PrivApprox. Privacy- Preserving Stream Analytics.
|
|
- Angelica Hicks
- 5 years ago
- Views:
Transcription
1 PrivApprox Privacy- Preserving Stream Analytics Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe July 2017
2 Motivation Clients Analysts Private data Recommendation, Ads 1
3 Motivation Clients Analysts Private data Recommendation, Ads Strong privacy guarantee 1
4 Motivation Clients Analysts Private data Recommendation, Ads Strong privacy guarantee High utility analytics in real- time 1
5 Motivation Clients Analysts Private data Recommendation, Ads Strong privacy guarantee High utility analytics in real- time How to preserve users privacy while supporting high- utility data analytics for low- latency stream processing? 1
6 State- of- the- art systems Clients 2
7 State- of- the- art systems Clients Personal data should be stored locally under the clients control 2
8 State- of- the- art systems Clients Personal data should be stored locally under the clients control 2
9 State- of- the- art systems Clients 2
10 State- of- the- art systems Clients Aggregator Analyst 2
11 State- of- the- art systems Clients Forward query Aggregator Submit query Analyst 2
12 State- of- the- art systems Clients Aggregator Analyst 2
13 State- of- the- art systems Clients Answer query Aggregator Analyst 2
14 State- of- the- art systems Clients Answer query Aggregator Add noise Analyst 2
15 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst 2
16 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst Differential Privacy 2
17 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst Differential Privacy Limitations: 2
18 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst Differential Privacy Limitations: Deal with only single- shot batch queries L 2
19 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst Differential Privacy Limitations: Deal with only single- shot batch queries L Require synchronization between system components L 2
20 State- of- the- art systems Clients Answer query Aggregator Add noise Privacy- preserving output Analyst Differential Privacy Limitations: Deal with only single- shot batch queries L Require synchronization between system components L Require a trusted aggregator L 2
21 PrivApprox Clients PrivApprox Analyst 3
22 PrivApprox Clients PrivApprox Analyst PrivApprox: 3
23 PrivApprox Clients PrivApprox Analyst PrivApprox: Supports stream processing with low latency J 3
24 PrivApprox Clients PrivApprox Analyst PrivApprox: Supports stream processing with low latency J Enables a truly synchronization- free distributed architecture J 3
25 PrivApprox Clients PrivApprox Analyst PrivApprox: Supports stream processing with low latency J Enables a truly synchronization- free distributed architecture J Requires lower trust in aggregator J 3
26 Outline Motivation Overview Design Evaluation 4
27 System overview Clients PrivApprox Analyst 5
28 System overview Clients PrivApprox (Query, budget) Analyst 5
29 System overview Clients PrivApprox (Query, budget) Analyst Execution budget: Latency/throughput guarantees Desired computing resources for query processing Desired accuracy 5
30 System overview Clients PrivApprox (Query, budget) Analyst Execution budget: Latency/throughput guarantees Desired computing resources for query processing Desired accuracy 5
31 System overview Clients PrivApprox Analyst 5
32 System overview Clients PrivApprox Result Analyst 5
33 System overview Clients PrivApprox Approximate computing Result Analyst 5
34 System overview Clients PrivApprox Approximate computing Result Analyst Low latency 5
35 System overview Clients PrivApprox Approximate computing + Randomized response Result Analyst Low latency 5
36 System overview Clients PrivApprox Approximate computing + Randomized response Result Analyst Low latency Privacy 5
37 System overview Clients PrivApprox Approximate computing + Randomized response Result Analyst 5
38 System overview Clients PrivApprox Approximate computing + Randomized response Result Analyst Zero- knowledge Privacy 5
39 System overview Clients PrivApprox Approximate computing + Randomized response Result Analyst Zero- knowledge Privacy Zero- knowledge Privacy > Differential Privacy 5
40 #1: Approximate computing 6
41 #1: Approximate computing State- of- the- art- systems Compute Add noise (Privacy- preserving) approximate output 6
42 #1: Approximate computing State- of- the- art- systems Compute Add noise (Privacy- preserving) approximate output Idea: To achieve low latency, compute over a sub- set of data items instead of the entire data- set 6
43 #1: Approximate computing State- of- the- art- systems Compute Add noise (Privacy- preserving) approximate output Idea: To achieve low latency, compute over a sub- set of data items instead of the entire data- set Take a sample Approximate computing Compute Approximate output ± Error bound 6
