首页 > 最新文献

Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium最新文献

英文 中文
Multiparty Reach and Frequency Histogram: Private, Secure, and Practical 多方覆盖和频率直方图:私密、安全、实用
Badih Ghazi, Ben Kreuter, Ravi Kumar, Pasin Manurangsi, Jiayu Peng, E. Skvortsov, Yao Wang, Craig Wright
Abstract Consider the setting where multiple parties each hold a multiset of users and the task is to estimate the reach (i.e., the number of distinct users appearing across all parties) and the frequency histogram (i.e., fraction of users appearing a given number of times across all parties). In this work we introduce a new sketch for this task, based on an exponentially distributed counting Bloom filter. We combine this sketch with a communication-efficient multi-party protocol to solve the task in the multi-worker setting. Our protocol exhibits both differential privacy and security guarantees in the honest-but-curious model and in the presence of large subsets of colluding workers; furthermore, its reach and frequency histogram estimates have a provably small error. Finally, we show the practicality of the protocol by evaluating it on internet-scale audiences.
考虑这样的设置,其中多方各持有多组用户,任务是估计覆盖范围(即,在所有各方中出现的不同用户的数量)和频率直方图(即,在所有各方中出现给定次数的用户的比例)。在这项工作中,我们介绍了一个基于指数分布计数布隆滤波器的新草图。我们将此草图与通信高效的多方协议相结合,以解决多工作者设置中的任务。我们的协议在诚实但好奇的模型和存在大量串通工人的情况下展示了不同的隐私和安全保证;此外,它的覆盖范围和频率直方图估计具有可证明的小误差。最后,我们通过在互联网规模的受众上评估该协议来展示其实用性。
{"title":"Multiparty Reach and Frequency Histogram: Private, Secure, and Practical","authors":"Badih Ghazi, Ben Kreuter, Ravi Kumar, Pasin Manurangsi, Jiayu Peng, E. Skvortsov, Yao Wang, Craig Wright","doi":"10.2478/popets-2022-0019","DOIUrl":"https://doi.org/10.2478/popets-2022-0019","url":null,"abstract":"Abstract Consider the setting where multiple parties each hold a multiset of users and the task is to estimate the reach (i.e., the number of distinct users appearing across all parties) and the frequency histogram (i.e., fraction of users appearing a given number of times across all parties). In this work we introduce a new sketch for this task, based on an exponentially distributed counting Bloom filter. We combine this sketch with a communication-efficient multi-party protocol to solve the task in the multi-worker setting. Our protocol exhibits both differential privacy and security guarantees in the honest-but-curious model and in the presence of large subsets of colluding workers; furthermore, its reach and frequency histogram estimates have a provably small error. Finally, we show the practicality of the protocol by evaluating it on internet-scale audiences.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47141021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
From “Onion Not Found” to Guard Discovery 从"找不到洋葱"到"发现守卫
Lennart Oldenburg, Gunes Acar, C. Díaz
Abstract We present a novel web-based attack that identifies a Tor user’s guard in a matter of seconds. Our attack is low-cost, fast, and stealthy. It requires only a moderate amount of resources and can be deployed by website owners, third-party script providers, and malicious exits—if the website traffic is unencrypted. The attack works by injecting resources from non-existing onion service addresses into a webpage. Upon visiting the attack webpage with Tor Browser, the victim’s Tor client creates many circuits to look up the non-existing addresses. This allows middle relays controlled by the adversary to detect the distinctive traffic pattern of the “404 Not Found” lookups and identify the victim’s guard. We evaluate our attack with extensive simulations and live Tor network measurements, taking a range of victim machine, network, and geolocation configurations into account. We find that an adversary running a small number of HSDirs and providing 5 % of Tor’s relay bandwidth needs 12.06 seconds to identify the guards of 50 % of the victims, while it takes 22.01 seconds to discover 90 % of the victims’ guards. Finally, we evaluate a set of countermeasures against our attack including a defense that we develop based on a token bucket and the recently proposed Vanguards-lite defense in Tor.
