series
Bekas for cognitive_speaker_seriesBekas for cognitive_speaker_series
Bekas for cognitive_speaker_series
 
Einführung in Neo4j
Einführung in Neo4jEinführung in Neo4j
Einführung in Neo4j
 
01_intro-cpp.ppt
01_intro-cpp.ppt01_intro-cpp.ppt
01_intro-cpp.ppt
 
01_intro-cpp.ppt
01_intro-cpp.ppt01_intro-cpp.ppt
01_intro-cpp.ppt
 
Iot Workshop Columbus
Iot Workshop ColumbusIot Workshop Columbus
Iot Workshop Columbus
 
Spanner osdi2012
Spanner osdi2012Spanner osdi2012
Spanner osdi2012
 
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesOBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
 

More from Shantanu Sharma

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Shantanu Sharma
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Shantanu Sharma
 
A Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationA Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationShantanu Sharma
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksShantanu Sharma
 
Bounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceBounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceShantanu Sharma
 
Assignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceAssignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceShantanu Sharma
 
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Shantanu Sharma
 

More from Shantanu Sharma (8)

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
 
A Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationA Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile Communication
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio Networks
 
Bounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceBounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduce
 
Assignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceAssignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduce
 
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
 

Recently uploaded

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Private and secure secret shared map reduce