44 #2: Randomized response 7
45 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time 7
46 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client 7
47 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client 7
48 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client Truthful Answer 7
49 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client Truthful Answer 7
50 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client No Truthful Answer Yes 7
51 #2: Randomized response Idea: To preserve privacy, clients may not need to provide truthful answers every time Client No Truthful Answer Yes Provides plausible deniability for clients responding to sensitive queries; achieves differential privacy (RAPPOR [CCS 14]) 7
52 Outline Motivation Overview Design Evaluation 8
53 Query model 9
54 Query model Divide answer s value range into buckets, enforce a binary answer in each bucket 9
55 Query model Divide answer s value range into buckets, enforce a binary answer in each bucket Query: SELECT age FROM clients WHERE city = Santa Clara 9
56 Query model Divide answer s value range into buckets, enforce a binary answer in each bucket Query: SELECT age FROM clients WHERE city = Santa Clara >60 9
57 Query model Divide answer s value range into buckets, enforce a binary answer in each bucket Query: SELECT age FROM clients WHERE city = Santa Clara Age: >60 9
58 Query model Divide answer s value range into buckets, enforce a binary answer in each bucket Query: SELECT age FROM clients WHERE city = Santa Clara Age: >60 Client cannot arbitrarily manipulate answers 9
59 Workflow: Submit query Aggregator (Query, budget) Analyst 10
60 Workflow: Submit query Clients Aggregator (Query, budget) Analyst Cost- Function(budget) System parameters: Sampling parameter Randomized response parameters 10
61 Workflow: Submit query Clients (Query, parameters) Aggregator (Query, budget) Analyst Cost- Function(budget) System parameters: Sampling parameter Randomized response parameters 10
62 Workflow: Answer query 11
63 Workflow: Answer query Client 11
64 Workflow: Answer query Client Step #1 Sampling (Flip a coin to decide to answer query or not) 11
65 Workflow: Answer query Client Step #1 Step #2 Sampling (Flip a coin to decide to answer query or not) Randomized Response 11
66 Workflow: Answer query Client Step #1 Step #2 Step #3 Sampling (Flip a coin to decide to answer query or not) Randomized Response Send randomized answer 11
67 Workflow: Answer query Client Step #1 Step #2 Step #3 Sampling (Flip a coin to decide to answer query or not) Randomized Response Send randomized answer Zero- knowledge privacy 11
68 Workflow: Answer query Client Step #1 Step #2 Step #3 Sampling (Flip a coin to decide to answer query or not) Randomized Response Send randomized answer Zero- knowledge privacy See the paper for details! 11
69 Workflow: Answer query Clients Randomized answers Aggregator 12
70 Workflow: Answer query Clients Randomized answers Aggregator Approximate result ± Error bound Analyst 12
71 Workflow: Answer query Clients Randomized answers Aggregator Approximate result ± Error bound Analyst Lack of anonymity and unlinkability? 12
72 #3: Anonymity and unlinkability 13
73 #3: Anonymity and unlinkability Idea: XOR- based Encryption 13
74 #3: Anonymity and unlinkability Idea: XOR- based Encryption Client 13
75 #3: Anonymity and unlinkability Idea: XOR- based Encryption Client Encrypt answer M: GenerateKey - > M k M XOR M k - > M E 13
76 #3: Anonymity and unlinkability Idea: XOR- based Encryption Client Proxy Aggregator Proxy Encrypt answer M: GenerateKey - > M k M XOR M k - > M E 13
77 #3: Anonymity and unlinkability Idea: XOR- based Encryption Client Proxy Aggregator Proxy Encrypt answer M: GenerateKey - > M k M XOR M k - > M E Decrypt answer M E : M E XOR M k - > M 13
78 Implementation Clients Proxy Aggregator Analyst Proxy 14
79 Implementation Clients Proxy Aggregator Analyst Proxy 14
80 Implementation Clients Proxy Aggregator Analyst Proxy 14
81 Implementation Clients Proxy Aggregator Analyst Proxy 14
82 Outline Motivation Overview Design Evaluation 15
83 Experimental setup Evaluation questions Utility vs privacy Throughput & latency Network overhead 16
84 Experimental setup Evaluation questions Utility vs privacy Throughput & latency Network overhead See the paper for more results! 16
85 Experimental setup Evaluation questions Utility vs privacy Throughput & latency Network overhead See the paper for more results! Testbed Cluster: 44 nodes Dataset: NYC Taxi ride records, household electricity usage 16
86 Accuracy vs privacy 17
87 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 Accuracy loss (%) Privacy (ε zk ) Sampling Fraction (%) 0 17
88 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 The lower the better Accuracy loss (%) Accuracy loss Privacy level Privacy (ε zk ) Sampling Fraction (%) Trade- off between utility and privacy 0 17
