Peter Druschel’s research while affiliated with Max Planck Institute for Software Systems and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (204)


Groundhog: Efficient Request Isolation in FaaS
  • Conference Paper

May 2023

·

9 Reads

·

12 Citations

Mohamed Alzayat

·

Jonathan Mace

·

Peter Druschel

·


CoVault: Secure Selective Analytics of Sensitive Data for the Public Good
  • Preprint
  • File available

January 2023

·

65 Reads

·

Isaac Sheff

·

·

[...]

·

Peter Druschel

Many types of analytics on personal data can be made differentially private, thus alleviating concerns about the privacy of individuals. However, no platform currently exists that can technically prevent data leakage and misuse with minimal trust assumptions; as a result, analytics that would be in the public interest are not done in liberal societies. To bridge this gap, we present secure selective analytics (SSA), where data sources can a priori restrict the use of their data to a pre-defined set of privacy-preserving analytics queries performed by a specific group of analysts, and for a limited period. Furthermore, we show that a scalable SSA platform can be built in a strong threat model based on minimal trust. Technically, our SSA platform, CoVault, relies on a minimal trust implementation of functional encryption (FE), using a combination of secret sharing, secure multi-party computation (MPC), and trusted execution environments (TEEs). CoVault tolerates the compromise of a subset of TEE implementations as well as side channels. Despite the high cost of MPC, we show that CoVault scales to very large databases using map-reduce-based query parallelization. For example, we show that CoVault can perform queries relevant to epidemic analytics for a country of 80M using about 8000 cores, which is tolerable given the high value of such analytics.

Download


Figure 1: CoVault: Using FE for secure analytics
Figure 3: Schemas of two materialized views used for epidemic analytics. The first column in italics is a public index, while the rest of the record is confidential. (The full schemas are shown in Figure 7).
Figure 6: Query latency vs. available core pairs for the basic query of queries (q1) and (q2) from Figure 4.
Figure 7: Materialized views used for epidemic analytics. The first column is a public index.
Figure 8: Cost of ingress processing on a single space-time region as a function of region size

+1

CoVault: A Secure Analytics Platform

August 2022

·

128 Reads

·

1 Citation

In a secure analytics platform, data sources consent to the exclusive use of their data for a pre-defined set of analytics queries performed by a specific group of analysts, and for a limited period. If the platform is secure under a sufficiently strong threat model, it can provide the missing link to enabling powerful analytics of sensitive personal data, by alleviating data subjects' concerns about leakage and misuse of data. For instance, many types of powerful analytics that benefit public health, mobility, infrastructure, finance, or sustainable energy can be made differentially private, thus alleviating concerns about privacy. However, no platform currently exists that is sufficiently secure to alleviate concerns about data leakage and misuse; as a result, many types of analytics that would be in the interest of data subjects and the public are not done. CoVault uses a new multi-party implementation of functional encryption (FE) for secure analytics, which relies on a unique combination of secret sharing, multi-party secure computation (MPC), and different trusted execution environments (TEEs). CoVault is secure under a very strong threat model that tolerates compromise and side-channel attacks on any one of a small set of parties and their TEEs. Despite the cost of MPC, we show that CoVault scales to very large data sizes using map-reduce based query parallelization. For example, we show that CoVault can perform queries relevant to epidemic analytics at scale.


