Download - Lineage Stash: Fault tolerance (almost) for free Privacy ...

Transcript
Page 1: Lineage Stash: Fault tolerance (almost) for free Privacy ...

Lineage Stash: Fault tolerance (almost) for freeStephanie Wang, Philipp Moritz, Robert Nishihara, Alexey Tumanov, Ion Stoica

Privacy Preserving Data Muling SystemProject 2: Alvin Tan, Tess Despres, Jean-Luc Watson, Shishir Patil

Solution ResultsProblem

Current data muling systems utilize metadata that can reconstruct mobility traces or social networks.

Background

Use a state-of-the-art anonymous communication protocol, Express[1] (depicted below), to implement a privacy preserving data muling system.

What is data muling?

What are the privacy concerns? We demonstrate mobility tracking through simulation using only sensor/mule IDs & time of transmission.

Simulation:

System implementation:We evaluate Express against a baseline plaintext implementation on hardware.

Next Steps

● Energy evaluation of our system on embedded HW● Bidirectional communication ● Batch writes to reduce latency ● Protection against malicious mules

MQTT Publish

MQTT Subscribe

Write to memcache

Express Client

Server A

Write to in-memory

tables

Server B

Private write(hide data source)

Public read (can charge $)

hello!

We also use a simulation to evaluate scalability with:

● 100 mobile mules (10-20m BLE range)● 1000 stationary sensors (1-15m/s move speed)● 128 byte data payloads

[1] Eskandarian, S., Corrigan-Gibbs, H., Zaharia, M., & Boneh, D. (2021). Express: Lowering the cost of metadata-hiding communication with cryptographic privacy. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 1775-1792).

<data>Sensor A, 9:17am - Mule B