The Case of Adversarial Inputs for Secure Similarity Approximation Protocols

被引:2
|
作者
Kornaropoulos, Evgenios M. [1 ]
Efstathopoulos, Petros [2 ]
机构
[1] Brown Univ, Providence, RI 02912 USA
[2] Symantec Res Labs, Tempe, AZ 85281 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/EuroSP.2019.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computing similarity between high-dimensional data is a fundamental problem in data mining and information retrieval, with numerous applications such as e-discovery and patient similarity. To address the relevant performance and scalability challenges, approximation methods are employed. A common characteristic among all privacy-preserving approximation protocols based on sketching is that the sketching is performed locally and is based on common randomness. Inspired by the power of attacks on machine learning models, we introduce the study of adversarial inputs for secure similarity approximations. To formally capture the framework of this family of attacks we present a new threat model where a party is assumed to use the common randomness to perturb her input 1) offline, and 2) before the execution of any secure protocol, so as to steer the approximation result to a maliciously chosen output. We define perturbation attacks under this adversarial model and propose attacks for the techniques of minhash and cosine sketching. We demonstrate the simplicity and effectiveness of the attacks by measuring their success on synthetic and real data from the areas of e-discovery and patient similarity. To mitigate such perturbation attacks we propose a server-aided architecture, where an additional party, the server, assists in the secure similarity approximation by handling the common randomness as private data. We revise and introduce the necessary secure protocols so as to apply minhash and cosine sketching techniques in the server-aided architecture. Our implementation demonstrates that this new design can mitigate offline perturbation attacks without sacrificing the efficiency and scalability of the reconstruction protocol.
引用
收藏
页码:247 / 262
页数:16
相关论文
共 50 条
  • [1] Simplified Submission of Inputs to Protocols
    Wikstrom, Douglas
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 293 - 308
  • [2] Synthesizing secure protocols
    Cortier, Veronique
    Warinschi, Bogdan
    Zalinescu, Eugen
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 406 - 421
  • [3] Secure selection protocols
    Viswanathan, K
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 132 - 146
  • [4] Secure Composition of Protocols
    Cortier, Veronique
    THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 29 - 32
  • [5] Learning with stochastic inputs and adversarial outputs
    Lazaric, Alessandro
    Munos, Remi
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1516 - 1537
  • [6] How secure are secure interdomain routing protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Pete
    Rexford, Jennifer
    COMPUTER NETWORKS, 2014, 70 : 260 - 287
  • [7] Secure similarity search
    Park, Hyun-A
    Kim, Bum Han
    Lee, Dong Hoon
    Chung, Yon Dohn
    Zhan, Justin
    GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 598 - +
  • [8] How Secure are Secure Interdomain Routing Protocols?
    Goldberg, Sharon
    Schapira, Michael
    Hummon, Peter
    Rexford, Jennifer
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 87 - 98
  • [9] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
  • [10] Secure estimation for cyber-physical systems with adversarial attacks and unknown inputs: An L2-gain method
    Xie, Chun-Hua
    Yang, Guang-Hong
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2018, 28 (06) : 2131 - 2143