{"id":270618,"date":"2016-08-09T09:00:56","date_gmt":"2016-08-09T16:00:56","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=270618"},"modified":"2017-05-08T17:59:03","modified_gmt":"2017-05-09T00:59:03","slug":"microsoft-researchers-enable-secure-data-exchange-cloud","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/microsoft-researchers-enable-secure-data-exchange-cloud\/","title":{"rendered":"Microsoft researchers enable secure data exchange in the cloud"},"content":{"rendered":"<p><em>By John Roach, Writer, Microsoft Research<\/em><\/p>\n<p>In the future, machine learning algorithms may examine our genomes to determine our susceptibility to maladies such as heart disease and cancer. Between now and then, computer scientists need to train the algorithms on genetic data, bundles of which are increasingly stored encrypted and secure in the cloud along with financial records, vacation photos and other bits and bytes of digitized information.<\/p>\n<p>And there the data sits, full of potential but ultimately of little use to anyone but its owner.<\/p>\n<p>That\u2019s because encrypted data must first be decrypted before it can be used. But decrypted data is vulnerable to malicious attacks, which creates a tradeoff between data usability and security.<\/p>\n<p>New research from Microsoft aims to unlock the full value of encrypted data by using the cloud itself to perform secure data trades between multiple willing parties in a way that provides users full control over how much information the exchange reveals.<\/p>\n<div id=\"attachment_271362\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-271362\" class=\"wp-image-271362 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/MS-Faculty-Summit-day1_blog.jpg\" alt=\"Ran Gilad-Bachrach \/ Photography by Scott Eklund\/Red Box Pictures\" width=\"1000\" height=\"667\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/MS-Faculty-Summit-day1_blog.jpg 1000w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/MS-Faculty-Summit-day1_blog-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/MS-Faculty-Summit-day1_blog-768x512.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><p id=\"caption-attachment-271362\" class=\"wp-caption-text\">Ran Gilad-Bachrach \/ Photography by Scott Eklund\/Red Box Pictures<\/p><\/div>\n<p>\u201cWhat we are trying to do is keep the data private and, at the same time, get the value out of it,\u201d says <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rang\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ran Gilad-Bachrach<\/a>, a researcher in the Cryptography Research group within Microsoft\u2019s research organization and co-author of a <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/secure-data-exchange-marketplace-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">paper<\/a> released in June that describes the protocol, or set of rules, for this system to securely exchange data.<\/p>\n<h2>Multiparty computation<\/h2>\n<p>The exchange is based on the idea of a secure multiparty computation, where two or more parties agree to evaluate their data in a way that one or more of the parties gets a result but none of the parties learns anything about the others\u2019 data, except for what can be inferred from the result.<\/p>\n<p>The multiparty computation is akin to a group of employees who want to know where their individual salary ranks in relation to the group as a whole, but none of them wants to reveal their pay to the group.<\/p>\n<p>One way to solve this problem is for each individual to tell their salary in confidence to a trusted colleague. This colleague calculates the average salary and shares the result with the group. Each employee can determine where their pay falls without learning what any individual is paid. The trusted colleague conveniently forgets everything.<\/p>\n<p>\u201cThis secure data exchange emulates that, but without the need for the trusted colleague,\u201d says paper co-author <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/peterrindal\" target=\"_blank\" rel=\"noopener noreferrer\">Peter Rindal<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, a PhD candidate at Oregon State University who is in his second internship at Microsoft and an expert on secure multiparty computation.<\/p>\n<p>The cloud, according to the researchers, is a key feature of the exchange. It transforms a computation technique used to resolve water cooler disputes over pay to a secure system to train algorithms, perform market research, conduct auctions and enable new business opportunities.<\/p>\n<h2>Exchange in action<\/h2>\n<p>Here\u2019s how it works:<\/p>\n<p>Data owners \u2013 hundreds, thousands of them \u2013 encrypt their data and send it to the cloud for storage. Think of them as relatively passive sellers in the exchange. When an active buyer \u2013 usually one entity \u2013 comes along and wants to make a transaction with some of the sellers, those sellers approve the transaction by sending the buyer keys to the data.<\/p>\n<p>But since those keys can decrypt the data stored in the cloud, the cloud can\u2019t directly share the stored data with the buyer, otherwise security and privacy would be compromised.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-270627 \" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/kim_laine-768x1024.jpg\" alt=\"Kim Laine\" width=\"316\" height=\"422\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/kim_laine-768x1024.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/kim_laine-225x300.jpg 225w\" sizes=\"auto, (max-width: 316px) 100vw, 316px\" \/><\/p>\n<p>\u201cInstead, we want to use the keys to decrypt the data inside a multiparty computation,\u201d says paper co-author <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/kilai\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kim Laine<\/a>, a post-doctoral researcher also in the Cryptography Research group who studies how to compute on encrypted data. Doing so unencrypts the data for a computation \u201cwithout actually revealing anything to anyone except the result\u201d of the computation.<\/p>\n<p>All of the computation is performed in the cloud, and the computation itself is encrypted in such a way that not even the cloud knows what is being computed, which protects any of the buyer\u2019s data used in the computation such as a proprietary algorithm. If everything goes as expected, the cloud reveals the decrypted results to the interested parties.<\/p>\n<p>Set up this way, according to the researchers, the data exchange is secure provided that the cloud itself follows the rules and nothing more.