/
Hummingbird: Privacy at the time of Twitter Hummingbird: Privacy at the time of Twitter

Hummingbird: Privacy at the time of Twitter - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
397 views
Uploaded On 2016-07-22

Hummingbird: Privacy at the time of Twitter - PPT Presentation

Emiliano De Cristofaro Claudio Soriente Gene Tsudik Andrew Williams Presented by Hongyu Gao Northwestern University 2 Motivation Recall the three types of OSN privacy breaches ID: 414680

learns server hashtags privacy server learns privacy hashtags alice hummingbird user tweets bob hashtag subscriptions tweeter breach subscribed information

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Hummingbird: Privacy at the time of Twit..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Hummingbird: Privacy at the time of Twitter

Emiliano

De CristofaroClaudio SorienteGene TsudikAndrew Williams

Presented by

Hongyu

Gao

, Northwestern UniversitySlide2

2

MotivationRecall the three types of OSN privacy breaches?Breach from the service provider

Breach from other userBreach from 3rd party appsFacts:Now Twitter boasts over 100 million subscribersUsers have very little control over privacySlide3

3

Motivation, cont’dMotivating examplesLooking for tweets with #

TeaParty might expose one’s political views.Search for #HIVcure might reveal one’s medical condition.What could happen if data is stored in the server in clear text?Mining by service providerHacker break-inInsider attackSlide4

4

Related WorksA Lot different!xBook, protects user privacy from 3

rd party appsHummingbird, protects user privacy from the serverQuite differentDe-centralized OSNs [7,15]Hummingbird preserves the central server to guarantee availabilitySlide5

5

Related Works, cont’dOther designs that keep the central server#h00t [6] encrypts/decrypts tweets and the contained

hashtag with secret shared within a user group.Facecloak [38] provides fake info to the server.VPSN [17] also provides fake into to the server.…Slide6

6

Privacy GoalsServer: learns minimal information beyond that obtained from performing the matching function.

Tweeter: learns who subscribes to its hashtags but not which hashtags have been subscribed to.Follower: learns nothing beyond its own subscriptions. It learns no information about other subscribers or any tweets that do not match its subscriptions.Slide7

7

Privacy Non-GoalsServer learns who follows whom.Server learns whenever multiple tweets from a given tweeter contain the same

hashtag.Server learns whenever multiple followers are subscribed to the same hashtag of a given tweeter.Slide8

8

8

Key System DesignSystem PrototypePerformance OverheadDiscussions and Conclusions

RoadmapSlide9

9

Hummingbird ProtocolSlide10

10

Crucial Background: OPRF

Name: Oblivious PseudoRandom FunctionsEffect: Securely compute fs(x)Input: s from sender and x from receiverGuarantee: Sender learns nothing about xReceiver only learns the value of fs(x)Slide11

11

Key Design

Bob encrypts a message and Alice decrypts itBob and Alice share the secret fs(ht)fs(ht) is a cryptographic primitive that prevents Bob from learning ht (OPRF technique)The server forwards Bob’s message to AliceBoth Bob and Alice submit a cryptographic token, H2(fs(ht)), to the serverSlide12

12

Privacy Goals, re-visitServer: learns minimal information beyond that obtained from performing the matching function.

Tweeter: learns who subscribes to its hashtags but not which hashtags have been subscribed to.Follower: learns nothing beyond its own subscriptions. It learns no information about other subscribers or any tweets that do not match its subscriptions.Slide13

13

System PrototypeSlide14

14

14

Performance Overhead

<1ms

Also

negligible

comparing to web transactions

Comparable

to current TwitterSlide15

15

Discussions

The collusion disaster:By colluding with Alice, for all hashtags that Alice follows, the server can learn H2(fs(ht)), thus learn the identify of all other followers on ht.By colluding with Bob, the server can learn the interest (the subscribed hashtag) of all Bob’s followers.Slide16

16

Discussions

BIG (??) sacrifice of functionality:No retweets.No replying.No tweets without hashtags.No following a user (must follow a (user, hashtag) pair).Do you still want to use Hummingbird?Slide17

17

Conclusions

One the first efforts to mitigate privacy breach from service providers.Propose Hummingbird architecture.Implemented a prototype and demonstrated its low performance overheadSlide18

18

Thank you!