89 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 The lower the better Accuracy loss (%) Accuracy loss Privacy level Privacy (ε zk ) Sampling Fraction (%) Trade- off between utility and privacy 0 17
90 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 The lower the better Accuracy loss (%) Accuracy loss Privacy level Privacy (ε zk ) Sampling Fraction (%) Trade- off between utility and privacy 0 17
91 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 The lower the better Accuracy loss (%) Accuracy loss Privacy level Privacy (ε zk ) Sampling Fraction (%) Trade- off between utility and privacy 0 17
92 Accuracy vs privacy 0.6 Randomization parameters #1 (p = 0.6, q = 0.6) Randomization parameters #2 (p = 0.9, q = 0.6) 6 The lower the better Accuracy loss (%) Accuracy loss Privacy level Privacy (ε zk ) Sampling Fraction (%) Trade- off between utility and privacy 0 17
93 Throughput 18
94 Throughput NYC Taxi Ride Household Electricity Throughput (K) #nodes 18
95 Throughput NYC Taxi Ride Household Electricity The higher the better Throughput (K) #nodes 18
96 Throughput NYC Taxi Ride Household Electricity The higher the better Throughput (K) #nodes 18
97 Throughput NYC Taxi Ride Household Electricity The higher the better Throughput (K) #nodes ~8X speedup when going from one node to 20 nodes 18
98 Latency 19
99 Latency NYC Taxi Ride Household Electricity Total processing time (seconds) Native Sampling fraction (%) 19
100 Latency NYC Taxi Ride Household Electricity The lower the better Total processing time (seconds) Native Sampling fraction (%) 19
101 Latency NYC Taxi Ride Household Electricity The lower the better Total processing time (seconds) Native Sampling fraction (%) 19
102 Latency NYC Taxi Ride Household Electricity The lower the better Total processing time (seconds) Native Sampling fraction (%) ~1.66X lower than the native execution with sampling fraction of 60% 19
103 Network overhead 20
104 Network overhead NYC Taxi Ride Household Electricity Network traffic (GB) Native Sampling fraction (%) 20
105 Network overhead NYC Taxi Ride Household Electricity The lower the better Network traffic (GB) Native Sampling fraction (%) 20
106 Network overhead NYC Taxi Ride Household Electricity The lower the better Network traffic (GB) Native Sampling fraction (%) 20
107 Network overhead NYC Taxi Ride Household Electricity The lower the better Network traffic (GB) Native Sampling fraction (%) ~1.6X lower than the native execution with sampling fraction of 60% 20
108 Conclusion PrivApprox: a privacy- preserving stream analytics system over distributed datasets 21
109 Conclusion PrivApprox: a privacy- preserving stream analytics system over distributed datasets Privacy Zero- knowledge privacy 21
110 Conclusion PrivApprox: a privacy- preserving stream analytics system over distributed datasets Privacy Practical Zero- knowledge privacy Adaptive execution based on query budget 21
111 Conclusion PrivApprox: a privacy- preserving stream analytics system over distributed datasets Privacy Practical Efficient Zero- knowledge privacy Adaptive execution based on query budget Randomized response & sampling techniques 21
112 Conclusion PrivApprox: a privacy- preserving stream analytics system over distributed datasets Privacy Practical Efficient Zero- knowledge privacy Adaptive execution based on query budget Randomized response & sampling techniques Thank you! 21
CS573 Data Privacy and Security. Differential Privacy. Li Xiong
CS573 Data Privacy and Security Differential Privacy Li Xiong Outline Differential Privacy Definition Basic techniques Composition theorems Statistical Data Privacy Non-interactive vs interactive Privacy
More informationwith BLENDER: Enabling Local Search a Hybrid Differential Privacy Model
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Brendan Avent 1, Aleksandra Korolova 1, David Zeber 2, Torgeir Hovden 2, Benjamin Livshits 3 University of Southern California 1
More informationApproxJoin: Approximate Distributed Joins
Approximate Distributed Joins Do Le Quoc, Istemi Ekin Akkus, Pramod Bhatotia, Spyros Blanas #, Ruichuan Chen, Christof Fetzer, Thorsten Strufe TU Dresden, Germany Nokia Bell Labs, Germany The University
More informationTime Distortion Anonymization for the Publication of Mobility Data with High Utility
Time Distortion Anonymization for the Publication of Mobility Data with High Utility Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux and Lionel Brunie Mobility data usefulness Real-time traffic,
More informationPrivate & Anonymous Communication. Peter Kairouz ECE Department University of Illinois at Urbana-Champaign
Private & Anonymous Communication Peter Kairouz ECE Department University of Illinois at Urbana-Champaign Communication Bob Alice transfer of information from one point in space-time to the other Wireless
