Skip to main content

Using the Privacy Tree in Practice

  • 329 Accesses

Abstract

This chapter discusses how the privacy tree can be used to add privacy protection to real-world environments. This includes using PETs in combination with security technologies, using PETs in conjunction with the legal infrastructure, and using PETs to add privacy to other types of technologies (the specific examples given are software defined networking and machine learning).

Keywords

  • Privacy and security
  • Privacy law
  • Legal infrastructure for privacy
  • Privacy and software defined networking (SDN)
  • Privacy and machine learning (ML)

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-81043-6_9
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   44.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-81043-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   59.99
Price excludes VAT (USA)
Fig. 9.1
Fig. 9.2

References

  • C. Adams, A Classification for Privacy Techniques. Univ. Ottawa Law Technol. J. 3(1) (2006)

    Google Scholar 

  • D. Asonov, Private information retrieval: An overview and current trends. Proceedings of the ECDPvA Workshop, Informatik 2001, Vienna, Austria, (2001, September)

    Google Scholar 

  • K. Benzekki, A. El Fergougui, A. Elbelrhiti Elalaoui, Software-defined networking (SDN): A survey. Sec. Commun. Networks 9(18), 5803–5833 (2017)

    CrossRef  Google Scholar 

  • O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A system for anonymous and unobservable internet access. in Designing privacy enhancing technologies, Springer-Verlag, LNCS 2009, pp. 115–129, (2001)

    Google Scholar 

  • N. Carlini, C. Liu, Ú. Erlingsson, J. Kos, and D. Song, The secret sharer: Evaluating and testing unintended memorization in neural networks. USENIX Security Symposium, pp. 267–284 (2019)

    Google Scholar 

  • Y.-C. Chang and C.-J. Lu, Oblivious polynomial evaluation and oblivious neural learning. Advances in Cryptology— Proceedings of Asiacrypt, pp. 369–384 (2001, 9–13 December)

    Google Scholar 

  • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2) (1981)

    Google Scholar 

  • D. Denning, Cryptography and data security. Addison-Wesley, (1982). (See Chapter 6, “Inference Controls”)

    Google Scholar 

  • W. Du and Z. Zhan, Using randomized response techniques for privacy-preserving data mining. Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 6pp, (2003, 24–27 August)

    Google Scholar 

  • Y. Elovici, B. Shapira, A. Maschiach, A new privacy model for hiding group interests while accessing the web. ACM Workshop Privacy Electron. Soc., 63–70 (2002)

    Google Scholar 

  • Federal: Federal Trade Commission, Children’s Online Privacy Protection Act, 15 U.S.C. 6501-6506, Pub. L. No. 105-277, Div. C, Title XIII, 112 Stat. 2681-2728, (1998)

    Google Scholar 

  • V. Feldman, Does learning require memorization? A short tale about a long tail. Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, Chicago, IL, USA, pp. 954–959, (2020, 22–26 June)

    Google Scholar 

  • A. Jain, A complete tutorial on ridge and lasso regression in python. Analytics Vidhya (2016, 28 January)

    Google Scholar 

  • S. Kumar Murakonda and R. Shokri, ML privacy meter: Aiding regulatory compliance by quantifying the privacy risks of machine learning. Privacy Enhancing Technologies Symposium, HotPETs session (2020)

    Google Scholar 

  • J. Lainhart, Cybersecurity and privacy enhancements. American Institute of Certified Public Accountants, issue brief (2018, 4 June)

    Google Scholar 

  • M. Nasr, R. Shokri, A. Houmansadr, Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. IEEE Symp. Sec. Privacy, 1022–1036 (2019)

    Google Scholar 

  • Office: Office of the Information and Privacy Commissioner of Ontario and Office of the Federal Privacy Commissioner of Australia, Web Seals: A Review of Online Privacy Programs. 22nd International Conference on Privacy and Personal Data Protection (2000, September)

    Google Scholar 

  • Organization: Organization for Economic Co-operation and Development (OECD), OECD Privacy Framework (which includes Guidelines on the Protection of Privacy and Transborder Flows of Personal Data), OECD Publications Service (2013)

    Google Scholar 

  • H. Polat and W. Du, Privacy-preserving collaborative filtering using randomized pertubation techniques. Proceedings of the third IEEE international conference on data mining, pp. 625–628, (2003, 12–22 November)

    Google Scholar 

  • Quora, What is regularization in machine learning? (2020)

    Google Scholar 

  • M.G. Reed, P.F. Syverson, D.M. Goldschlag, Anonymous connections and onion routing. IEEE J. Selected Areas Commun. 16(4), 482–494 (1998)

    CrossRef  Google Scholar 

  • M.K. Reiter, A.D. Rubin, Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)

    CrossRef  Google Scholar 

  • A. Samuel, Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 71–105 (July 1959)

    MathSciNet  CrossRef  Google Scholar 

  • R. Shokri, V. Shmatikov, Privacy-preserving deep learning, in Proceedings of the 22nd ACM conference on computer and communications security, (2015), pp. 1310–1321

    Google Scholar 

  • R. Shokri, M. Stronati, C. Song, V. Shmatikov, Membership inference attacks against machine learning models. IEEE Symp. Sec. Privacy, 3–18 (2017)

    Google Scholar 

  • C. Song, T. Ristenpart, V. Shmatikov, Machine learning models that remember too much, in Proceedings of the ACM conference on computer and communications security, (2017), pp. 587–601

    Google Scholar 

  • L. Sweeney, Replacing Personally-Identifying Information in Medical Records, the Scrub System, in American medical informatics association proceedings, journal of the american medical informatics association, ed. by J. Cimino, (Hanley & Belfus, Inc, 1996), pp. 333–337

    Google Scholar 

  • L. Sweeney, K-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge-based Syst. 10(5), 557–570 (2002)

    MathSciNet  CrossRef  Google Scholar 

  • Wikipedia, Anonymizer (company) (2020, 7 September)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Adams, C. (2021). Using the Privacy Tree in Practice. In: Introduction to Privacy Enhancing Technologies. Springer, Cham. https://doi.org/10.1007/978-3-030-81043-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81043-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81042-9

  • Online ISBN: 978-3-030-81043-6

  • eBook Packages: Computer ScienceComputer Science (R0)