Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art...

18
Overview of Privacy Preserving Techniques

Transcript of Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art...

Page 1: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Overview of Privacy Preserving Techniques

Page 2: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas

Focus on problems and the basic ideas

Page 3: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Outline Privacy problem in computing Major techniques

Data perturbation Data anonymization Cryptographic methods

Privacy in different application areas Data mining Data publishing Databases Data outsourcing Social network Mobile computing

Page 4: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Privacy vs. Security

Network security Assumption: the two parties trust each

other, but the communication network is not trusted.

Alice Bob

Encryptingdata

Decryptingdata

Communication channel

Bob knows the original data that Alice owns.

Page 5: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Privacy problems Information about a person or a single party Parties do not trust each other: curious parties

(including malicious insiders) may look at sensitive contents

Parties follow protocols honestly (semi-honest assumption)

Alice Bob

Bob is an untrusted party. He may try to figure out some Private information from the sanitized data

Deliver “sanitized” data

Page 6: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Two categories

(1) Transformation based methods

Alice Bob

transformeddata Works on the transformed

data only

Communication channel

Bob does not know the original data.

a “curious party”

Page 7: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

(2) Cryptographic protocol methods

Party 1

data

Party 2

data

Party n

data

Some protocol using cryptographic primitives

Statistical Info/Intermediateresult

Info from otherparties

Page 8: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Computing scenarios Web model collaboration

model

Outsourcing model

Party 1

data

Party 2

data

Party n

data

WebApps

data

user 1 user 1 user 1

Privateinfo

Data owner

Service provider

Exportdatato use the service

data

Page 9: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Issues with data transformation Techniques performing the transformation

Transformation should preserve important information How much information loss How to recover the information from the transformed data

Threat model Attacks reconstructing the original data from the

transformed data Attacks finding significant additional information

The cost Transforming data Recovering the important information

Page 10: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Transformation techniques Data Perturbation

Additive perturbation Multiplicative perturbation Randomized responses

Data Anonymization k-anonymization l-diversity t-closeness m-invariance

Page 11: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Attacks on transformation techniques

Data reconstruction and noise reduction techniques (on data perturbation) random matrix theory spectral analysis

Inference attacks (on data anonymization) Utilizing background knowledge

Page 12: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Cryptographic approachesUsing the following cryptographic

primitives Secure multiparty computation (SMC)

Yao’s millionaire problem Alice wants to know whether she has more money than

Bob Alice&Bob cannot know the exact number of each

other’s money. Alice knows only the result

Oblivious transfer Bob holds n items. Alice wants to know i-th item. Bob cannot know i – Alice’s privacy Alice knows nothing except the i-th item

Homomorphic encryption Allow computation on encrypted data E.g., E(X)*E(Y) = E(X+Y)

Page 13: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Characteristics: Pro: preserving total privacy Con: expensive, limited # of parties

Applications: for distributed datasets (the corporate model) Protocols for data mining algorithms Statistical analysis (matrix, vector

computation) Often discussed in two-party (or a small

number of parties) scenarios.

Page 14: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Privacy-preserving data mining

Purpose Mining the models without leaking the

information about individual records

topics Basic statistics (mean, variance, etc.) Data classification Data clustering Association rule mining Privacy of mined models

Page 15: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Privacy preserving database applications [Du&Atallah2000]

Statistical databases Private information retrieval

Outsourced databases

Page 16: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Social Network Privacy Publishing social network structure

Attacks can be applied to reveal the mapping [163,167] Characteristics of subgraph Adversarial background knowledge

Anonymization is a popular method

Page 17: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Social network privacy Privacy settings of SN

Help users set/tune privacy settings Understand the relationship between

privacy and functionalities of SN They are a pair of conflicting factors

Page 18: Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.

Privacy in Mobile computing Preserving location privacy

User-defined or system supplied privacy policies [Bamba&Liu2008, Beresford&Stajano2003]

Extending k-anonymity techniques to location cloaking [Gedik&Liu2008, Gruteser&Grunwald2002]

Pseudonymity of user identities – frequently changing internal id. [Beresford&Stajano2003]