Seminar in Foundations of Privacy - Winter 2007/8

Instructor: Moni Naor

Grader: Gil Segev

When:     Tuesday -- - Until March 17th Monday 14:00-16:00
Where:    Ziskind 1 -Until March 17th Monday Ziskind 261
First meeting:   Oct 23rd 2007

Informal Lectures         Lectures           Homework          Tentative List of Papers


DESCRIPTION:  The availability of fast and cheap computers coupled with massive storage devices has enabled the collection and mining of data on a scale previously unimaginable. This opens the door to potential abuse regarding individuals' information. There has been considerable research exploring the tension between utility and privacy in this context.

The goal of this course is to explore techniques and issues related to data privacy. In particular to study:

    * Definitions of data privacy, and ways in which they can be refined

    * Techniques for achieving privacy

    * Limitations (i.e. lower bounds) on privacy in various settings.

    * Privacy issues in specific settings

The course will consist of seminar-style presentations by the students.

PREREQUISITES: Students are expected to be familiar with algorithms, data structures, probability theory, and linear algebra, at an undergraduate level. No prior cryptography course will be assumed.

REQUIREMENTS: Students are required to present one set of the papers and the background leading to it, write a summary as well as attend all meeting, read all assigned papers, and participate in class discussion. In addition there will be a few homework sets. You may discuss the problems with other students, but the write-up should be individual.


Background Material

·  Seinfled on privacy vs. security and different attitudes to privacy: The Reversed Peephole or the script

·  The story Scroogled, by Cory Doctorow

·  New York times article on identifying users from AOL search records

  • Cynthia Dwork An Ad Omnia Approach to Defining and Achieving Private Data Analysis

    Advice on giving Academic Talks

    Below is a compilation of source on giving talks. Some of it humorous and some contradicts each other

  •  

    Informal Talks held During the Strike

  • Tuesday Nov 27: Manual Channel Authentication by Gil Segev. Slides (ppt).
  • Tuesday Dec 4th: On the (in)security of the random number generators of Linux and Windows (slides in ppt) by  Benny Pinkas. Papers:
  • Tuesday Dec 11th: RFIDs and Privacy (slides in PDF) by Alon Rosen
  • Tuesday Dec 18th: Cryptography: on the Hope for Privacy in a Digital World by Omer Reingold.
  • Tuesday Dec 25th: Obfuscating Programs by Guy Rothblum. Papers:
  • Tuesday January 1st: History Independent Data Structures by Moni Naor. Papers:
  • Tal Moran, Moni Naor and Gil Segev, Deterministic History-Independent Strategies for Storing Information on Write-Once Memories, ICALP 2007.  Abstract, Postscript, gzipped Postscript, PDF. Slides: short talk (ppt), long talk (ppt).
  • Tuesday January 8th, Private data analysis: basics by Kobbi Nissim
  • Tuesday January 15, The Impossibility of Disclosure Prevention or The Case for Differential Privacy by Moni Naor
  • Lectures:

  • Lecture 6: Monday February 25th: Or Brostovski, De-identifying Facial Images using k-anonymity  and Protecting privacy from CCTV. Papers:
  • Lecture 7: Monday March 3rd: Inbal Talgam,  Adding Consistency to Differential Privacy and  Attacks on Anonymized Social Networks
  • Lecture 8: Monday March 10th: Lidor Avigad,  Mechanism Design via Differential Privacy and Smooth Sensitivity and Sampling in Private Data Analysis.
  • Lecture 9: Monday March 31st: Yoav Tzur,
  •  

    Homework:

    ·  Homework set 1 - deadline Feb 10th.

     

     

    Tentative List of Papers:

     ==========================================================================================================

    Randomized Response

    =========================================================================================================

    More Randomized Response

    =========================================================================================================

    K- Anonymity and linkability

    =========================================================================================================

    Auditing

    ==========================================================================================================

    ==========================================================================================================

     

    ==========================================================================================================

     

    ==========================================================================================================

    ==========================================================================================================

    Fuzzy Extractors

     

    ==========================================================================================================

    RFIDs

     

    ==========================================================================================================

    Privacy Protection in Images


    Related Courses:

    Workshop and talks

    Bibliographies

    Surveys from statistics point of view: