49
Sharemind - practical privacy- preserving analytics Sander Siim Cybernetica AS [email protected]

Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Sharemind - practical privacy-preserving analytics

Sander Siim Cybernetica AS [email protected]

Page 2: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

About SharemindSharemind uses MPC to analyse data that was not accessible before.

Sharemind resolves trust issues by removing centralised control and unwanted data access points.

Page 3: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Application Server paradigm

applicationservers

Host 1 Host 2 Host n

databasebackends

interfaces Rmind statistics package

Web apps

SQL queries

Mobile apps

Java/JavaScript/C/C++/Haskell

Desktop apps

Page 4: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Encrypted computing

Public sector

Industry

People

Data owners

Data users

Decisionmakers

Researchers

General population

Acquisition channels

Mobile applications

ID sex age102 M 23106 F 38118 M 19143 M 32

Existing databases

Online services

Access channels

Data are collected and stored in an encrypted form

Data are not decrypted

for processing

Only the results of allowed queries can be published

📊

📈Analysis and

reporting tools

End-user applications

Page 5: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Model of secure computingInput

parties

IP1

IPk

...

Computing parties

CP1

CPl

x11

xk1

...

x1i

xki

...

x1l

xkl

...

y1

yl

yi...

Result parties

RP1

RPm

x1

xk

y

y

Step 1: upload and

storage of inputs

Step 3: publishing of results

Step 2: secure

computation

...

Page 6: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Secure computation cores

Namenum of input

parties

num of computing

parties

num of result

partiesTechnology Status

shared3p any 3 any LSS MPC, (Yao)

In commercial use

shared2p any 2 any LSS MPC, (Yao)

Under development

sharednp any 3 or more any LSS MPC Under development

Page 7: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

The shared3p core• Storage: additive and bitwise secret sharing • Computing: three-party MPC based on LSS • Data types: 13 types (boolean, signed and

unsigned integers, fixed point, floating point) • Operations: 650 machine-optimized protocols

• Protocols developed by Cybernetica over the last 10 years, heavily tuned and optimized

• Powers all our commercial applications and most R&D prototypes

Page 8: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Protocol DSL and compiler• Our newest and fastest protocols are

implemented with a special-purpose compiler • DSL(high-level description of ) =

machine-code that runs • Easy to test and implement new protocols • Optimizes protocol structure and

communication — up to 40x speed-up • Helps maintain our growing library of protocols • Can use also in 2-party/n-party case

Peeter Laud and Jaak Randmets. A domain-specific language for low-level secure multiparty computation protocols. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-6, 2015, pages 1492–1503. ACM, 2015.

⇡⇡

Page 9: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Cores in developmentshared2p • Storage: additive and bitwise secret sharing • Computing: two-party secure MPC • Combination of shared3p techniques with

Beaver triples

sharednp • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Page 10: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Controlling computations

Data owners Data users

Database

Policy

Sharemind only runs computations deployed by all computing parties.

Allowed outputs are defined by the queries.

If a computing party does not agree to run

an application, it cannot be run.

📊📈Published

results

Page 11: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

The SecreC language// Import module for the secure protocol suite import shared3p; // Data in private domain is processed via MPC domain private shared3p;

void main () { // Perform secure computations private int a = 2, b = 3; private int c = a * b; // Must explicitly declare publishing c print (declassify (c)); }

Page 12: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Polymorphic functionstemplate <domain D> D int scalarProd(D int[[1]] x, D int[[1]] y) { return sum(x*y); } domain private3 shared3p; domain private2 shared2p;

void main () { private3 int[[1]] x3(100) = 2, y3(100) = 3; private2 int[[1]] x2(100) = 2, y2(100) = 3; print (declassify (scalarProd(x3, y3))); print (declassify (scalarProd(x2, y2))); }

Page 13: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

SecreC standard library• A library of privacy-

preserving algorithms.

• Array and matrix operations, oblivious access, statistical testing, sorting, linking, regression modelling, aggregation, etc.

• 15 000 lines of reusable SecreC code

Page 14: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Demo!Prototype an MPC

application in minutes

Page 15: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Sharemind SDK• Free open-source prototyping tools available: http://sharemind-sdk.github.io/

• Includes SecreC and the standard library • An emulated Sharemind run-time that

estimates online performance • Excellent for quick prototyping

Page 16: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Case study:Government data analytics

Page 17: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

IT training has a failure rate

By 2012, a total of 43% of students enrolled in in the four largest IT higher learning institutions in Estonia during 2006-2012 had quit their studies. Source: Estonian Ministry of Education and Research, CentAR.

