SlideShare a Scribd company logo
1 of 29
Download to read offline
SEARCHING IN PRIVACY	

COPING WITH SURVEILLANCE
OVERVIEW
• Motivation	

• Types of privacy-enhanced search	

• Search by Example
MOTIVATION
• Use remote / untrusted storage for any data	

• Protect your data
REMOTE / UNTRUSTED
STORAGE
• What if you don’t trust the storage provider ?	

• Encrypt	

• What if you want to use a search provider
but don’t trust them ?	

• What if you want to search your encrypted data ?
WHAT IFYOU WANTTO SEARCH
YOUR ENCRYPTED DATA ?
Naïve approach: Server sends you everything
WHAT IFYOU WANTTO SEARCH
YOUR ENCRYPTED DATA ?
Can we do better ?
TYPES OF	

PRIVACY-ENHANCED SEARCH
• Private Information Retrieval (PIR)	

• Search on encrypted data
PRIVATE INFORMATION
RETRIEVAL (PIR)
• Server should not learn what you are looking for	

• Server may or may not have access to
searchable data
SEARCH ON	

ENCRYPTED DATA
• Server should not learn anything about your data	

• Especially not learn anything when you are
searching
ADDRESS BOOK MATCHING
Naïve approach	

• Normalize, then send to server
ADDRESS BOOK MATCHING
Naïve approach	

• Normalize, then send to server
JUST DON’T.
ADDRESS BOOK MATCHING
Better approach	

• Hash your data. Like WhatsApp, or Gravatar.	

• Still guessable (e-mail addresses)	

• Gravatar tracking	

• Still pre-computable (phone numbers)	

• Steal the database or match what you like
ADDRESS BOOK MATCHING
Hash (social) connections
• My phone number m, friend's number f	

• Hash: h(min(m, f), max(m, f))	

• Both ends must have the other contact in the
address book to match	

• Anybody can confirm your connections
ADDRESS BOOK MATCHING
Hash (phone # | e-mail) || (first | last name)
• Common names (e.g. John) still easily retrievable	

• Users have to enter their own name
(besides phone no.) for others to find them	

• Contacts must contain first name & last name
ADDRESS BOOK MATCHING	

BLOOM FILTERS
Setup
• Compute m-bit vector from k independent hash
functions with range [1…m] of all entries to match	

• Hashes need not be cryptographically secure,
just independent
ADDRESS BOOK MATCHING	

BLOOM FILTERS
1
1
1
h1(p) = i1
h2(p) = i2
h3(p) = i3
h4(p) = i4
1
……………
position i3
m bits
ADDRESS BOOK MATCHING	

BLOOM FILTERS
Properties:
• Never any false negatives	

• n insertions	

• Probability of bit = 0: (1 - 1/m)kn	

• False positive rate: (1 - e-kn/m)k
KEYWORD SEARCH	

SEARCHABLE SYMMETRIC KEY ENCRYPTION
Properties:
• Probabilistic search	

• False positives with probability 1/2
m
per word, i.e.
L/2
m
for a document with L words	

• n insertions	

• Probability of bit being zero: (1 - 1/m)
kn
	

• False positive rate: (1 - e
-kn/m
)
k
SSKE	

BASIC SCHEME
Setup
• Break document into L words W1...WL, either with	

• n bits (padded; leaks word count) or	

• with length information (leaks word & document lengths)	

• PRG (stream cipher with key k' that only client knows)	

• S1...SL with (n - m) bits each	

• Keyed PRF Fki(x) maps (n - m) bits to m bits
W1 W2 Wi WL… …
SSKE	

BASIC SCHEME
Setup
• Ti := Si || Fki(Si)	

• Ciphertext Ci := Wi ⊕ Ti	

• Send encrypted document to server
Si Fki(Si)
Wi
⊕ Ci
C1 C2 Ci CL… …
SSKE	

BASIC SCHEME
Search for keyword wj
• Tell server	

• wj	

• ki for all locations i (with Wi) to search
SSKE	

BASIC SCHEME
Search for keyword wj
• Server computes Ci ⊕ wj	

• If Ci ⊕ wj = s || Fki(s), yield s for all locations i	

• Client can decrypt s and check for false positives
SSKE	

BASIC SCHEME
Problems
• Linear search effort, inefficient for real-world
documents with different word lengths	

• Client reveals ki of searched subset and wj
SSKE	

BASIC SCHEME
Improvement
• Use PRG G to generate ki := GK(Wi), K secret key	

• Does not depend on i but only on K and Wi	

• Reveal wj and GK(wj) for lookup	

• Still reveals keyword wj
SSKE	

BASIC SCHEME
Second improvement: Setup
• Encrypt all words in document xi := Esk(Wi)	

