DocumentCode :
2994084
Title :
Differential Privacy by Typing in Security Protocols
Author :
Eigner, Fabienne ; Maffei, Matteo
Author_Institution :
Saarland Univ., Saarbrucken, Germany
fYear :
2013
fDate :
26-28 June 2013
Firstpage :
272
Lastpage :
286
Abstract :
Differential privacy is a confidentiality property for database queries which allows for the release of statistical information about the content of a database without disclosing personal data. The variety of database queries and enforcement mechanisms has recently sparked the development of a number of mechanized proof techniques for differential privacy. Personal data, however, are often spread across multiple databases and queries have to be jointly computed by multiple, possibly malicious, parties. Many cryptographic protocols have been proposed to protect the data in transit on the network and to achieve differential privacy in a distributed, adversarial setting. Proving differential privacy for such protocols is hard and, unfortunately, out of the scope of the aforementioned mechanized proof techniques. In this work, we present the first framework for the mechanized verification of distributed differential privacy. We propose a symbolic definition of differential privacy for distributed databases, which takes into account Dolev-Yao intruders and can be used to reason about compromised parties. Furthermore, we develop a linear, distance-aware type system to statically and automatically enforce distributed differential privacy in cryptographic protocol implementations (expressed in the RCF calculus). We also provide an algorithmic variant of our type system, which we prove sound and complete. Finally, we tested our analysis technique on a recently proposed protocol for privacy-preserving web analytics: we discovered a new attack acknowledged by the authors, proposed a fix, and successfully type-checked the revised variant.
Keywords :
Internet; cryptographic protocols; data analysis; data privacy; distributed databases; formal verification; query processing; statistical analysis; Dolev-Yao intruders; RCF calculus; adversarial setting; confidentiality property; cryptographic protocols; data protection; database queries; distance-aware type system; distributed databases; distributed differential privacy; distributed setting; enforcement mechanisms; linear type system; mechanized proof techniques; privacy-preserving Web analytics; security protocols; statistical information; Cryptography; Data privacy; Distributed databases; Noise; Privacy; Protocols; cryptographic protocols; differential privacy; type systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2013 IEEE 26th
Conference_Location :
New Orleans, LA
Type :
conf
DOI :
10.1109/CSF.2013.25
Filename :
6595834
Link To Document :
بازگشت