Table 1

Aasta 2006 2007 2008 2009 2010 2011 2012

New IT students

1352 1165 1180 1398 1438 1504 1769

Quit studies before 2012

796 661 558 616 583 486 89

Num

ber o

f stu

dent

s

0

450

900

1350

1800

Year2006 2007 2008 2009 2010 2011 2012

New IT students Quit studies before November 2012

89

486583616558661796

1 769

1 5041 4381 3981 1801 165

1 352796

661 558 616 583 486

89

Page 18: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Barriers for assessing the situation

Tax recordsEducation

records

Has the student worked?

In which period?In an IT company?

When did student enrol? When did he/she

graduate?In an IT curriculum?

How is workingrelated to not

graduating on time?

BarriersData Protection

Tax SecrecyDan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste. Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. In Proceedings on Privacy Enhancing Technologies, PoPETs, 2016 (3), pp 117–135, 2016.

Page 19: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Legal breakthroughsJanuary 2014: Estonian Data Protection Agency declared

that Sharemind technology and processes protect data so

well that the Personal Data Protection Act doesn’t apply.

January 2015: after a code audit, the internal oversight at

the Tax Board agreed to upload actual income tax records

into the Sharemind-based analysis system.

February 2015: the Tax Board, Ministry of Education,

Information Systems Authority, Ministry of Finance IT

Center and Cybernetica signed the world’s first secure

multi-party data analysis agreement.

Page 20: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Step 1: Import data

Estonian Education Information System

Register oftaxable persons

Ministry ofEducation and

Research

Estonian Taxand Customs

Board

EstonianInformation System's

Authority

Ministry of FinanceIT Center

Cybernetica

• Data owners uploaded data with the Sharemind importer to a shared3p core.

• Each value was encrypted at the source, private data never left the data owner.

• Over 600 000 study records (100 MB) used.

• Over 10 million tax records (1 GB) used.

• Largest MPC application on real-world data.

Page 21: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Step 2: Run the analysis• Statisticians used

Rmind to post queries.

• Sharemind ensured that only queries in the study plan were actually executed.

• Additional microdata protection controls were enforced.

EstonianInformation System's

Authority

Ministry of FinanceIT Center

Cybernetica

Statistician(Centar)

UniversitiesCompaniesPolicymakers

Page 22: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Operations performedTax and Customs

Board

Employmenttax payments

Ministry of Education

and Science

Higher studyevents

Monthly income

University career of a person

Aggregate by person

Average yearly income

Aggregate by year

Employment record of a person

Complete record of a person

Merge by person's ID

Analysis table

Compute additional attributes and

align tax payments Extract data

Extract data

Higher studyevents

Secret shareand upload

Employmenttax payments

Expand by years and aggregate by person

Aggregate by month

Data stored with secret sharing andprocessed with secure multi-party computation

Analysis results

?

Analysis results

Recoverresults from

shares

Statisticalanalyst

Page 23: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Sharemind Analytics Engine

Rmind

Page 24: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Sharemind Analytics Engine

Rmind

Page 25: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

IT is harder to graduate

8

2. Tulemused Tulemused kinnitavad, et nominaalajaga lõpetajate osakaal on madal tudengite hulgas üldiselt ja IKT-tudengite hulgas eriti. IKT-tudengite hulgas varieerub nominaalajaga lõpetajate osakaal bakalaureuse-õppes 20 protsendi piirimail, mis on madalam kui muude õppekavade tudengite vastav number (vt Joonis 1). Samasugune tendents ilmneb rakenduskõrgharidusõppe puhul. Magistriõppes on nominaalajaga lõpetajate osakaal veidi kõrgem, varieerudes sõltuvalt aastast 30% ja 40% vahel, kuid siingi on IKT õppurite hulgas see madalam kui teistel.

Joonis 1. Nominaalajaga lõpetajate osakaal immatrikuleerimisaastate lõikes, IKT- ja mitte-IKT õppekavad, bakalaureuseõpe

Meessoost tudengid lõpetavad nominaalaja jooksul väiksema tõenäosusega kui naistudengid (vt Joonis 2, Joonis 3). IKT tudengite madalam nominaalajaga lõpetamise tõenäosus ilmneb mõlema soo puhul.

Page 26: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

All students are working

10

Kooliti on nominaalajaga lõpetavate IKT-tudengite osakaal bakalaureuseõppes kõrgeim Tartu Ülikoolis, järgnevad TTÜ ja TLÜ. Rakenduskõrghariduses on kõrgeim nominaalajaga lõpetajate osakaal TLÜ-s, järgnevad Infotehnoloogia Kolledž ja TTÜ. Magistriõppes on kõrgeim nominaalajaga lõpetajate osakaal TÜ-s, järgnevad TTÜ ja TLÜ (järjestus varieerub aastati). ˇ

Nominaalaja jooksul töötamist vaadates selgub üllatuslikult, et IKT-tudengid ei tööta õpingute ajal rohkem kui mitte-IKT õppekavadel õppivad tudengid. Bakalaureuseõppes on kõigi õppeaastate lõikes enamikul aastatel mitte-IKT õppekavade tudengite hulgas tööhõive määr kõrgem kui IKT-tudengitel (vt Joonis 4). Sama on järeldus rakenduskõrghariduse õppurite osas. Magistriõppes, kus tööhõive määrad ületavad 80%, on aga tulemus vastupidine: IKT-tudengite hulgas on tööhõive määr kõrgem kui mitte-IKT õppekavade õppuritel.

Joonis 4. Nominaalaja jooksul töötanud tudengite osakaal kõigist tudengitest aastati, IKT- ja mitte-IKT õppekavad, bakalaureuseõpe

Naissoost tudengite tööhõive määr on mõnevõrra kõrgem kui meessoost õppuritel, seda nii IKT- kui mitte-IKT tudengite hulgas (Joonis 5, Joonis 6). Soolised erinevused hõivemäärades varieeruvad aastati – on aastaid, kus erinevus on märkimisväärne, ning aastaid, kus olulist erinevust pole.

Page 27: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Practice makes perfect• After successfully ending the project, we went

back to the lab to see if we can do better

• The new protocol DSL gave a “conservative” 20% performance improvement

• It turned out we could significantly optimize the aggregation algorithms through better parallelization

Page 28: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Major speed-ups

6 ms latency for one server, 1Gbps bandwidth

345h 266h 5h

ProtocolDSL

Parallelizedaggregation

More gains from high-level algorithm optimizations than low-level protocols

Page 29: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Case study: A privacy-preserving

survey system

Page 30: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Privacy-preserving surveys• Traditional survey systems do not hide

individual answers from organizer/server • Use MPC to remove centralised trusted

service provider • We built a secure survey system in the

PRACTICE project together with Alexandra Institute and Partisia

• Has both Sharemind and Fresco/SPDZ back-ends

Page 31: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Demo! A happy employee answering

a survey anonymously

Page 32: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Case study: Tax fraud detection

Page 33: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Estimate of unpaid VAT

VAT

Social tax

Income tax

Alcohol excise

Tobacco excise

Fuel excise

Packaging excise

ME

UR

Page 34: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Attempted fix to the gap• In 2013, the Estonian parliament ratified the

Value-Added Tax Act and the Accounting Act Amendment Act that would force enterprises to report transactions to the Tax and Customs Board (MTA).

• MTA would then match outgoing invoices to the incoming invoices reported by others and find companies trying to get refunds for fraudulently declared input VAT.

Page 35: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

The story of the 1000 € law

Page 36: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Implementation using MPC• The Tax Board was worried enough after the

veto that they were willing to hear us out

• It also helped that Cybernetica was the company who won the tender to build the actual system.

• We agreed with the Tax Board that Cybernetica will build a research prototype that implements four risk analyses and will test its performance and that they will look at our results.

• We borrowed a systems analyst and an architect from our tax team to build the prototype.

Page 37: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Secure implementation

Taxpayers

Transactions

Encryption is applied on thedata directly at the source.

The data is cryptographicallyprotected during processing.

No need to unconditionally trust a single organization.

Benefits

Page 38: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Secure implementation

Taxpayers

Transactions

Encryption is applied on thedata directly at the source.

The data is cryptographicallyprotected during processing.

No need to unconditionally trust a single organization.

Benefits

secure multi-partycomputation system

with database

Taxpayer'sassociation's

server

WatchdogNGO server

Page 39: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Secure implementation

Tax Office Taxpayers

Transactions

Risk

queries

Risk

scores

Encryption is applied on thedata directly at the source.

The data is cryptographicallyprotected during processing.

No need to unconditionally trust a single organization.

Analyze, combine and build reports without decrypting data.

Confidentiality is guaranteedagainst all servers and againstmalicious hackers.

Values are only decrypted when all hosts agree to do so.

BenefitsBenefits

secure multi-partycomputation system

with database

Tax Officeserver

Taxpayer'sassociation's

server

WatchdogNGO server

Page 40: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Using fork-join parallelism

...

...

1

2

n

1

2

n

A

B

...

1

2

n

A

B

A

B

A

B

Secret sharing of transactions

Distribute inputsbetween tasks

Tasks aggregate transaction tables

MPCtask 2

MPCtask n

...

MPCtask 1

Finalize aggregationand calculate scores

MPCtask

Company A

Company B

Risk analystat MTA

Send risk scores to analyst

organizational boundary end-user communicationwith Sharemind

secure multi-party computation

Host 1

Host 2

Host 3

Host 1

Host 2

Host 3

Page 41: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Experiments on AWS cloud

Note: actual deployment should run on three different clouds. However, we had a humble research grant from AWS.