Groundhog: Efficient Request Isolation in FaaS

May 2022

·

12 Reads

Security is a core responsibility for Function-as-a-Service (FaaS) providers. The prevailing approach has each function execute in its own container to isolate concurrent executions of different functions. However, successive invocations of the same function commonly reuse the runtime state of a previous invocation in order to avoid container cold-start delays when invoking a function. Although efficient, this container reuse has security implications for functions that are invoked on behalf of differently privileged users or administrative domains: bugs in a function's implementation, third-party library, or the language runtime may leak private data from one invocation of the function to subsequent invocations of the same function. Groundhog isolates sequential invocations of a function by efficiently reverting to a clean state, free from any private data, after each invocation. The system exploits two properties of typical FaaS platforms: each container executes at most one function at a time and legitimate functions do not retain state across invocations. This enables Groundhog to efficiently snapshot and restore function state between invocations in a manner that is independent of the programming language/runtime and does not require any changes to existing functions, libraries, language runtimes, or OS kernels. We describe the design of Groundhog and its implementation in OpenWhisk, a popular production-grade open-source FaaS framework. On three existing benchmark suites, Groundhog isolates sequential invocations with modest overhead on end-to-end latency (median: 1.5%, 95p: 7%) and throughput (median: 2.5%, 95p: 49.6%), relative to an insecure baseline that reuses the container and runtime state.


PanCast’s architecture. 1. Beacons and user devices are registered with the backend. 2. User devices record encounters with BLE beacons. 3. Diagnosed users or healthy volunteers may upload their history of encountered beacons to the backend via a terminal. 3b. Optionally, health workers can manually feed inputs from users into the backend system. 4. The backend updates the risk database with uploaded encounters. 5. Risk information is periodically broadcast from the backend to network beacons, which broadcast the information to nearby user devices.
Interoperation with manual contact tracing. All experiments operate manual contact tracing and digital tracing in parallel. In contrast to SPECTS which do not interact with manual contact tracing, PanCast and manual contact tracing can benefit from each other by sharing information and can thereby improve the efficacy of the contact tracing efforts especially at low levels of adoption. (a) The reduction of infections and (b) the number of infected individuals over time. In (a), the sign ∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^{*}$$\end{document} indicates statistically significant differences (two-sample t-test; p value <0.05\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$< 0.05$$\end{document}) between PanCast and SPECTS. (c) The effective reproduction number averaged over the period of exponential growth of the number of infected. Lines and points represent averages of 100 random roll-outs of the simulation, error bars correspond to plus and minus one standard deviation.
Leveraging site information to improve tracing decisions. We assume that PanCast has access to the site-dependent transmission rates, while SPECTS can only use an average value to inform tracing decisions. (a) The reduction of infections achieved by PanCast and SPECTS with and without manual tracing under the constraint that at any given time a maximum of 10% of the population can be quarantined due to tracing decisions (in addition to positively tested individuals and their household members). In both figures, points represent averages of 400 random roll-outs of the simulation, error bars correspond to plus and minus one standard deviation, and the sign ∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$^*$$\end{document} indicates a statistically significant difference (two-sample t-test; p value <0.05\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$< 0.05$$\end{document}) between PanCast and SPECTS. (b) ROC curves defined as true positive rate (sensitivity) against false positive rate (1-specificity\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1-\text {specificity}$$\end{document}). (c) Sensitivity and specificity stratified by site type. (d) Effective sensitivity and specificity (see text) for different adoption levels, incorporating both interaction with manual contact tracing and utilization of environmental information. PanCast outperforms SPECTS if adoption is low or the percentage of sites with beacons is high.
Beacon placement strategies. (a) Reduction of the number of infections under random and strategic allocation of beacons respectively over the proportion of beacons and the adoption level of PanCast (results averaged over 100 simulations). (b,c) Spatial distribution of beacons at 25% of the sites across our example city, Tübingen. Colored circles mark sites equipped with beacons and grey circles represent sites without beacons. The site types in our model are shops and workplaces (red), cafes, bars and restaurants (orange), schools and universities (blue), grocery stores (purple) and public transport stops (green). The maps are generated with OpenStreetMap³² (©\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\copyright$$\end{document} OpenStreetMap contributors).
PanCast’s hardware devices, installation and collection, testing and uploading, and risk notification.
Listening to bluetooth beacons for epidemic risk mitigation

April 2022

·

115 Reads

·

17 Citations

The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address these limitations. Rather than capturing pairwise encounters between user devices as done by existing systems, our system captures encounters between user devices and beacons placed in strategic locations where infection clusters may originate. Epidemiological simulations using an agent-based model demonstrate that, by utilizing location and environmental information and interoperating with manual contact tracing, our system can increase the accuracy of contact tracing actions and may help reduce epidemic spread already at low adoption.



