Download presentation
Presentation is loading. Please wait.
Published byAnnabel Benson Modified over 9 years ago
1
Overview of Privacy Preserving Techniques
2
This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas Focus on problems and the basic ideas
3
Outline Privacy problem in computing Major techniques Data perturbation Data anonymization Cryptographic methods Privacy in different application areas Data mining Data publishing Databases Data outsourcing Social network Mobile computing
4
Privacy vs. Security Network security Assumption: the two parties trust each other, but the communication network is not trusted. Alice Bob Encrypting data Decrypting data Communication channel Bob knows the original data that Alice owns.
5
Privacy problems Information about a person or a single party Parties do not trust each other: curious parties (including malicious insiders) may look at sensitive contents Parties follow protocols honestly (semi-honest assumption) Alice Bob Bob is an untrusted party. He may try to figure out some Private information from the sanitized data Deliver “sanitized” data
6
Two categories (1) Transformation based methods Alice Bob transformed data Works on the transformed data only Communication channel Bob does not know the original data. a “curious party”
7
(2) Cryptographic protocol methods Party 1 data Party 2 data Party n data Some protocol using cryptographic primitives Statistical Info/ Intermediate result Info from other parties
8
Computing scenarios Web model collaboration model Outsourcing model Party 1 data Party 2 data Party n data Web Apps data user 1 Private info Data owner Service provider Export data to use the service data
9
Issues with data transformation Techniques performing the transformation Transformation should preserve important information How much information loss How to recover the information from the transformed data Threat model Attacks reconstructing the original data from the transformed data Attacks finding significant additional information The cost Transforming data Recovering the important information
10
Transformation techniques Data Perturbation Additive perturbation Multiplicative perturbation Randomized responses Data Anonymization k-anonymization l-diversity t-closeness m-invariance
11
Attacks on transformation techniques Data reconstruction and noise reduction techniques (on data perturbation) random matrix theory spectral analysis Inference attacks (on data anonymization) Utilizing background knowledge
12
Cryptographic approaches Using the following cryptographic primitives Secure multiparty computation (SMC) Yao’s millionaire problem Alice wants to know whether she has more money than Bob Alice&Bob cannot know the exact number of each other’s money. Alice knows only the result Oblivious transfer Bob holds n items. Alice wants to know i-th item. Bob cannot know i – Alice’s privacy Alice knows nothing except the i-th item Homomorphic encryption Allow computation on encrypted data E.g., E(X)*E(Y) = E(X+Y)
13
Characteristics: Pro: preserving total privacy Con: expensive, limited # of parties Applications: for distributed datasets (the corporate model) Protocols for data mining algorithms Statistical analysis (matrix, vector computation) Often discussed in two-party (or a small number of parties) scenarios.
14
Privacy-preserving data mining Purpose Mining the models without leaking the information about individual records topics Basic statistics (mean, variance, etc.) Data classification Data clustering Association rule mining Privacy of mined models
15
Privacy preserving database applications [Du&Atallah2000] Statistical databasesPrivate information retrieval Outsourced databases
16
Social Network Privacy Publishing social network structure Attacks can be applied to reveal the mapping [163,167] Characteristics of subgraph Adversarial background knowledge Anonymization is a popular method
17
Social network privacy Privacy settings of SN Help users set/tune privacy settings Understand the relationship between privacy and functionalities of SN They are a pair of conflicting factors
18
Privacy in Mobile computing Preserving location privacy User-defined or system supplied privacy policies [Bamba&Liu2008, Beresford&Stajano2003] Extending k-anonymity techniques to location cloaking [Gedik&Liu2008, Gruteser&Grunwald2002] Pseudonymity of user identities – frequently changing internal id. [ Beresford&Stajano2003]
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.