Advanced Research in Data Privacy pp 15-25 | Cite as
Selected Privacy Research Topics in the ARES Project: An Overview
Abstract
This chapter gives an overview of some of the data privacy research carried out by the team at Universitat Rovira i Virgili within the ARES project. Topics reviewed include query profile privacy, location privacy, differential privacy and anti-discrimination.
Keywords
Location Privacy Differential Privacy Disclosure Risk Privacy Level Private Information RetrievalNotes
Acknowledgments
The second author is partially supported by the Government of Catalonia through an ICREA Acadèmia Prize. The following partial supports are also gratefully acknowledged: the Spanish Government under projects CONSOLIDER INGENIO 2010 CSD2007-00004 “ARES” and TIN2011-27076-C03-01 “CO-PRIVACY”, and the European Commission under FP7 projects “DwB” and “Inter-Trust”. The second author is with the UNESCO Chair in Data Privacy, but the views expressed in this chapter neither necessarily reflect the position of UNESCO nor commit that organization.
References
- 1.Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: 24th International Conference on Data Engineering, pp. 376–385 (2008)Google Scholar
- 2.Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8), 884–910 (2010)CrossRefGoogle Scholar
- 3.Bras-Amorós, M., Domingo-Ferrer, J., Stokes, K.: Configuraciones combinatóricas y recuperación privada de información por pares. In: Nuevos Avances en Criptografía y Codificación de la Información (2009)Google Scholar
- 4.Bras-Amorós, M., Stokes, K.: The semigroup of combinatorial configurations. Semigroup Forum 84(1), 91–96 (2011)CrossRefGoogle Scholar
- 5.Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science, pp. 41–50 (1995)Google Scholar
- 6.Chor, B., Gilboa, N., Naor, M.: Private Information Retrieval by keywords. Technical Report TR CS0917. Departament of computer Science, Technion (1997)Google Scholar
- 7.Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM 45, 965–981 (1998)CrossRefMATHMathSciNetGoogle Scholar
- 8.Castellà, D., Romero-Tris, C., Viejo, A., Castellà-Roca, J., Solsona, F., Giné, F.: Diseño de una red P2P optimizada para la privatización de consultas en WSEs. In: XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 273–278 (2012)Google Scholar
- 9.Castellà-Roca, J., Viejo, A., Herrera-Joancomartí, J.: Preserving users’ privacy in web search engines. Comput. Commun. 32(13), 1541–1551 (2009)CrossRefGoogle Scholar
- 10.Domingo-Ferrer, J., Bras-Amorós, M.: Peer-to-peer private information retrieval. In: PSD 2008. LNCS, vol. 5262, pp. 315–323 (2008)Google Scholar
- 11.Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a Peer-to-Peer community. Data Knowl. Eng. 68(11), 1237–1252 (2009)CrossRefGoogle Scholar
- 12.Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference. LNCS, vol. 3876, pp. 265–284. Springer, New York (2006)Google Scholar
- 13.Dwork, C.: Differential privacy. In: Automata, Languages and Programming. LNCS, vol. 4052, pp. 1–12. Springer, New York (2006)Google Scholar
- 14.Domingo-Ferrer, J., Sramka, M., Trujillo, R.: Privacy preserving Publication of Trajectories using microaggregation. In: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (2010)Google Scholar
- 15.Domingo-Ferrer, J., Solanas, A., Castellà-Roca, J.: \(h(k)\)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Rev. 33(4), 720–744 (2009)CrossRefGoogle Scholar
- 16.Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Inf. Sci. 208, 55–80 (2012)CrossRefGoogle Scholar
- 17.Erola, A., Castellà-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs. In: PSD 2010. LNCS, vol. 6344, pp. 127–137 (2010)Google Scholar
- 18.Erola, A., Castellà-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs using the open directory project. SORT-Statistics and Operations Research Transactions, pp. 41–58, Special issue (2011)Google Scholar
- 19.Erola, A., Castellà-Roca, J., Viejo, A., Mateo-Sanz, J.M.: Exploting social networks to provide privacy in personalized web search. J. Syst. Soft. 84(10), 1734–1745 (2011)CrossRefGoogle Scholar
- 20.Hajian, S., Domingo-Ferrer, J., Martínez-Ballesté, A.: Discrimination prevention in data mining for intrusion and crime detection. In: IEEE Symposium Series in Computational Intelligence in Cyber Security (2011)Google Scholar