<\/p>\n<h2>Test driving data<\/h2>\n<p>Here\u2019s another advantage to the system: It\u2019s costly to purchase data, and researchers with limited budgets need to make sure it is worth it. The exchange, Gilad-Bachrach explains, offers a way for a buyer to \u201ctest drive\u201d a portion of the sellers\u2019 data and thus make an informed decision over whether to buy the keys to unlock the full dataset.<\/p>\n<p>Consider researchers at a pharmaceutical company who are developing a machine learning model that combs through genomes to determine individuals\u2019 risk of various diseases. To improve the model and further study it, the researchers are interested in buying access to a medical center\u2019s bundle of anonymized patient genomes, but only if the bundle contains distinctly different data than what the researchers have already used.<\/p>\n<p>\u201cWe call this \u2018can we test drive your data\u2019 because why would you buy anything without knowing what you are buying,\u201d says Laine. \u201cBut the problem with data is you can\u2019t just show it.\u201d<\/p>\n<p>The secure data exchange system allows the researchers to perform a statistical analysis on a portion of the medical center\u2019s anonymized genetic data that reveals how much it differs from the data already used to build the disease-prediction algorithm. After this test drive, the researchers can decide whether to buy the keys to the full bundle.<\/p>\n<p>\u201cWhat we are trying to build,\u201d Gilad-Bachrach says, \u201cis a mechanism by which you can say, \u2018Look, I am interested in your data, but I want to verify it is really what I need before I purchase it.\u2019\u201d<\/p>\n<h2>Real world applications<\/h2>\n<p>In another use of the exchange, a medical center could compare the outcomes of its treatment plan for pneumonia with the outcomes of treatment plans used at other medical centers without any one medical center revealing what treatment plan it uses. That avoids the risk of getting called out for using a less effective treatment.<\/p>\n<p>Individuals could even use the exchange as a marketplace to sell researchers access to their encrypted genetic data for algorithm training. Ultimately, Laine notes, the researchers might develop an algorithm that uses the exchange to communicate to participants whether or not their genome contains a specific mutation related to a health concern such as heart disease or cancer.<\/p>\n<p>\u201cIf you are a match,\u201d notes Laine, \u201cyou can decide if you want to contact the research group.\u201d<\/p>\n<p>It\u2019s a research project for now. But the team aims to publicly release the library, or tools, needed to implement the secure data exchange in the near future.<\/p>\n<p><strong>Related links<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/secure-data-exchange-marketplace-cloud\/\">Secure Data Exchange: A Marketplace in the Cloud<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/cryptographers-challenge-keeping-genetic-secrets-while-advancing-genetic-research\/\">Cryptographer\u2019s challenge: Keeping genetic secrets while advancing genetic research<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By John Roach, Writer, Microsoft Research In the future, machine learning algorithms may examine our genomes to determine our susceptibility to maladies such as heart disease and cancer. Between now and then, computer scientists need to train the algorithms on genetic data, bundles of which are increasingly stored encrypted and secure in the cloud along [&hellip;]<\/p>\n","protected":false},"author":39507,"featured_media":276327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194466,194472,194475,194455,194489],"tags":[186834,200945,186857,209343,209340,186418,209334,209337],"research-area":[13561,13556,13563,13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-270618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-algorithms","category-cryptography","category-database-data-analytics-platforms","category-machine-learning","category-security","tag-algorithms","tag-cloud-security","tag-data-privacy","tag-decrypt","tag-encrypted-data","tag-machine-learning","tag-multiparty-computation","tag-secure-data-exchange","msr-research-area-algorithms","msr-research-area-artificial-intelligence","msr-research-area-data-platform-analytics","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","featured_image_thumbnail":"<img width=\"810\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/MS-Faculty-Summit-day1-0005.jpg\" class=\"img-object-cover\" alt=\"Ran Gilad-Bachrach &amp; Jeannette M. Wing on stage\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/MS-Faculty-Summit-day1-0005.jpg 5184w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/MS-Faculty-Summit-day1-0005-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/MS-Faculty-Summit-day1-0005-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/MS-Faculty-Summit-day1-0005-1024x683.jpg 1024w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/>","byline":"","formattedDate":"August 9, 2016","formattedExcerpt":"By John Roach, Writer, Microsoft Research In the future, machine learning algorithms may examine our genomes to determine our susceptibility to maladies such as heart disease and cancer. Between now and then, computer scientists need to train the algorithms on genetic data, bundles of which&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/270618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/39507"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=270618"}],"version-history":[{"count":9,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/270618\/revisions"}],"predecessor-version":[{"id":382160,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/270618\/revisions\/382160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/276327"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=270618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=270618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=270618"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=270618"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=270618"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=270618"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=270618"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=270618"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=270618"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=270618"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=270618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}