• Split each word xi into Li with (n - m) and Ri with m
bits	

• Now generate ki := GK(Li)	

• Ci := xi ⊕ Ti
SSKE	

BASIC SCHEME
Search
• Tell server	

• xj	

• kj := GK(Lj)
QUESTIONS ?
REFERENCES
• https://whispersystems.org/blog/contact-discovery/	

• http://www.cs.berkeley.edu/~dawnsong/papers/
se.pdf	

• http://www.csd.uoc.gr/~hy590-82/lecture9-se.ppt	

• https://crypto.stanford.edu/~eujin/papers/
secureindex/2003nov-encsearch.pdf
IMAGE SOURCES
• http://www.cominvent.com/wp-content/uploads/2008/02/
dilbert-searchengine.gif	

• http://i3.asn.im/Overloaded-truck-_tshp.jpg	

• http://www.hairofthedogdave.com/wp/wp-content/
uploads/2008/11/yes-we-can.jpg	

• http://www.8-bitcentral.com/blog/2013/allMyHeart.html	

• https://oeilsj.files.wordpress.com/2011/02/nike_swoosh.gif

More Related Content

Viewers also liked

дем’янюк світлана богданівна
дем’янюк світлана богданівнадем’янюк світлана богданівна
дем’янюк світлана богданівна
Svitlana Demyanyuk
 

Viewers also liked (11)

Coeffee Learning
Coeffee LearningCoeffee Learning
Coeffee Learning
 
дем’янюк світлана богданівна
дем’янюк світлана богданівнадем’янюк світлана богданівна
дем’янюк світлана богданівна
 
Moooi heracleum by bertjan pot
Moooi heracleum by bertjan potMoooi heracleum by bertjan pot
Moooi heracleum by bertjan pot
 
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing ProcessMicrosoft Dynamics NAV - as ERP Solution for Manufacturing Process
Microsoft Dynamics NAV - as ERP Solution for Manufacturing Process
 
makalah petir
makalah petirmakalah petir
makalah petir
 
Lactancia materna
Lactancia maternaLactancia materna
Lactancia materna
 
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
Permasalahan Lingkungan Hidup Lokal, Nasional dan Global
 
Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors Rapid Upper Limb Assessment (RULA) - Human Factors
Rapid Upper Limb Assessment (RULA) - Human Factors
 
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسساتERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
ERP : Arabized Microsoft dynamics NAV إدارة موارد المؤسسات
 
Teaching with questioning and answering method
Teaching with questioning and answering methodTeaching with questioning and answering method
Teaching with questioning and answering method
 
Motor listrik
Motor listrikMotor listrik
Motor listrik
 

Similar to Searching in Privacy

NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for Pentesters
Rob Fuller
 
20 security
20 security20 security
20 security
abiy2004
 

Similar to Searching in Privacy (20)

Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for Pentesters
 
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at ScaleCassandra Summit 2014: Fuzzy Entity Matching at Scale
Cassandra Summit 2014: Fuzzy Entity Matching at Scale
 
Osint, shoelaces, bubblegum
Osint, shoelaces, bubblegumOsint, shoelaces, bubblegum
Osint, shoelaces, bubblegum
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
 
CNIT 126 13: Data Encoding
CNIT 126 13: Data EncodingCNIT 126 13: Data Encoding
CNIT 126 13: Data Encoding
 
Test driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDBTest driving Azure Search and DocumentDB
Test driving Azure Search and DocumentDB
 
Neo4j Training Introduction
Neo4j Training IntroductionNeo4j Training Introduction
Neo4j Training Introduction
 
Introduction to Neo4j and .Net
Introduction to Neo4j and .NetIntroduction to Neo4j and .Net
Introduction to Neo4j and .Net
 
PHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptxPHISHING URL - Review 1.pptx
PHISHING URL - Review 1.pptx
 
20 security
20 security20 security
20 security
 
WLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WIWLIA - 2015 Fall Regional, Oshkosh WI
WLIA - 2015 Fall Regional, Oshkosh WI
 
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
 
Relational Database Design Bootcamp
Relational Database Design BootcampRelational Database Design Bootcamp
Relational Database Design Bootcamp
 
DNSSEC Validation Tutorial
DNSSEC Validation TutorialDNSSEC Validation Tutorial
DNSSEC Validation Tutorial
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymity
 
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution PlansSqlDay 2018 - Brief introduction into SQL Server Execution Plans
SqlDay 2018 - Brief introduction into SQL Server Execution Plans
 
Intro to Cypher
Intro to CypherIntro to Cypher
Intro to Cypher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Searching in Privacy