Paper 2017/850

Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs

Evgenios M. Kornaropoulos and Petros Efstathopoulos

Abstract

Computing similarity between data is a fundamental problem in information retrieval and data mining. To address the relevant performance and scalability challenges, approximation methods are employed for large-scale similarity computation. A common characteristic among all privacy- preserving approximation protocols based on sketching is that the sketching is performed locally and is based on common randomness. In the semi-honest model the input to the sketching algorithm is independent of the common randomness. We, however, consider a new threat model where a party is allowed to use the common randomness to perturb her input 1) offline, and 2) before the execution of any secure protocol so as to steer the approximation result to a maliciously chosen output. We formally define perturbation attacks under this adversarial model and propose two attacks on the well-studied techniques of minhash and cosine sketching. We demonstrate the power of perturbation attacks by measuring their success on synthetic and real data. To mitigate such perturbation attacks we propose a server- aided architecture, where an additional party, the server, assists in the secure similarity approximation by handling the common randomness as private data. We revise and introduce the necessary secure protocols so as to apply minhash and cosine sketching techniques in the server-aided architecture. Our implementation demonstrates that this new design can mitigate offline perturbation attacks without sacrificing the efficiency and scalability of the reconstruction protocol.

Note: Added keywords. Removed latex commands from the Abstract.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
Secure Approximation ProtocolSecure SketchingJaccard SimilarityCosine SimilarityAttackServer-Aided Design
Contact author(s)
evgenios @ cs brown edu
History
2017-09-09: received
Short URL
https://ia.cr/2017/850
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/850,
      author = {Evgenios M.  Kornaropoulos and Petros Efstathopoulos},
      title = {Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs},
      howpublished = {Cryptology ePrint Archive, Paper 2017/850},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/850}},
      url = {https://eprint.iacr.org/2017/850}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.