More informationReza Tourani, Satyajayant (Jay) Misra, Travis Mick
Application-Specific Secure Gathering of Consumer Preferences and Feedback in Information-Centric Networks Reza Tourani, Satyajayant (Jay) Misra, Travis Mick Computer Science Department New Mexico State
More informationTowards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley
Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity
More informationAnonymization for web, fixed line, and mobile applications
Anonymization for web, fixed line, and mobile applications Prof. Dr. University of Regensburg Information Systems Management of Information security Anonymization for web, fixed line, and mobile applications
More informationUtilizing Large-Scale Randomized Response at Google: RAPPOR and its lessons
Utilizing Large-Scale Randomized Response at Google: RAPPOR and its lessons Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova, Steven Holte, Ananth Raghunathan, Giulia Fanti, Ilya Mironov, Andy Chu DIMACS
More informationData Privacy in Big Data Applications. Sreagni Banerjee CS-846
Data Privacy in Big Data Applications Sreagni Banerjee CS-846 Outline! Motivation! Goal and Approach! Introduction to Big Data Privacy! Privacy preserving methods in Big Data Application! Progress! Next
More informationSub-millisecond Stateful Stream Querying over Fast-evolving Linked Data
Sub-millisecond Stateful Stream Querying over Fast-evolving Linked Data Yunhao Zhang, Rong Chen, Haibo Chen Institute of Parallel and Distributed Systems (IPADS) Shanghai Jiao Tong University Stream Query
More informationDifferentially Private H-Tree
GeoPrivacy: 2 nd Workshop on Privacy in Geographic Information Collection and Analysis Differentially Private H-Tree Hien To, Liyue Fan, Cyrus Shahabi Integrated Media System Center University of Southern
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationDelegated Access for Hadoop Clusters in the Cloud
Delegated Access for Hadoop Clusters in the Cloud David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab) Universidad de Málaga, Spain Email: dnunez@lcc.uma.es
More informationAutomatic Scaling Iterative Computations. Aug. 7 th, 2012
Automatic Scaling Iterative Computations Guozhang Wang Cornell University Aug. 7 th, 2012 1 What are Non-Iterative Computations? Non-iterative computation flow Directed Acyclic Examples Batch style analytics
More informationEfficient Lists Intersection by CPU- GPU Cooperative Computing
Efficient Lists Intersection by CPU- GPU Cooperative Computing Di Wu, Fan Zhang, Naiyong Ao, Gang Wang, Xiaoguang Liu, Jing Liu Nankai-Baidu Joint Lab, Nankai University Outline Introduction Cooperative
More informationDifferential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017
Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of
More informationEstimating Quantiles from the Union of Historical and Streaming Data
Estimating Quantiles from the Union of Historical and Streaming Data Sneha Aman Singh, Iowa State University Divesh Srivastava, AT&T Labs - Research Srikanta Tirthapura, Iowa State University Quantiles
More informationPolicy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
Max Planck Institute for Software Systems Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services 1, Rodrigo Rodrigues 2, Krishna P. Gummadi 1, Stefan Saroiu 3 MPI-SWS 1, CITI / Universidade
More informationDistributed Private Data Collection at Scale
Distributed Private Data Collection at Scale Graham Cormode g.cormode@warwick.ac.uk Tejas Kulkarni (Warwick) Divesh Srivastava (AT&T) 1 Big data, big problem? The big data meme has taken root Organizations
More informationWeb Serving Architectures
Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures
More informationThe Marriage of Incremental and Approximate Computing
Technical University Dresden MASTER THESIS The Marriage of Incremental and Approximate Computing Author: Dhanya R Krishnan Course: MSc. Distributed Systems Engineering Supervisor: Dr. Pramod Bhatotia Professor:
More informationDeveloping the ERS Collaboration Framework
1 Developing the ERS Collaboration Framework Patrick J. Martin, Ph.D. BAE Systems Technology Solutions patrick.j.martin@baesystems.com 10-26-2016 2 ERS Development Challenges Resilient System A system
More informationDifferentially Private Multi- Dimensional Time Series Release for Traffic Monitoring
DBSec 13 Differentially Private Multi- Dimensional Time Series Release for Traffic Monitoring Liyue Fan, Li Xiong, Vaidy Sunderam Department of Math & Computer Science Emory University 9/4/2013 DBSec'13:
More informationLambda Architecture for Batch and Stream Processing. October 2018
Lambda Architecture for Batch and Stream Processing October 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only.