Figure 1: PanCast's architecture. 1. Beacons and dongles are registered with the backend. 2. Dongles record encounters with BLE beacons. 3. Diagnosed users or healthy volunteers may upload their history of encountered beacons to the backend via a terminal. 3b. Optionally, health workers can manually feed inputs from users into the backend system. 4. The backend updates the risk database with uploaded encounters. 5. Risk information is periodically broadcast from the backend to network beacons, which broadcast the information to nearby dongles.
Listening to Bluetooth Beacons for Epidemic Risk Mitigation

January 2021

·

93 Reads

·

2 Citations

During the ongoing COVID-19 pandemic, there have been burgeoning efforts to develop and deploy smartphone apps to expedite contact tracing and risk notification. Unfortunately, the success of these apps has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address the above limitations. Rather than capturing pairwise encounters between smartphones as done by existing apps, our system captures encounters between inexpensive, zero-maintenance, small devices carried by users, and beacons placed in strategic locations where infection clusters are most likely to originate. Epidemiological simulations using an agent-based model demonstrate several beneficial properties of our system. By achieving bidirectional interoperability with manual contact tracing, our system can help control disease spread already at low adoption. By utilizing the location and environmental information provided by the beacons, our system can provide significantly higher sensitivity and specificity than existing app-based systems. In addition, our simulations also suggest that it is sufficient to deploy beacons in a small fraction of strategic locations for our system to achieve high utility.


Figure 5. PanCast's hardware devices, installation and collection, testing and uploading, and risk notification.
Listening to Bluetooth Beacons for Epidemic Risk Mitigation

January 2021

·

53 Reads

The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address these limitations. Rather than capturing pairwise encounters between user devices as done by existing systems, our system captures encounters between user devices and beacons placed in strategic locations where infection clusters may originate. Epidemiological simulations using an agent-based model demonstrate that, by utilizing location and environmental information and interoperating with manual contact tracing, our system can increase the accuracy of contact tracing actions and may help reduce epidemic spread already at low adoption.


Figure 1: PanCast architecture. 1. Beacons and dongles are registered with the backend. 2. Dongles record encounters with BLE beacons. 3. Diagnosed users or healthy volunteers may upload their history of encountered beacons to the backend via a terminal. 4. The backend updates the risk database with uploaded encounters. 5. Risk information is periodically broadcast from the backend to network beacons, which broadcast the information to nearby dongles.
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation

November 2020

·

161 Reads

·

1 Citation

During the ongoing COVID-19 pandemic, there have been burgeoning efforts to develop and deploy smartphone apps to expedite contact tracing and risk notification. Most of these apps track pairwise encounters between individuals via Bluetooth and then use these tracked encounters to identify and notify those who might have been in proximity of a contagious individual. Unfortunately, these apps have not yet proven sufficiently effective, partly owing to low adoption rates, but also due to the difficult tradeoff between utility and privacy and the fact that, in COVID-19, most individuals do not infect anyone but a few superspreaders infect many in superspreading events. In this paper, we proposePanCast, a privacy-preserving and inclusive system for epidemic risk assessment and notification that scales gracefully with adoption rates, utilizes location and environmental information to increase utility without tracking its users, and can be used to identify superspreading events. To this end, rather than capturing pairwise encounters between smartphones, our system utilizes Bluetooth encounters between beacons placed in strategic locations where superspreading events are most likely to occur and inexpensive, zero-maintenance, small devices that users can attach to their keyring. PanCast allows healthy individuals to use the system in a purely passive "radio" mode, and can assist and benefit from other digital and manual contact tracing systems. Finally, PanCast can be gracefully dismantled at the end of the pandemic, minimizing abuse from any malevolent government or entity.


Citations (81)


... Sandboxes are not shared across users or functions [92]. Subsequent invocations of the same function from the same user may reuse a sandbox [19]. The platform scales the number of sandboxes per function based on invocations [7,93]. ...