我们提出了一种新的基于网络的攻击,可以在几秒钟内识别Tor用户的守卫。我们的攻击成本低,速度快,而且隐蔽。它只需要适量的资源,可以由网站所有者、第三方脚本提供商和恶意出口(如果网站流量未加密)部署。这种攻击通过将不存在的洋葱服务地址中的资源注入到网页中来实现。在使用Tor浏览器访问攻击网页时,受害者的Tor客户端创建了许多电路来查找不存在的地址。这允许由攻击者控制的中间中继检测“404 Not Found”查找的独特流量模式并识别受害者的守卫。我们通过广泛的模拟和实时Tor网络测量来评估我们的攻击,将一系列受害者机器,网络和地理位置配置考虑在内。我们发现,运行少量hsdir并提供Tor中继带宽5%的攻击者需要12.06秒才能识别50%受害者的守卫,而发现90%受害者的守卫需要22.01秒。最后,我们评估了一组针对我们攻击的对策,包括我们基于令牌桶开发的防御和最近在Tor中提出的先锋生命防御。
{"title":"From “Onion Not Found” to Guard Discovery","authors":"Lennart Oldenburg, Gunes Acar, C. Díaz","doi":"10.2478/popets-2022-0026","DOIUrl":"https://doi.org/10.2478/popets-2022-0026","url":null,"abstract":"Abstract We present a novel web-based attack that identifies a Tor user’s guard in a matter of seconds. Our attack is low-cost, fast, and stealthy. It requires only a moderate amount of resources and can be deployed by website owners, third-party script providers, and malicious exits—if the website traffic is unencrypted. The attack works by injecting resources from non-existing onion service addresses into a webpage. Upon visiting the attack webpage with Tor Browser, the victim’s Tor client creates many circuits to look up the non-existing addresses. This allows middle relays controlled by the adversary to detect the distinctive traffic pattern of the “404 Not Found” lookups and identify the victim’s guard. We evaluate our attack with extensive simulations and live Tor network measurements, taking a range of victim machine, network, and geolocation configurations into account. We find that an adversary running a small number of HSDirs and providing 5 % of Tor’s relay bandwidth needs 12.06 seconds to identify the guards of 50 % of the victims, while it takes 22.01 seconds to discover 90 % of the victims’ guards. Finally, we evaluate a set of countermeasures against our attack including a defense that we develop based on a token bucket and the recently proposed Vanguards-lite defense in Tor.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42957166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA? 降低门槛:网站是否符合CCPA的最低要求?
Maggie Van Nortwick, Christo Wilson
Abstract On June 28, 2018, the California State Legislature passed the California Consumer Privacy Act (CCPA), arguably the most comprehensive piece of online privacy legislation in the United States. Online services covered by the CCPA are required to provide a hyperlink on their homepage with the text “Do Not Sell My Personal Information” (DNSMPI). The CCPA went into effect on January 1, 2020, a date that was chosen to give data collectors time to study the new law and bring themselves into compliance. In this study, we begin the process of investigating whether websites are complying with the CCPA by focusing on DNSMPI links. Using longitudinal data crawled from the top 1M websites in the Tranco ranking, we examine which websites are including DNSMPI links, whether the websites without DNSMPI links are out of compliance with the law, whether websites are using geofences to dynamically hide DNSMPI links from non-Californians, how DNSMPI adoption has changed over time, and how websites are choosing to present DNSMPI links (e.g., in terms of font size, color, and placement). We argue that the answers to these questions are critical for spurring enforcement actions under the law, and helping to shape future privacy laws and regulations, e.g., rule making that will soon commence around the successor to the CCPA, known as the CPRA.
摘要2018年6月28日,加利福尼亚州议会通过了《加利福尼亚消费者隐私法》,可以说是美国最全面的网络隐私立法。CCPA涵盖的在线服务需要在其主页上提供一个超链接,文本为“请勿出售我的个人信息”(DNSMPI)。CCPA于2020年1月1日生效,选择这一日期是为了让数据采集者有时间研究新法律并遵守规定。在这项研究中,我们通过关注DNSMPI链接,开始调查网站是否符合CCPA。使用从Tranco排名前100万的网站中抓取的纵向数据,我们检查了哪些网站包含DNSPI链接,没有DNSPI链接的网站是否不符合法律,网站是否使用地理围栏向非加州人动态隐藏DNSPI链接、DNSPI的采用如何随着时间的推移而变化,以及网站如何选择呈现DNSMPI链接(例如,在字体大小、颜色和位置方面)。我们认为,这些问题的答案对于刺激法律下的执法行动,并有助于制定未来的隐私法律和法规至关重要,例如,即将围绕CCPA的继任者(即CPRA)开始的规则制定。
{"title":"Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?","authors":"Maggie Van Nortwick, Christo Wilson","doi":"10.2478/popets-2022-0030","DOIUrl":"https://doi.org/10.2478/popets-2022-0030","url":null,"abstract":"Abstract On June 28, 2018, the California State Legislature passed the California Consumer Privacy Act (CCPA), arguably the most comprehensive piece of online privacy legislation in the United States. Online services covered by the CCPA are required to provide a hyperlink on their homepage with the text “Do Not Sell My Personal Information” (DNSMPI). The CCPA went into effect on January 1, 2020, a date that was chosen to give data collectors time to study the new law and bring themselves into compliance. In this study, we begin the process of investigating whether websites are complying with the CCPA by focusing on DNSMPI links. Using longitudinal data crawled from the top 1M websites in the Tranco ranking, we examine which websites are including DNSMPI links, whether the websites without DNSMPI links are out of compliance with the law, whether websites are using geofences to dynamically hide DNSMPI links from non-Californians, how DNSMPI adoption has changed over time, and how websites are choosing to present DNSMPI links (e.g., in terms of font size, color, and placement). We argue that the answers to these questions are critical for spurring enforcement actions under the law, and helping to shape future privacy laws and regulations, e.g., rule making that will soon commence around the successor to the CCPA, known as the CPRA.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45064154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Forward and Backward-Secure Range-Searchable Symmetric Encryption 前向和后向安全范围可搜索对称加密
Jiafan Wang, Sherman S. M. Chow
Abstract Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted database. Range queries are commonly needed. Previous range-searchable schemes either do not support updates natively (SIGMOD’16) or use file indexes of many long bit-vectors for distinct keywords, which only support toggling updates via homomorphically flipping the presence bit. (ESORICS’18). We propose a generic upgrade of any (inverted-index) DSSE to support range queries (a.k.a. range DSSE), without homomorphic encryption, and a specific instantiation with a new trade-off reducing client-side storage. Our schemes achieve forward security, an important property that mitigates file injection attacks. Moreover, we identify a variant of injection attacks against the first somewhat dynamic scheme (ESORICS’18). We also extend the definition of backward security to range DSSE and show that our schemes are compatible with a generic upgrade of backward security (CCS’17). We comprehensively analyze the computation and communication overheads, including implementation details of client-side index-related operations omitted by prior schemes. We show high empirical efficiency for million-scale databases over a million-scale keyword space.
动态可搜索对称加密(DSSE)允许客户端查询或更新外包的加密数据库。通常需要范围查询。以前的范围搜索方案要么不支持本地更新(SIGMOD ' 16),要么为不同的关键字使用许多长位向量的文件索引,这只支持通过同态翻转存在位来切换更新。(ESORICS 18)。我们建议对任何(反向索引)DSSE进行通用升级,以支持范围查询(又称范围DSSE),而不使用同态加密,并提出具有减少客户端存储的新权衡的特定实例化。我们的方案实现了前向安全性,这是减轻文件注入攻击的重要特性。此外,我们确定了针对第一种动态方案(ESORICS ' 18)的注入攻击的变体。我们还将后向安全的定义扩展到DSSE范围,并表明我们的方案与后向安全的一般升级(CCS ' 17)兼容。我们全面分析了计算和通信开销,包括之前的方案忽略的客户端索引相关操作的实现细节。我们在百万规模的关键字空间上展示了百万规模数据库的高经验效率。
{"title":"Forward and Backward-Secure Range-Searchable Symmetric Encryption","authors":"Jiafan Wang, Sherman S. M. Chow","doi":"10.2478/popets-2022-0003","DOIUrl":"https://doi.org/10.2478/popets-2022-0003","url":null,"abstract":"Abstract Dynamic searchable symmetric encryption (DSSE) allows a client to query or update an outsourced encrypted database. Range queries are commonly needed. Previous range-searchable schemes either do not support updates natively (SIGMOD’16) or use file indexes of many long bit-vectors for distinct keywords, which only support toggling updates via homomorphically flipping the presence bit. (ESORICS’18). We propose a generic upgrade of any (inverted-index) DSSE to support range queries (a.k.a. range DSSE), without homomorphic encryption, and a specific instantiation with a new trade-off reducing client-side storage. Our schemes achieve forward security, an important property that mitigates file injection attacks. Moreover, we identify a variant of injection attacks against the first somewhat dynamic scheme (ESORICS’18). We also extend the definition of backward security to range DSSE and show that our schemes are compatible with a generic upgrade of backward security (CCS’17). We comprehensively analyze the computation and communication overheads, including implementation details of client-side index-related operations omitted by prior schemes. We show high empirical efficiency for million-scale databases over a million-scale keyword space.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43613224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
How Can and Would People Protect From Online Tracking? 人们如何保护自己免受在线跟踪?
M. Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini
Abstract Online tracking is complex and users find it challenging to protect themselves from it. While the academic community has extensively studied systems and users for tracking practices, the link between the data protection regulations, websites’ practices of presenting privacy-enhancing technologies (PETs), and how users learn about PETs and practice them is not clear. This paper takes a multidimensional approach to find such a link. We conduct a study to evaluate the 100 top EU websites, where we find that information about PETs is provided far beyond the cookie notice. We also find that opting-out from privacy settings is not as easy as opting-in and becomes even more difficult (if not impossible) when the user decides to opt-out of previously accepted privacy settings. In addition, we conduct an online survey with 614 participants across three countries (UK, France, Germany) to gain a broad understanding of users’ tracking protection practices. We find that users mostly learn about PETs for tracking protection via their own research or with the help of family and friends. We find a disparity between what websites offer as tracking protection and the ways individuals report to do so. Observing such a disparity sheds light on why current policies and practices are ineffective in supporting the use of PETs by users.
摘要在线跟踪很复杂,用户发现保护自己不受其影响很有挑战性。虽然学术界已经广泛研究了跟踪实践的系统和用户,但数据保护法规、网站展示隐私增强技术(PETs)的实践以及用户如何了解和实践PETs之间的联系尚不清楚。本文采用多维方法来寻找这种联系。我们进行了一项研究,对100个欧盟顶级网站进行了评估,发现有关宠物的信息远远超出了cookie通知的范围。我们还发现,选择退出隐私设置并不像选择加入那么容易,当用户决定退出以前接受的隐私设置时,这会变得更加困难(如果不是不可能的话)。此外,我们对三个国家(英国、法国、德国)的614名参与者进行了在线调查,以广泛了解用户的跟踪保护做法。我们发现,用户大多通过自己的研究或在家人和朋友的帮助下了解用于追踪保护的宠物。我们发现,网站提供的跟踪保护与个人报告的方式之间存在差异。观察到这种差异,可以了解为什么当前的政策和做法在支持用户使用PETs方面无效。
{"title":"How Can and Would People Protect From Online Tracking?","authors":"M. Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini","doi":"10.2478/popets-2022-0006","DOIUrl":"https://doi.org/10.2478/popets-2022-0006","url":null,"abstract":"Abstract Online tracking is complex and users find it challenging to protect themselves from it. While the academic community has extensively studied systems and users for tracking practices, the link between the data protection regulations, websites’ practices of presenting privacy-enhancing technologies (PETs), and how users learn about PETs and practice them is not clear. This paper takes a multidimensional approach to find such a link. We conduct a study to evaluate the 100 top EU websites, where we find that information about PETs is provided far beyond the cookie notice. We also find that opting-out from privacy settings is not as easy as opting-in and becomes even more difficult (if not impossible) when the user decides to opt-out of previously accepted privacy settings. In addition, we conduct an online survey with 614 participants across three countries (UK, France, Germany) to gain a broad understanding of users’ tracking protection practices. We find that users mostly learn about PETs for tracking protection via their own research or with the help of family and friends. We find a disparity between what websites offer as tracking protection and the ways individuals report to do so. Observing such a disparity sheds light on why current policies and practices are ineffective in supporting the use of PETs by users.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48410923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF 基于放宽批量OPPRF的线性复杂度电路psi
Nishanth Chandran, Divya Gupta, Akash Shah
Abstract In 2-party Circuit-based Private Set Intersection (Circuit-PSI), P0 and P1 hold sets S0 and S1 respectively and wish to securely compute a function f over the set S0 ∩ S1 (e.g., cardinality, sum over associated attributes, or threshold intersection). Following a long line of work, Pinkas et al. (PSTY, Eurocrypt 2019) showed how to construct a concretely efficient Circuit-PSI protocol with linear communication complexity. However, their protocol requires super-linear computation. In this work, we construct concretely efficient Circuit-PSI protocols with linear computational and communication cost. Further, our protocols are more performant than the state-of-the-art, PSTY – we are ≈ 2.3× more communication efficient and are up to 2.8× faster. We obtain our improvements through a new primitive called Relaxed Batch Oblivious Programmable Pseudorandom Functions (RB-OPPRF) that can be seen as a strict generalization of Batch OPPRFs that were used in PSTY. This primitive could be of independent interest.
在基于2方电路的私有集交集(circuit_psi)中,P0和P1分别持有集合S0和S1,并希望安全地计算集合S0∩S1上的函数f(例如,基数、相关属性和或阈值交集)。经过长时间的工作,Pinkas等人(PSTY, Eurocrypt 2019)展示了如何构建具有线性通信复杂性的具体有效的Circuit-PSI协议。然而,他们的协议需要超线性计算。在这项工作中,我们构建了具有线性计算和通信成本的具体有效的Circuit-PSI协议。此外,我们的协议比最先进的PSTY性能更高——我们的通信效率提高约2.3倍,速度提高2.8倍。我们通过一个新的原语获得了改进,该原语称为放松批无关可编程伪随机函数(RB-OPPRF),它可以被视为PSTY中使用的批处理opprf的严格泛化。这个原始人可能有独立的兴趣。
{"title":"Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF","authors":"Nishanth Chandran, Divya Gupta, Akash Shah","doi":"10.2478/popets-2022-0018","DOIUrl":"https://doi.org/10.2478/popets-2022-0018","url":null,"abstract":"Abstract In 2-party Circuit-based Private Set Intersection (Circuit-PSI), P0 and P1 hold sets S0 and S1 respectively and wish to securely compute a function f over the set S0 ∩ S1 (e.g., cardinality, sum over associated attributes, or threshold intersection). Following a long line of work, Pinkas et al. (PSTY, Eurocrypt 2019) showed how to construct a concretely efficient Circuit-PSI protocol with linear communication complexity. However, their protocol requires super-linear computation. In this work, we construct concretely efficient Circuit-PSI protocols with linear computational and communication cost. Further, our protocols are more performant than the state-of-the-art, PSTY – we are ≈ 2.3× more communication efficient and are up to 2.8× faster. We obtain our improvements through a new primitive called Relaxed Batch Oblivious Programmable Pseudorandom Functions (RB-OPPRF) that can be seen as a strict generalization of Batch OPPRFs that were used in PSTY. This primitive could be of independent interest.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47132766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites 适应方法在提高社交网站用户参与度和隐私保护方面的有效性
M. Namara, Henry Sloan, Bart P. Knijnenburg
Abstract Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with the plethora of available privacy features— arguably due to their sheer number and the fact that they are often hidden from sight. As different users are likely interested in engaging with different subsets of privacy features, an SNS could improve privacy management practices by adapting its interface in a way that proactively assists, guides, or prompts users to engage with the subset of privacy features they are most likely to benefit from. Whereas recent work presents algorithmic implementations of such privacy adaptation methods, this study investigates the optimal user interface mechanism to present such adaptations. In particular, we tested three proposed “adaptation methods” (automation, suggestions, highlights) in an online between-subjects user experiment in which 406 participants used a carefully controlled SNS prototype. We systematically evaluate the effect of these adaptation methods on participants’ engagement with the privacy features, their tendency to set stricter settings (protection), and their subjective evaluation of the assigned adaptation method. We find that the automation of privacy features afforded users the most privacy protection, while giving privacy suggestions caused the highest level of engagement with the features and the highest subjective ratings (as long as awkward suggestions are avoided). We discuss the practical implications of these findings in the effectiveness of adaptations improving user awareness of, and engagement with, privacy features on social media.
