privacy-aware computing introduction. outline brief introduction motivating applications major...
TRANSCRIPT
Privacy-Aware Computing
Introduction
Outline
Brief introduction Motivating applications Major research issues
Tentative schedule Reading assignments Project Grading
Parties concerning privacy Individual privacy
Customer data Public data: census data, voting record Health record locations Online activities …
Organization privacy Owning collections of personal data Business secrets Legal issues prevent data sharing …
Cases of privacy aware computing Public use of private data
Data mining enables knowledge discovery on large populations, but people are reluctant to release personal information due to the privacy concern
The Centers for Disease Control want to identify disease outbreaks by pooling multiple datasets that contain patient information
Insurance companies have data on disease incidents, and patient background, etc.. Personal medical records help them maximize profits – but customers will not be happy with that.
More Examples Industry Collaborations / Trade Groups.
An industry trade group may want to identify best practices to help members, but some practices are trade secrets.
How do we provide “commodity” results to all (Manufacturing using chemical supplies from supplier X have high failure rates), while still preserving secrets (manufacturing process Y gives low failure rates)?
Multinational corps Multinational corps may want to pool data from
different countries for analysis, but national laws may prevent transborder data sharing
More examples
Web search Search engine companies keep the cookies
and search history, which can be used to derive personal information (AOL dataset)
Social networking When you use social networks, you leave a trace
of personal data and interactions Companies can use the data for Ads targeting –
there is a risk of privacy breach and personal data abuse
More examples
Mobile computing When you allow google latitude to trace your
locations, you loose location privacy Life style, clinic visits, political tendency, domestic
violence
Cloud computing Users have to outsource data to the cloud Data can be sensitive (personal
information, customer records, patient info…)
Major research areas Micro data publishing
Anonymize data for statistical analysis and modeling
Privacy preserving data mining
Data outsourcing Cloud computing Outsource data to untrusted parties for using data
intensive services
Databases Statistical databases Private information retrieval
Major areas Social networks
Personal bio data, preferences, friends, interactions
How to design mechanisms for users to conveniently control private data
Mobile computing Location privacy
Collaborative computing Collaborative data mining – share model but not
individual records
Major technical challenges Techniques
Data perturbation Change data values while preserving global
information Data anonymization
Make sure at least k records have the same “virtual identifiers”, while preserving info
Cryptographic techniques Secure multiparty computation Private information retrieval crypto-protocols for privacy preserving DM
Privacy evaluation Tradeoff between privacy and data utility
Differences between Security and privacy
Privacy: decisions on what personal information is released and who can access it.
Security makes sure these decisions are respected Security is often a necessary method to
implement privacy
National security and privacy
They are conflicting… Enhance national security
Surveillance devices are everywhere US PATROIT Act 2001
… the Act dramatically reduced restrictions on law enforcement agencies' ability to search telephone, e-mail communications, medical, financial, and other records …
Big Brother is watching you – individuals have to sacrifice privacy
Tentative Schedule
Data perturbation Data anonymization Privacy metrics and differential privacy Privacy preserving data mining Private information retrieval Secure data outsourcing Privacy in online social networks Other privacy issues
Reading assignments One selected paper from the reading list for
most weeks ~10 Submit reading summary
Before Monday noon How to write reading summary?
Five parts: Title Research problems Major contributions Strengths Weaknesses or missing points
Length: a few paragraphs to one page
Paper presentation
Choose one paper from the reading list, or recent major conferences
Finish in 15 minutes Maximum two students per class
Signup sheet When: office hours: 3-4:30pm MW, first
two week Make sure you pick a slot asap
Course Project 1~2 person per team Types
Experimental study on existing techniques (from the paper list)
Propose new algorithms Apply the learned techniques to some applications Your research
Note You are encouraged to propose your own project
The goal is to help you better understand problems and techniques and get some hands-on experience
Project Schedule
Proposal About 2 pages Problem description and what you plan
to do By the end of January
Final deliverables Report Code
Class discussion
You are encouraged to ask questions or present different opinions in the class Many of the topics are active research
topics You have chances to generate
publishable ideas
Grading
Reading summaries – 35% Paper presentation – 10% Project proposal – 10% Project final report – 15% Code – 10% Final exam – 20%
Communication Announcements by emails Other issues, [email protected]
Office: Joshi 385 Office hours: 3-4:30pm MW or by
appointment.
Slides will be posted on www.cs.wright.edu/keke.chen/privacy/