Seminar in Foundations of Privacy - Winter 2007/8

Instructor: Moni Naor

Grader: Gil Segev

When:     Tuesday 14:00--16:00 - Until March 17th Monday 14:00-16:00
Where:    Ziskind 1 -Until March 17th Monday Ziskind 261
First meeting:   Oct 23rd 2007

Informal Lectures         Lectures           Homework          Tentative List of Papers


DESCRIPTION:  The availability of fast and cheap computers coupled with massive storage devices has enabled the collection and mining of data on a scale previously unimaginable. This opens the door to potential abuse regarding individuals' information. There has been considerable research exploring the tension between utility and privacy in this context.

The goal of this course is to explore techniques and issues related to data privacy. In particular to study:

* Definitions of data privacy, and ways in which they can be refined

* Techniques for achieving privacy

* Limitations (i.e. lower bounds) on privacy in various settings.

* Privacy issues in specific settings

The course will consist of seminar-style presentations by the students.

PREREQUISITES: Students are expected to be familiar with algorithms, data structures, probability theory, and linear algebra, at an undergraduate level. No prior cryptography course will be assumed.

REQUIREMENTS: Students are required to present one set of the papers and the background leading to it, write a summary as well as attend all meeting, read all assigned papers, and participate in class discussion. In addition there will be a few homework sets. You may discuss the problems with other students, but the write-up should be individual.


Background Material

Seinfled on privacy vs. security and different attitudes to privacy: The Reversed Peephole or the script

The story Scroogled, by Cory Doctorow

New York times article on identifying users from AOL search records

  • Cynthia Dwork An Ad Omnia Approach to Defining and Achieving Private Data Analysis

    Advice on giving Academic Talks

    Below is a compilation of source on giving talks. Some of it humorous and some contradicts each other

     

    Informal Talks held During the Strike

    Lectures:

     

    Homework:

    Homework set 1 - deadline Feb 10th. 

     

    Tentative List of Papers:

    ==========================================================================================================

    Randomized Response

    =========================================================================================================

    More Randomized Response

    =========================================================================================================

    K- Anonymity and linkability

    =========================================================================================================

    Auditing

    ==========================================================================================================

    ==========================================================================================================

     ==========================================================================================================

     ==========================================================================================================

    ==========================================================================================================

    Fuzzy Extractors

      ==========================================================================================================

    RFIDs

      ==========================================================================================================

    Privacy Protection in Images


    Related Courses:

    Workshop and talks

    Bibliographies

    Surveys from statistics point of view: