Have a personal or library account? Click to login
Computing Statistics from Private Data Cover

Computing Statistics from Private Data

Open Access
|Dec 2018

Figures & Tables

dsj-17-651-g1.png
Figure 1

Different partitions of data ownership within a database.

Table 1

MPC architectures.

ModelTrust RequirementsPerformanceInvolvement of data ownersScalability with number of data owners
Single cloudLowLowLowGood
Multiple cloud providersMediumHighLowGood
Private serversLowMediumHighBad
dsj-17-651-g2.png
Figure 2

Data owners send (encrypted) data to the computation server, the server performs the computation, and returns (encrypted) results. In this protocol, the server learns nothing about the underlying data. The computational burden on the data owners does not increase as the complexity of the computation increases.

dsj-17-651-g3.png
Figure 3

The data owners “secret-share” their data among a small number of computation servers. The servers execute an MPC protocol and return the result (or encryptions of the result) to the data owners (or an analyst). In this model, the data owners must trust the computation servers not to collude. If the servers do not collude, then the servers learn nothing about the data (or nothing beyond what is revealed by the output of the computation alone if the result is returned in the clear). The computational burden on the data owners does not increase as the complexity of the computation increases.

dsj-17-651-g4.png
Figure 4

The data owners play the role of computation servers, and each data owner installs and runs the MPC client software locally. In this model, the data owners no longer have to trust the computation servers not to collude. On the other hand, the this increases the computational (and communication) burden of the data owners who must now execute the MPC protocol themselves. Since all data owners must now communicate with all other data owners, the communication cost of this architecture does not scale to support a large number of data owners.

Table 2

MPC compilers.

SystemNumber of partiesSecurity modelFunction Language
SCALE-MAMBA82+Covert9Python-like
PICCO103+Semi-honestC
EMP-Toolkit112+Semi-honest or MaliciousC
Obliv-C122Semi-honestC
ABY132Semi-honestC++
Language: English
Submitted on: Oct 30, 2016
|
Accepted on: Oct 25, 2018
|
Published on: Dec 12, 2018
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2018 George Alter, Brett Hemenway Falk, Steve Lu, Rafail Ostrovsky, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.