CS 295 D - Privacy in Data Management

Reading List

Privacy-Preserving Data Publishing & Mining

Privacy-Preserving Data Publishing: A Survey on Recent Developments – This is a recent (as yet unpublished) survey paper that gives a broad overview of the work in privacy preserving data publishing over the past decade.

Security-control methods for statistical databases: a comparative study – This is a classic paper which is a very good survey on techniques for the (very related) problem of disclosure control in statistical databases. This is a much older paper that covers the techniques that existed before the 90's.

Achieving k-anonymity privacy protection using generalization and suppression – This is the paper introducing the concept of k-anonymity as a privacy criteria and the popular technique of data generalization.

L-diversity privacy beyond k-anonymity – A more appropriate privacy measure as compared to k-anonymity.

t-closeness: Privacy beyond k-anonymity and l-diversity – Another privacy measure that tries to better the shortcomings of the k-anonymity and l-diversity measures.

Injecting Utility into Anonymized Datasets – A scheme for data publishing that addresses the problem of information loss.

Worst-case background knowledge for privacy-preserving data publishing – Background knowledge is factored into the privacy analysis.

Privacy: Theory meets Practice on the Map – An alternate technique for privacy preserving data-publishing where new data is generated and published in place of the original data.

Differential Privacy – A new and more powerful definition of privacy that is suitable for interactive query answering systems.

Differential Privacy: A Survey of Results – A theoretical paper that discusses various results derived in the differential privacy framework.

Calibrating noise to sensitivity in private data analysis – The paper describes an interactive noise addition based technique dependent on the concept of sensitivity of a function.

Data publishing against realistic adversaries – This paper extends the notion of differential privacy to generalization based approaches of anonymizing data.

Privacy issues in publishing dynamic data (trajectory publication) – A survey of recent results for publishing data regarding moving objects and trajectories.

Privacy in data outsourcing & cloud computing applications

Providing database as a service – Introductory paper on the benefits and challenges in providing database as a service.

Executing SQL over Encrypted Data in the Database Service Provider Model – This paper describes how many of the standard relational operations can be carried out on top of encrypted tables.

Overview of Information security – A set of overview slides.

Overview of essential cryptography – A set of overview slides of cryptographic techniques of relevance in securing outsourced data.

Practical techniques for searches on encrypted data – The first known technique for keyword search on encrypted text data.

Public-key encryption with keyword search – A public key based encrypted search algorithm.

Privacy enhanced searches using encrypted bloom filters – A bloom filter based encrypted search technique for keyword queries

Attribute-based encryption for fine grained access control of encrypted data – A hierarchical encryption based approach to selective querying of data

Attribute-based encryption with non-monotonic access structures – A follow up paper to the one above

Multidimensional range queries over encrypted data – A hierarchical tree based index for supporting range queries over encrypted multidimensional data.

Conjunctive and subset queries over encrypted data – Yet another cryptographic technique for querying encrypted data

Order-preserving symmetric encryption – An order preserving encryption technique for evaluating range predicates directly over encrypted data from an ordered domain.

Authenticated join processing in outsourced databases – A recent paper on supporting join-based operations on outsourced data. The focus of the paper is minimizing the overhead of authentication at the time of querying

Fast, secure encryption for indexing in a column-oriented DBMS – A paper concentrating on the new column oriented DBMS instead of the traditional row oriented relational DBMS

A Provably Secure Additive and Multiplicative Privacy Homomorphism – A privacy homomorphism (PH) techniqe to allow arithmetic computations (additions and multiplications) on encrypted data.

A known plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. – A cryptanalysis (break) of the PH scheme mentioned in the previous paper.

Search over encrypted data – A book chapter describing various encrypted search and querying techniques.

Secure Data Outsourcing (slides) – A set of tutorial slides from VLDB 2007 covering a variety of issues related to data outsourcing like search over encrypted data, query correctness, use of trusted hardware etc.

Security issues in cloud computing scenarios – An unpublished work.

Privacy in pervasive environments

Privacy in Pervasive Space Systems (overview) – Introductory overview presentation on privacy issues in pervasive spaces.

Towards security and privacy for pervasive computing – Introductory paper on security and privacy issues in pervasive computing.

Location privacy in pervasive computing – A generic paper discussing the various issues of location privacy in pervasive computing.

Protecting privacy and anonymity in pervasive computing: trends and perspectives – Another perspective on privacy in pervasive computing environments.

Privacy Protecting Data Collection in Media Spaces – Cover the scenario when the pervasive environment cannot be trusted with sensitive data.

Privacy-preserving event detection in pervasive spaces – A privacy-preserving approach for some select event detection in pervasive environments.

Middleware for Pervasive spaces: Balancing Privacy and Utility – A more flexible system where users are allowed to specify their privacy policies.

A Policy Language for a Pervasive Computing Environment. – Describes an ontology based policy specification language for pervasive spaces.

Privacy preservation in wireless sensor networks: A state-of-the-art survey. – A survey paper for wireless sensor networks and privacy issues.

Privacy Infusion in Ubiquitous Computing. – An alternate technique for privacy preservation in pervasive environments.

RFID Security: In the Shoulder and on the Loading Dock. – These are a set of slides on RFID security issues.

Privacy in Data Sharing and Exchange

Enabling secure data exchange – A generic overview paper of security/privacy issues in secure data exchange.

A formal analysis of information disclosure in data exchange – A theoretical paper on disclosure analysis in data exchange.

Efficient private matching and set intersection – One of many secure multiparty computation papers discussing various set intersection computation problems in this framework

Privacy-preserving set operations – Another set of secure multiparty computation techniques for supporting a larger class of set-based operations

The New Casper: A Privacy-Aware Location-Based Database Server – The paper describes a system for location anonymization and privacy preserving query answering in a location aware application.