Reference:

Unlocking True Elasticity for the Cloud-Native Era with Dandelion
Groundhog: Efficient Request Isolation in FaaS
  • Citing Conference Paper
  • May 2023

... Ideally, there would exist a solution against rollback attacks that is at once (1) general, correct for all applications, (2) automatic, requiring no application modification, and (3) resistant, allowing the application to recover as if the rollback attack did not occur. Unfortunately, despite the variety of existing solutions against rollback attacks [5,11,14,26,30,34,37,42,49,62,68,71,90,100,102], none achieve all three properties. Existing solutions either only detect but do not recover from rollbacks [11,14,26,37,49,71,90,102], are application specific [30,42,68,100], or sacrifice automation by requiring the application to use a new API [5]. ...

RR: A Fault Model for Efficient TEE Replication
  • Citing Conference Paper
  • January 2023

... Seasonality can affect both the properties of the pathogen (mainly used in modeling seasonal influenza) and other parameters (effect of average daily temperature on susceptibility, effect of season on the contact network with sex distribution, etc.). [43,[53][54][55][56][57][58]. ...

Listening to bluetooth beacons for epidemic risk mitigation

... Many European countries have chosen to base their official applications to limit the spread of the disease on solutions based on the beacon mechanism (cf. Barthe et al., 2021). Some solutions are focused solely on providing entertainment, such as the University of Illinois application (project no. ...

PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation

... Some individuals and organizations have also started to experiment with introducing allegation escrows -"a neutral third-party that collects allegations anonymously, matches them against each other, and de-anonymizes allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached" (Arun et al.,2018). The advantage of an allegation escrow is that it is focused on protecting individual victims of sexual harassment and operating to make reporting safer and more impactful through anonymity and strength in numbers. ...

Finding Safety in Numbers with Secure Allegation Escrows
  • Citing Conference Paper
  • January 2020

... Aditya et al. [71] introduce EnCore, a peer-to-peer nearby communication for opportunistic encounters using Bluetooth communication to give the user the control over her privacy. Tsai et al. [72] propose enClosure, a peer-to-peer communication based on nearby encounters for mobile devices which ensures a privacy preserving communication between users. The above mentioned works provide a privacy preserving communications between users. ...

enClosure: Group Communication via Encounter Closures

... In this context, Panwar et al. [33] proposed a framework to ensure trustworthy data collection from IoT devices. Shepherd et al. [10] and Tsai et al. [26] also implemented mutual attestation in device communication, with the last one allowing group communication. Wang et al. [12] addressed the IoT devices attestation in an enterprise network. ...

enClosure: Group Communication via Encounter Closures

... Sandstorm [50] introduced an extremely (hand-)customized network stack for supporting high performance web and Domain Name System (DNS) servers. The null-Kernel [44], like Unikraft, provides interfaces at different levels of abstraction from the hardware, and allows applications/processes to combine these different interfaces; however, they provide no implementation nor details about application compatibility. ...

Composing Abstractions using the null-Kernel
  • Citing Conference Paper
  • May 2019

... We begin by highlighting design solutions that address issues arising from the physical side channel and the design limitations of the timing circuitry. [39] Arm Generic Timer [7] TPM Counters [86] Timeseal [5] T3E [36] Scone [10] SeCloak [54] Cryptographic Communications [25,97] Chronos [90] Semperfi et. al. [89] Table 5: Examples of representative papers that propose mitigation for timing stack issues (Ixx). ...

SeCloak: ARM Trustzone-based Mobile Peripheral Control
  • Citing Conference Paper
  • June 2018

... [29,76] use network embeddings but do not address rotational and flipping ambiguities, while [37] assumes that each device is capable of measuring the angle of arrival from other devices. The closest to our work are [38,70] which achieve distributed in-air acoustic localization. [70] is designed for a network with 16-40 sensors but assumes that the pair-wise distance errors are 1-5 cm, which is an order of magnitude lower than in underwater scenarios. ...

Sonoloc: Scalable positioning of commodity mobile devices