Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art...
-
Upload
annabel-benson -
Category
Documents
-
view
214 -
download
1
Transcript of Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art...
![Page 1: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/1.jpg)
Overview of Privacy Preserving Techniques
![Page 2: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/2.jpg)
This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas
Focus on problems and the basic ideas
![Page 3: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/3.jpg)
Outline Privacy problem in computing Major techniques
Data perturbation Data anonymization Cryptographic methods
Privacy in different application areas Data mining Data publishing Databases Data outsourcing Social network Mobile computing
![Page 4: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/4.jpg)
Privacy vs. Security
Network security Assumption: the two parties trust each
other, but the communication network is not trusted.
Alice Bob
Encryptingdata
Decryptingdata
Communication channel
Bob knows the original data that Alice owns.
![Page 5: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/5.jpg)
Privacy problems Information about a person or a single party Parties do not trust each other: curious parties
(including malicious insiders) may look at sensitive contents
Parties follow protocols honestly (semi-honest assumption)
Alice Bob
Bob is an untrusted party. He may try to figure out some Private information from the sanitized data
Deliver “sanitized” data
![Page 6: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/6.jpg)
Two categories
(1) Transformation based methods
Alice Bob
transformeddata Works on the transformed
data only
Communication channel
Bob does not know the original data.
a “curious party”
![Page 7: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/7.jpg)
(2) Cryptographic protocol methods
Party 1
data
Party 2
data
Party n
data
Some protocol using cryptographic primitives
Statistical Info/Intermediateresult
Info from otherparties
![Page 8: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/8.jpg)
Computing scenarios Web model collaboration
model
Outsourcing model
Party 1
data
Party 2
data
Party n
data
WebApps
data
user 1 user 1 user 1
Privateinfo
Data owner
Service provider
Exportdatato use the service
data
![Page 9: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/9.jpg)
Issues with data transformation Techniques performing the transformation
Transformation should preserve important information How much information loss How to recover the information from the transformed data
Threat model Attacks reconstructing the original data from the
transformed data Attacks finding significant additional information
The cost Transforming data Recovering the important information
![Page 10: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/10.jpg)
Transformation techniques Data Perturbation
Additive perturbation Multiplicative perturbation Randomized responses
Data Anonymization k-anonymization l-diversity t-closeness m-invariance
![Page 11: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/11.jpg)
Attacks on transformation techniques
Data reconstruction and noise reduction techniques (on data perturbation) random matrix theory spectral analysis
Inference attacks (on data anonymization) Utilizing background knowledge
![Page 12: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/12.jpg)
Cryptographic approachesUsing the following cryptographic
primitives Secure multiparty computation (SMC)
Yao’s millionaire problem Alice wants to know whether she has more money than
Bob Alice&Bob cannot know the exact number of each
other’s money. Alice knows only the result
Oblivious transfer Bob holds n items. Alice wants to know i-th item. Bob cannot know i – Alice’s privacy Alice knows nothing except the i-th item
Homomorphic encryption Allow computation on encrypted data E.g., E(X)*E(Y) = E(X+Y)
![Page 13: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/13.jpg)
Characteristics: Pro: preserving total privacy Con: expensive, limited # of parties
Applications: for distributed datasets (the corporate model) Protocols for data mining algorithms Statistical analysis (matrix, vector
computation) Often discussed in two-party (or a small
number of parties) scenarios.
![Page 14: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/14.jpg)
Privacy-preserving data mining
Purpose Mining the models without leaking the
information about individual records
topics Basic statistics (mean, variance, etc.) Data classification Data clustering Association rule mining Privacy of mined models
![Page 15: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/15.jpg)
Privacy preserving database applications [Du&Atallah2000]
Statistical databases Private information retrieval
Outsourced databases
![Page 16: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/16.jpg)
Social Network Privacy Publishing social network structure
Attacks can be applied to reveal the mapping [163,167] Characteristics of subgraph Adversarial background knowledge
Anonymization is a popular method
![Page 17: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/17.jpg)
Social network privacy Privacy settings of SN
Help users set/tune privacy settings Understand the relationship between
privacy and functionalities of SN They are a pair of conflicting factors
![Page 18: Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus.](https://reader036.fdocuments.net/reader036/viewer/2022082817/56649e455503460f94b39582/html5/thumbnails/18.jpg)
Privacy in Mobile computing Preserving location privacy
User-defined or system supplied privacy policies [Bamba&Liu2008, Beresford&Stajano2003]
Extending k-anonymity techniques to location cloaking [Gedik&Liu2008, Gruteser&Grunwald2002]
Pseudonymity of user identities – frequently changing internal id. [Beresford&Stajano2003]