研究发现,社交网站(sns)的用户往往不能全面参与到大量可用的隐私功能中,这可能是由于它们的数量庞大,而且它们往往隐藏在视线之外。由于不同的用户可能对参与不同的隐私功能子集感兴趣,SNS可以通过调整其界面来改进隐私管理实践,主动帮助、引导或提示用户参与他们最有可能从中受益的隐私功能子集。鉴于最近的工作提出了这种隐私适应方法的算法实现,本研究探讨了呈现这种适应的最佳用户界面机制。特别地,我们在一个在线受试者之间的用户实验中测试了三种提出的“适应方法”(自动化、建议、突出),在这个实验中,406名参与者使用了一个精心控制的SNS原型。我们系统地评估了这些适应方法对参与者对隐私特征的参与、他们设置更严格设置(保护)的倾向以及他们对所分配的适应方法的主观评价的影响。我们发现,隐私功能的自动化为用户提供了最多的隐私保护,而提供隐私建议则引起了用户对这些功能的最高参与度和最高的主观评分(只要避免尴尬的建议)。我们讨论了这些发现在提高用户意识和参与社交媒体隐私功能的适应性方面的实际意义。
{"title":"The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites","authors":"M. Namara, Henry Sloan, Bart P. Knijnenburg","doi":"10.2478/popets-2022-0031","DOIUrl":"https://doi.org/10.2478/popets-2022-0031","url":null,"abstract":"Abstract Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with the plethora of available privacy features— arguably due to their sheer number and the fact that they are often hidden from sight. As different users are likely interested in engaging with different subsets of privacy features, an SNS could improve privacy management practices by adapting its interface in a way that proactively assists, guides, or prompts users to engage with the subset of privacy features they are most likely to benefit from. Whereas recent work presents algorithmic implementations of such privacy adaptation methods, this study investigates the optimal user interface mechanism to present such adaptations. In particular, we tested three proposed “adaptation methods” (automation, suggestions, highlights) in an online between-subjects user experiment in which 406 participants used a carefully controlled SNS prototype. We systematically evaluate the effect of these adaptation methods on participants’ engagement with the privacy features, their tendency to set stricter settings (protection), and their subjective evaluation of the assigned adaptation method. We find that the automation of privacy features afforded users the most privacy protection, while giving privacy suggestions caused the highest level of engagement with the features and the highest subjective ratings (as long as awkward suggestions are avoided). We discuss the practical implications of these findings in the effectiveness of adaptations improving user awareness of, and engagement with, privacy features on social media.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47242930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-preserving FairSwap: Fairness and privacy interplay 隐私保护公平交换:公平与隐私的相互作用
S. Avizheh, Preston Haffey, R. Safavi-Naini
Abstract Fair exchange protocols are among the most important cryptographic primitives in electronic commerce. A basic fair exchange protocol requires that two parties who want to exchange their digital items either receive what they have been promised, or lose nothing. Privacy of fair exchange requires that no one else (other than the two parties) learns anything about the items. Fairness and privacy have been considered as two distinct properties of an exchange protocol. In this paper, we show that subtle ways of leaking the exchange item to the third parties affect fairness in fair exchange protocols when the item is confidential. Our focus is on Fair-Swap, a recently proposed fair exchange protocol that uses a smart contract for dispute resolution, has proven security in UC (Universal Composability) framework, and provides privacy when both parties are honest. We demonstrate, however, that FairSwap’s dispute resolution protocol leaks information to the public and this leakage provides opportunities for the dishonest parties to influence the protocol’s fairness guarantee. We then propose an efficient privacy-enhanced version of Fair-Swap, prove its security and give an implementation and performance evaluation of our proposed system. Our privacy enhancement uses circuit randomization, and we prove its security and privacy in an extension of universal composability model for non-monolithic adversaries that would be of independent interest.
摘要公平交换协议是电子商务中最重要的密码原语之一。一个基本的公平交换协议要求,想要交换数字物品的双方要么收到承诺,要么什么都不损失。公平交换的隐私要求任何其他人(双方除外)都不了解有关物品的任何信息。公平性和隐私性被认为是交换协议的两个不同性质。在本文中,我们证明了当交换项目是保密的时,将交换项目泄露给第三方的微妙方式会影响公平交换协议的公平性。我们的重点是公平交换,这是一种最近提出的公平交换协议,使用智能合约解决争议,在UC(通用可组合性)框架中证明了安全性,并在双方诚实的情况下提供隐私。然而,我们证明,FairSwap的争议解决协议向公众泄露了信息,这种泄露为不诚实的各方提供了影响协议公平保障的机会。然后,我们提出了一个有效的公平交换隐私增强版本,证明了它的安全性,并对我们提出的系统进行了实现和性能评估。我们的隐私增强使用电路随机化,我们在非单片对手的通用可组合性模型的扩展中证明了它的安全性和隐私性,这将是独立的利益。
{"title":"Privacy-preserving FairSwap: Fairness and privacy interplay","authors":"S. Avizheh, Preston Haffey, R. Safavi-Naini","doi":"10.2478/popets-2022-0021","DOIUrl":"https://doi.org/10.2478/popets-2022-0021","url":null,"abstract":"Abstract Fair exchange protocols are among the most important cryptographic primitives in electronic commerce. A basic fair exchange protocol requires that two parties who want to exchange their digital items either receive what they have been promised, or lose nothing. Privacy of fair exchange requires that no one else (other than the two parties) learns anything about the items. Fairness and privacy have been considered as two distinct properties of an exchange protocol. In this paper, we show that subtle ways of leaking the exchange item to the third parties affect fairness in fair exchange protocols when the item is confidential. Our focus is on Fair-Swap, a recently proposed fair exchange protocol that uses a smart contract for dispute resolution, has proven security in UC (Universal Composability) framework, and provides privacy when both parties are honest. We demonstrate, however, that FairSwap’s dispute resolution protocol leaks information to the public and this leakage provides opportunities for the dishonest parties to influence the protocol’s fairness guarantee. We then propose an efficient privacy-enhanced version of Fair-Swap, prove its security and give an implementation and performance evaluation of our proposed system. Our privacy enhancement uses circuit randomization, and we prove its security and privacy in an extension of universal composability model for non-monolithic adversaries that would be of independent interest.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44074670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Masking Feedforward Neural Networks Against Power Analysis Attacks 屏蔽前馈神经网络抵御功率分析攻击
Konstantinos Athanasiou, T. Wahl, A. Ding, Yunsi Fei
Abstract Recent advances in machine learning have enabled Neural Network (NN) inference directly on constrained embedded devices. This local approach enhances the privacy of user data, as the inputs to the NN inference are not shared with third-party cloud providers over a communication network. At the same time, however, performing local NN inference on embedded devices opens up the possibility of Power Analysis attacks, which have recently been shown to be effective in recovering NN parameters, as well as their activations and structure. Knowledge of these NN characteristics constitutes a privacy threat, as it enables highly effective Membership Inference and Model Inversion attacks, which can recover information about the sensitive data that the NN model was trained on. In this paper we address the problem of securing sensitive NN inference parameters against Power Analysis attacks. Our approach employs masking, a countermeasure well-studied in the context of cryptographic algorithms. We design a set of gadgets, i.e., masked operations, tailored to NN inference. We prove our proposed gadgets secure against power attacks and show, both formally and experimentally, that they are composable, resulting in secure NN inference. We further propose optimizations that exploit intrinsic characteristics of NN inference to reduce the masking’s runtime and randomness requirements. We empirically evaluate the performance of our constructions, showing them to incur a slowdown by a factor of about 2–5.
机器学习的最新进展使神经网络(NN)能够直接在受限的嵌入式设备上进行推理。这种本地方法增强了用户数据的隐私性,因为神经网络推理的输入不会通过通信网络与第三方云提供商共享。然而,与此同时,在嵌入式设备上执行局部神经网络推理打开了功率分析攻击的可能性,这最近被证明在恢复神经网络参数以及它们的激活和结构方面是有效的。这些神经网络特征的知识构成了隐私威胁,因为它可以实现高效的成员推理和模型反转攻击,这些攻击可以恢复有关神经网络模型所训练的敏感数据的信息。在本文中,我们解决了保护敏感神经网络推理参数免受功率分析攻击的问题。我们的方法采用掩蔽,这是一种在密码学算法中得到充分研究的对策。我们设计了一套小工具,即掩码操作,为神经网络推理量身定制。我们证明了我们提出的小工具可以免受功率攻击,并在正式和实验上证明它们是可组合的,从而实现了安全的神经网络推理。我们进一步提出了利用神经网络推理的内在特征来减少屏蔽的运行时间和随机性要求的优化方法。我们根据经验评估了我们的结构的性能,显示它们会导致大约2-5倍的减速。
{"title":"Masking Feedforward Neural Networks Against Power Analysis Attacks","authors":"Konstantinos Athanasiou, T. Wahl, A. Ding, Yunsi Fei","doi":"10.2478/popets-2022-0025","DOIUrl":"https://doi.org/10.2478/popets-2022-0025","url":null,"abstract":"Abstract Recent advances in machine learning have enabled Neural Network (NN) inference directly on constrained embedded devices. This local approach enhances the privacy of user data, as the inputs to the NN inference are not shared with third-party cloud providers over a communication network. At the same time, however, performing local NN inference on embedded devices opens up the possibility of Power Analysis attacks, which have recently been shown to be effective in recovering NN parameters, as well as their activations and structure. Knowledge of these NN characteristics constitutes a privacy threat, as it enables highly effective Membership Inference and Model Inversion attacks, which can recover information about the sensitive data that the NN model was trained on. In this paper we address the problem of securing sensitive NN inference parameters against Power Analysis attacks. Our approach employs masking, a countermeasure well-studied in the context of cryptographic algorithms. We design a set of gadgets, i.e., masked operations, tailored to NN inference. We prove our proposed gadgets secure against power attacks and show, both formally and experimentally, that they are composable, resulting in secure NN inference. We further propose optimizations that exploit intrinsic characteristics of NN inference to reduce the masking’s runtime and randomness requirements. We empirically evaluate the performance of our constructions, showing them to incur a slowdown by a factor of about 2–5.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69252427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures DataProVe:数据保护策略和系统体系结构之间的全自动一致性验证
Vinh-Thong Ta, M. Eiza
Abstract Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses and organisations are encouraged to implement measures at an early stage of the system design phase to fulfil data protection requirements. This paper addresses the policy and system architecture design and propose two variants of privacy policy language and architecture description language, respectively, for specifying and verifying data protection and privacy requirements. In addition, we develop a fully automated algorithm based on logic, for verifying three types of conformance relations (privacy, data protection, and functional conformance) between a policy and an architecture specified in our languages’ variants. Compared to related works, this approach supports a more systematic and fine-grained analysis of the privacy, data protection, and functional properties of a system. Our theoretical methods are then implemented as a software tool called DataProVe and its feasibility is demonstrated based on the centralised and decentralised approaches of COVID-19 contact tracing applications.
摘要隐私和设计数据保护是《通用数据保护条例》(GDPR)的相关部分,该条例鼓励企业和组织在系统设计阶段的早期阶段实施措施,以满足数据保护要求。本文讨论了策略和系统架构设计,并分别提出了隐私策略语言和架构描述语言的两种变体,用于指定和验证数据保护和隐私要求。此外,我们开发了一种基于逻辑的全自动算法,用于验证策略和我们语言变体中指定的架构之间的三种类型的一致性关系(隐私、数据保护和功能一致性)。与相关工作相比,这种方法支持对系统的隐私、数据保护和功能属性进行更系统、更细粒度的分析。然后,我们的理论方法被实现为一种名为DataProVe的软件工具,其可行性基于新冠肺炎接触者追踪应用程序的集中式和去中心化方法进行了论证。
{"title":"DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures","authors":"Vinh-Thong Ta, M. Eiza","doi":"10.2478/popets-2022-0028","DOIUrl":"https://doi.org/10.2478/popets-2022-0028","url":null,"abstract":"Abstract Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses and organisations are encouraged to implement measures at an early stage of the system design phase to fulfil data protection requirements. This paper addresses the policy and system architecture design and propose two variants of privacy policy language and architecture description language, respectively, for specifying and verifying data protection and privacy requirements. In addition, we develop a fully automated algorithm based on logic, for verifying three types of conformance relations (privacy, data protection, and functional conformance) between a policy and an architecture specified in our languages’ variants. Compared to related works, this approach supports a more systematic and fine-grained analysis of the privacy, data protection, and functional properties of a system. Our theoretical methods are then implemented as a software tool called DataProVe and its feasibility is demonstrated based on the centralised and decentralised approaches of COVID-19 contact tracing applications.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45230324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1