  • 1. Private and Secure Secret Shared MapReduce Shlomi Dolev1, Yin Li2, and Shantanu Sharma1 1 Ben-Gurion University of the Negev, Israel 2 Xinyang Normal University, China 30th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy
  • 2. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 2
  • 3. • Why is it required to ensure privacy? – Users send data on the clouds – Curious mappers and reducers can • Store useful data • Know the given job • Where is it required? – Banking, financial, retail, and healthcare Introduction 3
  • 4. Introduction • What others do? 4 Work on encrypted data Authentication & Compress + Encrypt data Encrypt data-at-rest Secure storage of data in HDFS Provide authentication before using Hadoop cluster They are making ‘computational secure’ data. But, for how long is it secured?? Make information secure data
  • 5. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 5
  • 6. STEP 4: Interpolatio n and obtain the final results Database STEP3: Master Process Secret- shares of the database Data owner User-side M M M R R STEP3: Master Process Secret- shares of the database M M M R R STEP3: Master Process Secret- shares of the database M M M R R Notations: M: Mapper R: Reducer System Settings
  • 7. Adversarial Setting • Honest-but-curious adversary – Wants to gain knowledge – But executes computations honestly 7
  • 8. Parameters of Analysis • Communication cost • Computational cost • Number of rounds 8
  • 9. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 9
  • 10. Overview of the Approach • Accumulating Automata* – Make shares of data (or input split) – Send these shares to mappers • Mappers do not know the computation and data – Mappers have a defined accumulating automata – Example: Search a pattern “LO” in the string “LOXLO” 10 *S. Dolev, N. Giboa, X. Li, “Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract,” SCC@ASIACCS, pages 21—29, 2015.
  • 11. Overview of the Approach 11 L = {v3,v4} O = {v5,v10} X ={v1,v1} L = {v4,v5} O = {v15,v20} N1 N2 N3 Mapper 1 2 1 1 L = {v5,v6} O = {v10,v19} X = {v2,v2} L = {v6,v7} O = {v20,v29} N1 N2 N3 Mapper 2 3 4 8 Example: Search a pattern “LO” in the string “LOXLO” L = {v7,v9} O ={v15,v28} X = {v3,v3} L = {v7,v9} O ={v15,v28} N1 N2 N3 Mapper 3 4 9 27 L = {v9,v12} O={v20,v37} X = {v4,v4} L = {v9,v12} O={v20,v37} N1 N2 N3 Mapper 4 5 16 64 Reducer v140 v698 v1964 v4226 𝑁1 𝑀 𝑘+1 = 𝑣0 𝑁2 𝑀 𝑘+1 = 𝑁1 𝑀 𝑘 . 𝑣1 𝑁3 𝑚 𝑘+1 = 𝑁3 𝑀 𝑘 + 𝑁2 𝑀 𝑘 . 𝑣2 LO, 2
  • 12. Creating Secret-Shares • Consider only English words – Represent an alphabet as: • ‘A’ is represented as (11, 02, 03, . . ., 026) – Make secret-shares of every bit by selecting different polynomials of an identical degree – Since we use different polynomials for creating secret-shares of each bit, multiple occurrences of a word in a database have different secret- shares 12
  • 13. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 13
  • 14. Count Operation • String-matching based – Matches a value of a relation with a pattern, where the value and the pattern are of the form of secret-shares • Two phases – Phase 1: Privacy-preserving counting in the clouds – Phase 2: Result reconstruction at the user-side 14
  • 15. Count Operation • Working in the cloud: A mapper – Creates an automaton of x+1 nodes where x is the length of p – Initializes values of these nodes – The first node is assigned a value one (N1 = 1) and all the other nodes are assigned values zero (Ni = 0) 15
  • 16. Count Operation • Working in the cloud: Count ‘John’ 16 Name Adam John John N1 = 1 v1 N2 = 0 N3 = 0 N4 = 0 N5 = 0 v1 v2 v3 v4 v1 = J * A v2 = o * d v3 = a * h v4 = m * n N1 = 1 N2 = 0 N3 = 0 N4 = 0 N5 = 1 v1 = J * J v2 = o * o v3 = h * h v4 = n * n N1 = 1 N2 = 0 N3 = 0 N4 = 0 N5 = 2
  • 17. Count Operation • Working at the user side • Result construction – a simple interpolation operation 17
  • 18. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 18
  • 19. Search and Fetch Operation • Working in the cloud: A mapper – PHASE 1: Finding addresses of tuples containing p – PHASE 2: Fetching all the tuples containing p 19
  • 20. Search and Fetch Operation Unary Occurrence • Working in the cloud: A mapper – No need to know the address – Multiply • Results will be 0 or 1 of the form of secret-shares • Multiply the result with the tuple – Add the values of an attribute 20 Name Department Adam CS John EC John CS Adam Name Department 1 1 0 0 0 0 1 1
  • 21. Search and Fetch Operation Unary Occurrence • Working at the user side – A simple interpolation 21
  • 22. Search and Fetch Operation Multiple Occurrences • Tradeoff – Number of rounds vs computational load at the user side – Naïve algorithm and a database partitioning algorithm 22
  • 23. Search and Fetch Operation Multiple Occurrences • The first way: Naïve Algorithm – Requires a lot of computation at the user side while only 2 rounds are required – Now the user can know the address 23 Name Department Adam CS John EC John CS John Name 0 1 1Multiply
  • 24. Search and Fetch Operation Multiple Occurrences • The first way: Naïve Algorithm – But HOW TO FETCH – Say L occurrences are there – Create a matrix M of L*n 24 Name Department Adam CS John EC John CS 0 1 0 0 0 1 Name 0 1 1 Name Department John EC John CS* M
  • 25. Search and Fetch Operation Multiple Occurrences • The second way – Requires less computation at the user side while more than 2 rounds are required – Partitions database and knows address – Then fetches tuples using the solution suggested in the naïve algorithm 25
  • 26. #Occurrences = 2 #Occurrences = 2 Q&A Round 1 Q&A Round 2 Database #Occurrence = 0 #Occurrences = 2 #Occurrence = 0 #Occurrence = 1 #Occurrence = 1 Q&A Round 3 Search and Fetch Operation Multiple Occurrences
  • 27. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 27
  • 28. Other Operations • Equijoin – Use two layers of clouds, where the first layer performs fetch operation and the second layer performs equijoin operation • Range query – By using 2’s complement – Count the occurrence of number that lies in the range and then fetch those tuples 28
  • 29. Outline • Introduction • System Settings • Overview of the Approach • Count Operation • Search and Fetch Operation • Other Operations • Conclusion 29
  • 30. Conclusion • Privacy-preserving operations based on MapReduce – A way to create secret-shares – Count, search, and fetch operations – Equijoin and range quires 30
  • 31. Shlomi Dolev1, Yin Li2, and Shantanu Sharma1 1 Department of Computer Science, Ben-Gurion University of the Negev, Israel {dolev,sharmas}@cs.bgu.ac.il 2 Department of Computer Science, Xinyang Normal University, China yunfeiyangli@gmail.com Presentation is available at http://www.cs.bgu.ac.il/~sharmas/publication.html