-
Notifications
You must be signed in to change notification settings - Fork 1
/
conclusions.tex
34 lines (22 loc) · 3.74 KB
/
conclusions.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
\chapter{Conclusions \& Future Work}\label{c:conclusions}
In this thesis we have developed some fundamental privacy\hyp preserving algorithms as well as an end\hyp to\hyp end infrastructure for computing privacy\hyp preserving analytics.
There are numerous use\hyp cases that require from different parties to jointly compute some function -- such as medical research from different hospitals, but due to data\hyp privacy limitations are avoided.
Our end\hyp to\hyp end system utilizes encrypted computation and can constitute the building blocks on top of which meaningful privacy computation can take place, as we have demonstrated with secure aggregators and secure decision tree classifiers.
In our use\hyp case, we focused on medical research, however, in our point of view, this system can serve a wide range of case\hyp studies.
Every coin has two sides, so the same applies to encrypted computation as well.
Utilizing the homomorphic properties of secret\hyp shares enables a whole new dimension on computing that respects data privacy, but comes at a high cost, as we observed in the decision tree classifiers.
Although such sophisticated algorithms seem impractical at first sight due to their high execution timings, one should understand that there is no other way respecting data\hyp privacy to obtain such results.
Moreover, simpler algorithms -- suchlike aggregators -- scale linearly to the size of dataset, which casts them practical for everyday use.
Future work will explore more elaborate algorithms, such as stochastic gradient descent \cite{shokri2015privacy} and\myslash or deep neural networks, that will provide useful analytics results in order to enhance our framework.
Privacy\hyp preserving clustering algorithms \cite{jha2005privacy, upmanyu2010efficient, jagannathan2006new} are also a topic worth exploring.
In addition, we aim to refine the ID3 and C4.5 algorithms, taking more advantage of SIMD instructions, with the purpose of optimizing their execution times.
Although the classification training is performed in an offline phase, more efficient tree\hyp classifiers would improve the overall platform.
Privacy\hyp preserving algorithms are inherently more time consuming than their textbook equivalents.
Much work has to be done in the underlying encrypted architectures in order to keep up with conventional computers.
Thus, our goal is to explore other SMPC frameworks than Sharemind, such as FRESCO (a FRamework for Efficient and Secure COmputation) \cite{chan2017privacy, alxd1}, SPDZ \cite{damgaard2012multiparty, damgaard2013practical}, Obliv\hyp C \cite{zahur2015obliv} and ObliVM \cite{liu2015oblivm}.
Trying different MPC frameworks opens many possibilities, since they support different security protocols, different number of computing nodes, and in general different security configurations.
Moreover, from the programming side of view, each framework provides its own toolkit and API.
Another interesting research topic is to incorporate a blockchain technology such as Hyperledger \cite{cachin2016architecture} for enhancing the transparency, traceability, non-repudation, data provenance, and auditability of our system's computations \cite{zyskind2015decentralizing}, since all actions are immutable.
In more detail, a distributed ledger using smart contracts can act as the controller of the system, orchestrating all actions with the use of a Zero Knowledge Verifiable Computation scheme \cite{blum1991noninteractive} where data processors are enforced to produce a proof of correctness of computation without revealing the dataset itself.
This records the fact that correct processing has taken place without disclosing any information about the data.
Finally, every private computation request and result could be logged for transparency and future use.