Page 42: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Much improved parallelism

Page 43: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Computing environmentSetup Client Computing

partiesLatency

(round-trip)

1us-east –

c3.8xlarge us-east – 12x c3.8xlarge < 0.1ms between all nodes

2eu-west – c3.8xlarge

eu-west – 8x c3.8xlarge eu-central – 4x c3.8xlarge

< 0.1ms inside eu-west19ms (eu-west/eu-central)

3us-east –

c3.8xlarge us-east – 4x c3.8xlargeus-west – 4x c3.8xlarge eu-west – 4x c3.8xlarge

77ms (us-east/us-west) 133ms (us-west/eu-west) 76ms (us-east/eu-west)

Page 44: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Realistic data sizes

6

Table 2. The three regional instance deployments used, modelling one or many cloud providers.

Regions Client Computation servers Latency (round-trip) 1 us-east –

c3.8xlarge us-east – 12x c3.8xlarge < 0.1ms between all nodes

2 eu-west – c3.8xlarge

eu-west – 8x c3.8xlarge eu-central – 4x c3.8xlarge

< 0.1ms between eu-west nodes 19ms – eu-west, eu-central

3 us-east – c3.8xlarge

us-east – 4x c3.8xlarge us-west – 4x c3.8xlarge eu-west – 4x c3.8xlarge

77ms – us-east, us-west 133ms – us-west, eu-west 76ms – us-east, eu-west

4 Benchmark results We used three input data sets with different size in our benchmarks (see Table 3). The largest data set corresponds to the estimates of Estonia’s Tax and Customs Board on the number of taxable persons and performed business transactions in one month in Estonia. Each company’s tax declaration is an XML-file consisting of a number of sales and purchase transactions with different business partners.

Table 3. Descriptions of the three data sets used in the experiments.

No. of companies No. of transaction partner pairs

Total no. of transactions

20 000 200 000 25 000 000 40 000 400 000 50 000 000 80 000 800 000 100 000 000

In the upload phase, declarations were uploaded to the 80 Sharemind processes, each process receiving a single declaration at a time. After aggregating the data, the results were moved together into a single process running on three instances, and the remaining instances were closed. Note that each party only moves data shares between instances that it controls. The single process then merged the data and performed the risk analysis computations. We used Amazon CloudWatch to monitor the CPU, network and memory usage of the instances.

The running times of all computations are presented on Figure 4. The performance of the prototype has significantly improved compared to the earlier version and is well within practical limits as the analysis only needs to be performed once in a single tax period (each month). As can be expected, in multi-region deployments the computations are slower due to the increased latency. The aggregation phase is affected most, as the bulk of the computations are done there. Upload times are also affected since some secret-shared data validation is required. The risk analysis itself is very fast, since we rely on an admissible leakage assumption, namely that the identity of a company can not be directly deduced from the number of its business partners. We also benchmarked a slower version of the risk analysis algorithm that does not need this assumption to maintain privacy (see Appendix).

The source data for 100 000 000 transactions had a total size of 35 GB in XML format (about 1 GB in the secret-shared database).

Page 45: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Better running times

38:44

01:23:10

02:47:53

01:14:36

02:25:12

05:05:1604:26:15

08:53:00us 2−eu 2−us,1−eu

0 hours

1 hours

2 hours

3 hours

4 hours

5 hours

6 hours

7 hours

8 hours

9 hours

20k 40k 80k 20k 40k 80k 20k 40k 80kNumber of companies

Com

puta

tion

time

Computation phaseRisk analysisAggregationUpload

Cross-ocean secure computing!

Technical issues prevented the completion of this test and budgetary constraints did not allow for a repeat.

Page 46: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

Significantly lower price

$27

$61

$126

$49

$91

$223

$71

$150

us

2−eu

2−us,1−eu

20k 40k 80kNumber of companies

Dep

loym

ent r

egio

ns

Deploymentregions

us2−eu2−us,1−eu

Page 47: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

ConclusionOur dream is to see MPC becoming an ubiquitous tool in applications where privacy is important

We can already demonstrate solving privacy issues for real-world users and organizations on a large scale

Page 48: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs
Page 49: Sharemind - practical privacy-preserving analytics€¦ · • Storage: Shamir’s secret sharing • Computing: n-party secure MPC • Classic Shamir protocols + custom designs

We build applicationsLearn about Sharemind and request an academic license

http://sharemind.cyber.ee/

Open source prototyping tools (under development)

http://sharemind-sdk.github.io/

Contact us for more information and collaborations

E-mail: [email protected]

Twitter: @sharemind