1 / 18

Overview of Privacy Preserving Techniques

Overview of Privacy Preserving Techniques. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus on problems and the basic ideas. Outline. Privacy problem in computing Major techniques Data perturbation Data anonymization

warren-wynn
Download Presentation

Overview of Privacy Preserving Techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of Privacy Preserving Techniques

  2. This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas • Focus on problems and the basic ideas

  3. Outline • Privacy problem in computing • Major techniques • Data perturbation • Data anonymization • Cryptographic methods • Privacy in different application areas • Data mining • Data publishing • Databases • Data outsourcing • Social network • Mobile computing

  4. Privacy vs. Security • Network security • Assumption: the two parties trust each other, but the communication network is not trusted. Alice Bob Communication channel Encrypting data Decrypting data Bob knows the original data that Alice owns.

  5. Privacy problems • Information about a person or a single party • Parties do not trust each other: curious parties (including malicious insiders) may look at sensitive contents • Parties follow protocols honestly (semi-honest assumption) Alice Bob Deliver “sanitized” data Bob is an untrusted party. He may try to figure out some Private information from the sanitized data

  6. Two categories (1) Transformation based methods a “curious party” Alice Bob Communication channel transformed data Works on the transformed data only Bob does not know the original data.

  7. (2) Cryptographic protocol methods Some protocol using cryptographic primitives Statistical Info/ Intermediate result Info from other parties Party 1 Party 2 Party n data data data

  8. Web model collaboration model Outsourcing model Party 1 Party 2 Party n Web Apps data data data data Computing scenarios user 1 user 1 user 1 Private info Export data to use the service Data owner Service provider data

  9. Issues with data transformation • Techniques performing the transformation • Transformation should preserve important information • How much information loss • How to recover the information from the transformed data • Threat model • Attacks reconstructing the original data from the transformed data • Attacks finding significant additional information • The cost • Transforming data • Recovering the important information

  10. Transformation techniques • Data Perturbation • Additive perturbation • Multiplicative perturbation • Randomized responses • Data Anonymization • k-anonymization • l-diversity • t-closeness • m-invariance

  11. Attacks on transformation techniques • Data reconstruction and noise reduction techniques (on data perturbation) • random matrix theory • spectral analysis • Inference attacks (on data anonymization) • Utilizing background knowledge

  12. Cryptographic approaches Using the following cryptographic primitives • Secure multiparty computation (SMC) • Yao’s millionaire problem • Alice wants to know whether she has more money than Bob • Alice&Bob cannot know the exact number of each other’s money. Alice knows only the result • Oblivious transfer • Bob holds n items. Alice wants to know i-th item. • Bob cannot know i – Alice’s privacy • Alice knows nothing except the i-th item • Homomorphic encryption • Allow computation on encrypted data • E.g., E(X)*E(Y) = E(X+Y)

  13. Characteristics: • Pro: preserving total privacy • Con: expensive, limited # of parties • Applications: for distributed datasets (the corporate model) • Protocols for data mining algorithms • Statistical analysis (matrix, vector computation) • Often discussed in two-party (or a small number of parties) scenarios.

  14. Privacy-preserving data mining • Purpose • Mining the models without leaking the information about individual records • topics • Basic statistics (mean, variance, etc.) • Data classification • Data clustering • Association rule mining • Privacy of mined models

  15. Privacy preserving database applications [Du&Atallah2000] Statistical databases Private information retrieval Outsourced databases

  16. Social Network Privacy • Publishing social network structure • Attacks can be applied to reveal the mapping [163,167] • Characteristics of subgraph • Adversarial background knowledge Anonymization is a popular method

  17. Social network privacy • Privacy settings of SN • Help users set/tune privacy settings • Understand the relationship between privacy and functionalities of SN • They are a pair of conflicting factors

  18. Privacy in Mobile computing • Preserving location privacy • User-defined or system supplied privacy policies [Bamba&Liu2008, Beresford&Stajano2003] • Extending k-anonymity techniques to location cloaking [Gedik&Liu2008, Gruteser&Grunwald2002] • Pseudonymity of user identities – frequently changing internal id. [Beresford&Stajano2003]

More Related