beyond just data privacy bobji mungamuru hector garcia-molina christopher olston subhasish mitra

16
Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

Upload: sydney-neil-stevens

Post on 18-Jan-2018

224 views

Category:

Documents


0 download

DESCRIPTION

CIDR 2007 Pacific Grove, CA, USA 3 Overview Configurations  A neat way to capture these trade-offs Search machinery  How to find good configurations

TRANSCRIPT

Page 1: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

Beyond Just Data Privacy

Bobji MungamuruHector Garcia-Molina

Christopher OlstonSubhasish Mitra

Page 2: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

2

Competing Objectives

Page 3: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

3

Overview Configurations

A neat way to capture these trade-offs

Search machinery How to find good configurations

Page 4: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

4

Configurations

S = splitC = copy

Page 5: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

5

Configurations

Page 6: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

6

Search Machinery

More Longevity

More Privacy

Page 7: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

7

Contributions Metrics to evaluate a configuration

Algorithm for searching for good configurations

Avoiding configurations that don't “make sense”

Future work – performance

Page 8: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

8

Summary

Google: bobji

Page 9: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

9

Page 10: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

10

So What? Summary: given N servers with known failure

characteristics, minimize data loss risk subject to an upper bound on break-in risk

Applications Measure effectiveness of existing systems Damage assessment Security breach probability functions

Page 11: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

11

Related Work Data preservation Data privacy Survivable storage @ CMU StorageSS @ NCSA Generalization: secret sharing

Page 12: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

12

Metrics Probability of

break-ins, P(Ө) Probability of

data loss, Q(Ө)

Page 13: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

13

Metrics Depth (3) Class (read-once) Terminals (4) Non-terminals (3) Allow groups (e.g., {a,b}) Deny groups (e.g., {c,d})

Page 14: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

14

Optimization

maximize longevity, given a lower bound on privacy

Page 15: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

15

Optimization Configurations are isomorphic with the set of

factored monotone Boolean formulas

Page 16: Beyond Just Data Privacy Bobji Mungamuru Hector Garcia-Molina Christopher Olston Subhasish Mitra

CIDR 2007Pacific Grove, CA, USA

16

Optimization Solution strategy:

Step 1: Find the best monotone DNF formula, F* Step 2: Find the best factorization of F*

Step 1 is finding a separating hyperplane in {0,1}n

Step 2 is well-studied in digital design literature