- 21.Hajian, S., Domingo-Ferrer, J., Martínez-Ballesté, A.: Rule protection for indirect discrimination prevention in data mining. In: MDAI 2011. LNCS, vol. 6820, pp. 211–222 (2011)Google Scholar
- 22.Hajian, S., Domingo-Ferrer, J.: A methodology for direct and indirect discrimination prevention in data mining. IEEE Trans. Knowl. Data Eng. 25(7), 1445–1459 (2013)CrossRefGoogle Scholar
- 23.Howe, D.C., Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Kerr, I., Lucock, C., Steeves, V. (eds.) Lessons from the Identity Trail: Privacy, Anonymity and Identity in a Networked Society, pp. 409–428. Oxford University Press, Oxford UK (2009)Google Scholar
- 24.Jones, R., Kumar, R., Pang, B., Tomkins, A.: I know what you did last summer: query logs and user privacy. In: Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management, pp. 909–914 (2007)Google Scholar
- 25.Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: Wireless Communications and Networking Conference-WCNC 2005, vol. 2, pp. 1200–1205 (2005)Google Scholar
- 26.Navarro-Arribas, G., Torra, V., Erola, A., Castellà-Roca, J.: User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manage. 48(3), 476–487 (2012)CrossRefGoogle Scholar
- 27.Pérez-Martínez, P.A., Solanas, A.: Location privacy through users’ collaboration: a distributed pseudonymizer. In: Third International Conference on Mobile Ubiquitous Computing, Systems. Services and Technologies (2009)Google Scholar
- 28.Romero-Tris, C., Castellà-Roca, J., Viejo, A.: Multi-party private web search with untrusted partners. In: 7th International Conference on Security and Privacy in Communication Networks (2011)Google Scholar
- 29.Romero-Tris, C., Viejo, A., Castellà-Roca, J.: Improving query delay in private web search. In: International Workshop on Securing Information in Distributed Environments and Ubiquitous Systems (2011)Google Scholar
- 30.Soria-Comas, J., Domingo-Ferrer, J.: Sensitivity-independent differential privacy via prior knowledge refinement. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 20(6), 855–876 (2012)CrossRefMathSciNetGoogle Scholar
- 31.Soria-Comas, J., Domingo-Ferrer, J.: Optimal data-independent noise for differential privacy. Inf. Sci. 250, 200–214 (2013)CrossRefMathSciNetGoogle Scholar
- 32.Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., Martínez, S.: Improving the utility of differentially private data releases via k-anonymity. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)Google Scholar
- 33.Soria-Comas, J., Domingo-Ferrer, J.: Differential privacy via t-closeness in data publishing. In: 11th Annual Conference on Privacy, Security and Trust, pp. 27–35 (2013)Google Scholar
- 34.Stinson, D.R.: Combinatorial designs: constructions and analysis. SIGACT News 39(4), 17–21 (2008)CrossRefMathSciNetGoogle Scholar
- 35.Solanas, A., Martínez-Ballesté, A.: Privacy protection in location-based services through a public-key privacy homomorphism. In: Euro PKI 2007. LNCS, vol. 4582, pp. 362–368 (2007)Google Scholar
- 36.Solanas, A., Martínez-Ballesté, A.: A TTP-free protocol for location privacy in location-based services. Comput. Commun. 31(6), 1181–1191 (2008)CrossRefGoogle Scholar
- 37.Stokes, K., Bras-Amorós, M.: Optimal configurations for Peer-to-Peer user-private information retrieval. Comput. Math. Appl. 59(4), 1568–1577 (2010)CrossRefMATHMathSciNetGoogle Scholar
- 38.Stokes, K., Bras-Amorós, M.: Associating a numerical semigroup to the triangle-free configurations. Adv. Math. Commun. 5(2), 351–371 (2011)CrossRefMATHMathSciNetGoogle Scholar
- 39.Stokes, K., Farràs, O.: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search. Des. Codes Crypt. 71, 503–524 (2014)CrossRefMATHGoogle Scholar
- 40.Trujillo, R., Domingo-Ferrer, J.: On the privacy offered by k-d-anonymity. Inf. Syst. 38(4), 491–494 (2013)CrossRefGoogle Scholar
- 41.Viejo, A., Castellà-Roca, J.: Using social networks to distort users’ profiles generated by web search engines. Comput. Netw. 54(9), 1343–1357 (2010)CrossRefMATHGoogle Scholar
- 42.AOL Search Data Scandal. http://en.wikipedia.org/wiki/AOL_search_data_leak. Accessed Aug 2006
- 43.ODP. Open directory project. http://www.dmoz.org/
- 44.The Tor Project Inc: Tor: Overview. http://torproject.org/overview.html.en