More informationVPriv: Protecting Privacy in Location- Based Vehicular Services
VPriv: Protecting Privacy in Location- Based Vehicular Services Raluca Ada Popa and Hari Balakrishnan Computer Science and Artificial Intelligence Laboratory, M.I.T. Andrew Blumberg Department of Mathematics
More informationHadoop 2.x Core: YARN, Tez, and Spark. Hortonworks Inc All Rights Reserved
Hadoop 2.x Core: YARN, Tez, and Spark YARN Hadoop Machine Types top-of-rack switches core switch client machines have client-side software used to access a cluster to process data master nodes run Hadoop
More informationSecure Remote Storage Using Oblivious RAM
Secure Remote Storage Using Oblivious RAM Giovanni Malloy Mentors: Georgios Kellaris, Kobbi Nissim August 11, 2016 Abstract Oblivious RAM (ORAM) is a protocol that allows a user to access the data she
More informationS-Store: Streaming Meets Transaction Processing
S-Store: Streaming Meets Transaction Processing H-Store is an experimental database management system (DBMS) designed for online transaction processing applications Manasa Vallamkondu Motivation Reducing
More informationMahout: Low-Overhead Datacenter Traffic Management using End-Host-Based Elephant Detection. Vasileios Dimitrakis
Mahout: Low-Overhead Datacenter Traffic Management using End-Host-Based Elephant Detection Vasileios Dimitrakis Vasileios Dimitrakis 2016-03-18 1 Introduction - Motivation (1) Vasileios Dimitrakis 2016-03-18
More informationSecuring the Frisbee Multicast Disk Loader
Securing the Frisbee Multicast Disk Loader Robert Ricci, Jonathon Duerig University of Utah 1 What is Frisbee? 2 Frisbee is Emulab s tool to install whole disk images from a server to many clients using
More informationBuilding Durable Real-time Data Pipeline
Building Durable Real-time Data Pipeline Apache BookKeeper at Twitter @sijieg Twitter Background Layered Architecture Agenda Design Details Performance Scale @Twitter Q & A Publish-Subscribe Online services
More informationPrivacy Protected Spatial Query Processing
Privacy Protected Spatial Query Processing Slide 1 Topics Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 2 1 Motivation The proliferation
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationmicrosoft
70-775.microsoft Number: 70-775 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Note: This question is part of a series of questions that present the same scenario. Each question in the series
More informationIndrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin
Airavat: Security and Privacy for MapReduce Indrajit Roy, Srinath T.V. Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The University of Texas at Austin Computing in the year 201X 2 Data Illusion of
More informationDS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li
Welcome to DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH 116 Fall 2017 First Grading for Reading Assignment Weka v 6 weeks v https://weka.waikato.ac.nz/dataminingwithweka/preview
More informationActivator Library. Focus on maximizing the value of your data, gain business insights, increase your team s productivity, and achieve success.
Focus on maximizing the value of your data, gain business insights, increase your team s productivity, and achieve success. ACTIVATORS Designed to give your team assistance when you need it most without
More informationScaling Distributed Machine Learning with the Parameter Server
Scaling Distributed Machine Learning with the Parameter Server Mu Li, David G. Andersen, Jun Woo Park, Alexander J. Smola, Amr Ahmed, Vanja Josifovski, James Long, Eugene J. Shekita, and Bor-Yiing Su Presented
More informationThe Confounding Problem of Private Data Release
The Confounding Problem of Private Data Release Divesh Srivastava AT&T Labs-Research Acknowledgments: Ramón, Graham, Colin, Xi, Ashwin, Magda This material represents the views of the individual contributors
More informationGuarding user Privacy with Federated Learning and Differential Privacy
Guarding user Privacy with Federated Learning and Differential Privacy Brendan McMahan mcmahan@google.com DIMACS/Northeast Big Data Hub Workshop on Overcoming Barriers to Data Sharing including Privacy
More informationIdentify and cluster touchpoints in several ways Identify risks and initiatives associated to touchpoints
ARIS ARIS 9.8 SR4 OVERVIEW ARIS Architect / ARIS Designer Use CXM specific queries and spreadsheets to retrieve information and receive a graphical overview of the journey or its related objects. CXM queries
More informationR-Storm: A Resource-Aware Scheduler for STORM. Mohammad Hosseini Boyang Peng Zhihao Hong Reza Farivar Roy Campbell
R-Storm: A Resource-Aware Scheduler for STORM Mohammad Hosseini Boyang Peng Zhihao Hong Reza Farivar Roy Campbell Introduction STORM is an open source distributed real-time data stream processing system
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationThe Loopix Anonymity System
The Loopix Anonymity System Ania M. Piotrowska 1 Jamie Hayes 1 Tariq Elahi 2 Sebastian Meiser 1 George Danezis 1 1 University College London, UK 2 KU Leuven 1 / 19 Mixnets Background A set of cryptographic
More informationDandelion: Privacy-Preserving Transaction Propagation in Bitcoin s P2P Network
Dandelion: Privacy-Preserving Transaction Propagation in Bitcoin s P2P Network Presenter: Giulia Fanti Joint work with: Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Brad Denby, Shruti Bhargava, Andrew
More informationHomomorphic Encryption. By Raj Thimmiah
Homomorphic Encryption By Raj Thimmiah Symmetric Key Encryption Symmetric Key Encryption Symmetric Key Encryption: XOR Gates XOR gates are the simplest way to implement symmetric key encryption XOR gates
More informationZHT: Const Eventual Consistency Support For ZHT. Group Member: Shukun Xie Ran Xin
ZHT: Const Eventual Consistency Support For ZHT Group Member: Shukun Xie Ran Xin Outline Problem Description Project Overview Solution Maintains Replica List for Each Server Operation without Primary Server
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationHerbivore: An Anonymous Information Sharing System
Herbivore: An Anonymous Information Sharing System Emin Gün Sirer August 25, 2006 Need Anonymity Online Current networking protocols expose the identity of communication endpoints Anyone with access to
More informationSanitization of call detail records via differentially-private Bloom filters
Sanitization of call detail records via differentially-private Bloom filters Mohammad Alaggan Helwan University Joint work with Sébastien Gambs (Université de Rennes 1 - Inria / IRISA), Stan Matwin and
More informationPrivacy Challenges in Big Data and Industry 4.0
Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/
More informationDifferential Privacy. Cynthia Dwork. Mamadou H. Diallo
Differential Privacy Cynthia Dwork Mamadou H. Diallo 1 Focus Overview Privacy preservation in statistical databases Goal: to enable the user to learn properties of the population as a whole, while protecting
More informationUnifying Big Data Workloads in Apache Spark
Unifying Big Data Workloads in Apache Spark Hossein Falaki @mhfalaki Outline What s Apache Spark Why Unification Evolution of Unification Apache Spark + Databricks Q & A What s Apache Spark What is Apache
More informationMetrics for Security and Performance in Low-Latency Anonymity Systems
Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web
More informationCIS 601 Graduate Seminar. Dr. Sunnie S. Chung Dhruv Patel ( ) Kalpesh Sharma ( )
Guide: CIS 601 Graduate Seminar Presented By: Dr. Sunnie S. Chung Dhruv Patel (2652790) Kalpesh Sharma (2660576) Introduction Background Parallel Data Warehouse (PDW) Hive MongoDB Client-side Shared SQL
More informationRemote Data Checking for Network Codingbased. Distributed Storage Systems
CCSW 0 Remote Data Checking for Network Coding-based Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns New Jersey Institute of Technology Johns Hopkins University Motivation Cloud storage can release
More informationNetwork Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015
Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, autumn 2015 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor
More informationA Relational Platform for Efficient Large-Scale Video Analytics. Yao Lu, Aakanksha Chowdhery, Srikanth Kandula
A Relational Platform for Efficient Large-Scale Video Analytics Yao Lu, Aakanksha Chowdhery, Srikanth Kandula Cameras are ubiquitous; video analysis is a big-data problem Cameras are ubiquitous; video
More informationHammer Slide: Work- and CPU-efficient Streaming Window Aggregation
Large-Scale Data & Systems Group Hammer Slide: Work- and CPU-efficient Streaming Window Aggregation Georgios Theodorakis, Alexandros Koliousis, Peter Pietzuch, Holger Pirk Large-Scale Data & Systems (LSDS)
More informationUnderstanding the latent value in all content
Understanding the latent value in all content John F. Kennedy (JFK) November 22, 1963 INGEST ENRICH EXPLORE Cognitive skills Data in any format, any Azure store Search Annotations Data Cloud Intelligence
More informationData Storage Infrastructure at Facebook
Data Storage Infrastructure at Facebook Spring 2018 Cleveland State University CIS 601 Presentation Yi Dong Instructor: Dr. Chung Outline Strategy of data storage, processing, and log collection Data flow
More informationPrivacy-Preserving Machine Learning
Privacy-Preserving Machine Learning CS 760: Machine Learning Spring 2018 Mark Craven and David Page www.biostat.wisc.edu/~craven/cs760 1 Goals for the Lecture You should understand the following concepts:
More informationDatabase Learning: Toward a Database that Becomes Smarter Over Time
Database Learning: Toward a Database that Becomes Smarter Over Time Yongjoo Park Ahmad Shahab Tajik Michael Cafarella Barzan Mozafari University of Michigan, Ann Arbor Today s databases Database Users
More informationProtocols for Anonymous Communication
18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your
More informationDesign and Implementation of Privacy-Preserving Surveillance. Aaron Segal
1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for
More informationComputations with Bounded Errors and Response Times on Very Large Data
Computations with Bounded Errors and Response Times on Very Large Data Ion Stoica UC Berkeley (joint work with: Sameer Agarwal, Ariel Kleiner, Henry Milner, Barzan Mozafari, Ameet Talwalkar, Purnamrita
More informationHeckaton. SQL Server's Memory Optimized OLTP Engine
Heckaton SQL Server's Memory Optimized OLTP Engine Agenda Introduction to Hekaton Design Consideration High Level Architecture Storage and Indexing Query Processing Transaction Management Transaction Durability
More informationDJoin: Differentially Private Join Queries over Distributed Databases. University of Pennsylvania
DJoin: Differentially Private Join Queries over Distributed Databases Arjun Narayan Andreas Haeberlen University of Pennsylvania 1 Motivation Is there a epidemic in Elbonia? Researcher Airlines Doctors
More informationAnonymous communications: Crowds and Tor
Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot
More informationPageVault: Securing Off-Chip Memory Using Page-Based Authen?ca?on. Blaise-Pascal Tine Sudhakar Yalamanchili
PageVault: Securing Off-Chip Memory Using Page-Based Authen?ca?on Blaise-Pascal Tine Sudhakar Yalamanchili Outline Background: Memory Security Motivation Proposed Solution Implementation Evaluation Conclusion
More informationJAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing
JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification
More informationTowards Energy Proportionality for Large-Scale Latency-Critical Workloads
Towards Energy Proportionality for Large-Scale Latency-Critical Workloads David Lo *, Liqun Cheng *, Rama Govindaraju *, Luiz André Barroso *, Christos Kozyrakis Stanford University * Google Inc. 2012
More informationPrivCount: A Distributed System for Safely Measuring Tor
PrivCount: A Distributed System for Safely Measuring Tor Rob Jansen Center for High Assurance Computer Systems Invited Talk, October 4 th, 2016 University of Oregon Department of Computer and Information
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationSecurity Control Methods for Statistical Database
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security Statistical Database A statistical database is a database which provides statistics on subsets of records OLAP
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationPrivacy-Preserving Sensor Cloud. Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang School of Computing National University of Singapore
Privacy-Preserving Sensor Cloud Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang School of Computing National University of Singapore Motivation The ubiquity of time series/multimedia data. Privacy
More informationSparrow. Distributed Low-Latency Spark Scheduling. Kay Ousterhout, Patrick Wendell, Matei Zaharia, Ion Stoica
