Reading List
Privacy-Preserving Data Publishing & Mining
Privacy-Preserving Data Publishing: A Survey on Recent Developments – This is a recent (as yet unpublished) survey paper that gives a broad overview of the work in privacy preserving data publishing over the past decade.
Security-control methods for statistical databases: a comparative study – This is a classic paper which is a very good survey on techniques for the (very related) problem of disclosure control in statistical databases. This is a much older paper that covers the techniques that existed before the 90's.
Achieving k-anonymity privacy protection using generalization and suppression – This is the paper introducing the concept of k-anonymity as a privacy criteria and the popular technique of data generalization.
L-diversity privacy beyond k-anonymity – A more appropriate privacy measure as compared to k-anonymity.
t-closeness: Privacy beyond k-anonymity and l-diversity – Another privacy measure that tries to better the shortcomings of the k-anonymity and l-diversity measures.
Injecting Utility into Anonymized Datasets – A scheme for data publishing that addresses the problem of information loss.
Worst-case background knowledge for privacy-preserving data publishing – Background knowledge is factored into the privacy analysis.
Privacy: Theory meets Practice on the Map – An alternate technique for privacy preserving data-publishing where new data is generated and published in place of the original data.
Differential Privacy – A new and more powerful definition of privacy that is suitable for interactive query answering systems.
Differential Privacy: A Survey of Results – A theoretical paper that discusses various results derived in the differential privacy framework.
Calibrating noise to sensitivity in private data analysis – The paper describes an interactive noise addition based technique dependent on the concept of sensitivity of a function.
Data publishing against realistic adversaries – This paper extends the notion of differential privacy to generalization based approaches of anonymizing data.
Privacy issues in publishing dynamic data (trajectory publication) – A survey of recent results for publishing data regarding moving objects and trajectories.
Privacy in data outsourcing & cloud computing applications
Providing database as a service – Introductory paper on the benefits and challenges in providing database as a service.
Executing SQL over Encrypted Data in the Database Service Provider Model – This paper describes how many of the standard relational operations can be carried out on top of encrypted tables.
Overview of Information security – A set of overview slides.
Overview of essential cryptography – A set of overview slides of cryptographic techniques of relevance in securing outsourced data.
Practical techniques for searches on encrypted data – The first known technique for keyword search on encrypted text data.
Public-key encryption with keyword search – A public key based encrypted search algorithm.
Privacy enhanced searches using encrypted bloom filters – A bloom filter based encrypted search technique for keyword queries
Attribute-based encryption for fine grained access control of encrypted data – A hierarchical encryption based approach to selective querying of data
Attribute-based encryption with non-monotonic access structures – A follow up paper to the one above
Multidimensional range queries over encrypted data – A hierarchical tree based index for supporting range queries over encrypted multidimensional data.
Conjunctive and subset queries over encrypted data – Yet another cryptographic technique for querying encrypted data
Order-preserving symmetric encryption – An order preserving encryption technique for evaluating range predicates directly over encrypted data from an ordered domain.
Authenticated join processing in outsourced databases – A recent paper on supporting join-based operations on outsourced data. The focus of the paper is minimizing the overhead of authentication at the time of querying
Fast, secure encryption for indexing in a column-oriented DBMS – A paper concentrating on the new column oriented DBMS instead of the traditional row oriented relational DBMS
A Provably Secure Additive and Multiplicative Privacy Homomorphism – A privacy homomorphism (PH) techniqe to allow arithmetic computations (additions and multiplications) on encrypted data.
A known plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. – A cryptanalysis (break) of the PH scheme mentioned in the previous paper.
Search over encrypted data – A book chapter describing various encrypted search and querying techniques.
Secure Data Outsourcing (slides) – A set of tutorial slides from VLDB 2007 covering a variety of issues related to data outsourcing like search over encrypted data, query correctness, use of trusted hardware etc.
Security issues in cloud computing scenarios – An unpublished work.
Privacy in pervasive environments
Privacy in Pervasive Space Systems (overview) – Introductory overview presentation on privacy issues in pervasive spaces.
Towards security and privacy for pervasive computing – Introductory paper on security and privacy issues in pervasive computing.
Location privacy in pervasive computing – A generic paper discussing the various issues of location privacy in pervasive computing.
Protecting privacy and anonymity in pervasive computing: trends and perspectives – Another perspective on privacy in pervasive computing environments.
Privacy Protecting Data Collection in Media Spaces – Cover the scenario when the pervasive environment cannot be trusted with sensitive data.
Privacy-preserving event detection in pervasive spaces – A privacy-preserving approach for some select event detection in pervasive environments.
Middleware for Pervasive spaces: Balancing Privacy and Utility – A more flexible system where users are allowed to specify their privacy policies.
A Policy Language for a Pervasive Computing Environment. – Describes an ontology based policy specification language for pervasive spaces.
Privacy preservation in wireless sensor networks: A state-of-the-art survey. – A survey paper for wireless sensor networks and privacy issues.
Privacy Infusion in Ubiquitous Computing. – An alternate technique for privacy preservation in pervasive environments.
RFID Security: In the Shoulder and on the Loading Dock. – These are a set of slides on RFID security issues.
Privacy in Data Sharing and Exchange
Enabling secure data exchange – A generic overview paper of security/privacy issues in secure data exchange.
A formal analysis of information disclosure in data exchange – A theoretical paper on disclosure analysis in data exchange.
Efficient private matching and set intersection – One of many secure multiparty computation papers discussing various set intersection computation problems in this framework
Privacy-preserving set operations – Another set of secure multiparty computation techniques for supporting a larger class of set-based operations
The New Casper: A Privacy-Aware Location-Based Database Server – The paper describes a system for location anonymization and privacy preserving query answering in a location aware application.