TAP: Transparent and Privacy-Preserving Data Services

10/21/2022
by   Daniel Reijsbergen, et al.
0

Users today expect more security from services that handle their data. In addition to traditional data privacy and integrity requirements, they expect transparency, i.e., that the service's processing of the data is verifiable by users and trusted auditors. Our goal is to build a multi-user system that provides data privacy, integrity, and transparency for a large number of operations, while achieving practical performance. To this end, we first identify the limitations of existing approaches that use authenticated data structures. We find that they fall into two categories: 1) those that hide each user's data from other users, but have a limited range of verifiable operations (e.g., CONIKS, Merkle2, and Proofs of Liabilities), and 2) those that support a wide range of verifiable operations, but make all data publicly visible (e.g., IntegriDB and FalconDB). We then present TAP to address the above limitations. The key component of TAP is a novel tree data structure that supports efficient result verification, and relies on independent audits that use zero-knowledge range proofs to show that the tree is constructed correctly without revealing user data. TAP supports a broad range of verifiable operations, including quantiles and sample standard deviations. We conduct a comprehensive evaluation of TAP, and compare it against two state-of-the-art baselines, namely IntegriDB and Merkle2, showing that the system is practical at scale.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/08/2020

Privacy and Integrity Preserving Computations with CRISP

In the digital era, users share their personal data with service provide...
research
07/03/2022

GlassDB: An Efficient Verifiable Ledger Database System Through Transparency

Verifiable ledger databases protect data history against malicious tampe...
research
03/08/2023

Automatic verification of transparency protocols (extended version)

We introduce new features in ProVerif, an automatic tool for verifying s...
research
12/10/2020

Data Privacy in Trigger-Action IoT Systems

Trigger-action platforms (TAPs) allow users to connect independent IoT o...
research
11/09/2022

Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations

The audit log is a crucial component to monitor fine-grained operations ...
research
12/01/2022

SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems

This paper introduces SPOT, a Secure and Privacy-preserving prOximity ba...
research
11/09/2020

Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures

In recent years, there has been increasing recognition of the benefits o...

Please sign up or login with your details

Forgot password? Click here to reset