Sparrow Distributed Low-Latency Spark Scheduling Kay Ousterhout, Patrick Wendell, Matei Zaharia, Ion Stoica Outline The Spark scheduling bottleneck Sparrow s fully distributed, fault-tolerant technique
More informationReDroid: Prioritizing Data Flows and Sinks for App Security Transformation
FEAST 2017 ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation Ke Tian*, Gang Tan^, Daphne Yao*, Barbara Ryder* *Department of Computer Science Virginia Tech ^Department of CSE Penn
More informationCHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC
CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of
More informationHYRISE In-Memory Storage Engine
HYRISE In-Memory Storage Engine Martin Grund 1, Jens Krueger 1, Philippe Cudre-Mauroux 3, Samuel Madden 2 Alexander Zeier 1, Hasso Plattner 1 1 Hasso-Plattner-Institute, Germany 2 MIT CSAIL, USA 3 University
More informationOverview. : Cloudera Data Analyst Training. Course Outline :: Cloudera Data Analyst Training::
Module Title Duration : Cloudera Data Analyst Training : 4 days Overview Take your knowledge to the next level Cloudera University s four-day data analyst training course will teach you to apply traditional
More informationApache Spark is a fast and general-purpose engine for large-scale data processing Spark aims at achieving the following goals in the Big data context
1 Apache Spark is a fast and general-purpose engine for large-scale data processing Spark aims at achieving the following goals in the Big data context Generality: diverse workloads, operators, job sizes
More informationHow Alice and Bob meet if they don t like onions
How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies
More informationFocus: Querying Large Video Datasets with Low Latency and Low Cost
Focus: Querying Large Video Datasets with Low Latency and Low Cost Kevin Hsieh Ganesh Ananthanarayanan, Peter Bodik, Shivaram Venkataraman, Paramvir Bahl, Matthai Philipose, Phillip B. Gibbons, Onur Mutlu
More informationPrivacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute Hung Dang, Anh Dinh, Ee-Chien Chang, Beng Chin Ooi School of Computing National University of Singapore The Problem Context:
More informationfrom circuits to RAM programs in malicious-2pc
from circuits to RAM programs in malicious-2pc Abstract: Secure 2-party computation (2PC) is becoming practical in some domains However, most approaches are limited by the fact that the desired functionality
More informationSystem Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics
System Models Nicola Dragoni Embedded Systems Engineering DTU Informatics 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models Architectural vs Fundamental Models Systems that are intended
More informationA User-level Secure Grid File System
A User-level Secure Grid File System Ming Zhao, Renato J. Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida {ming, renato}@acis.ufl.edu
More informationA Solution for Geographic Regions Load Balancing in Cloud Computing Environment
Chapter 5 A Solution for Geographic Regions Load Balancing in Cloud Computing Environment 5.1 INTRODUCTION Cloud computing is one of the most interesting way of distributing the data as well as to get
More informationDifferentially-Private Network Trace Analysis. Frank McSherry and Ratul Mahajan Microsoft Research
Differentially-Private Network Trace Analysis Frank McSherry and Ratul Mahajan Microsoft Research Overview. 1 Overview Question: Is it possible to conduct network trace analyses in a way that provides
More informationDROPBOX.COM - PRIVACY POLICY
Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationGiza: Erasure Coding Objects across Global Data Centers
Giza: Erasure Coding Objects across Global Data Centers Yu Lin Chen*, Shuai Mu, Jinyang Li, Cheng Huang *, Jin li *, Aaron Ogus *, and Douglas Phillips* New York University, *Microsoft Corporation USENIX
More informationMaelstrom: An Enterprise Continuity Protocol for Financial Datacenters
Maelstrom: An Enterprise Continuity Protocol for Financial Datacenters Mahesh Balakrishnan, Tudor Marian, Hakim Weatherspoon Cornell University, Ithaca, NY Datacenters Internet Services (90s) Websites,
More informationApproaches to distributed privacy protecting data mining
Approaches to distributed privacy protecting data mining Bartosz Przydatek CMU Approaches to distributed privacy protecting data mining p.1/11 Introduction Data Mining and Privacy Protection conflicting
More informationPrivacy-Preserving Using Data mining Technique in Cloud Computing
Cis-601 Graduate Seminar Privacy-Preserving Using Data mining Technique in Cloud Computing Submitted by: Rajan Sharma CSU ID: 2659829 Outline Introduction Related work Preliminaries Association Rule Mining
More informationCS526: Information security
Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within
More informationPrivacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University
Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks
More information