06 02 2020
play

06/02/2020 Dan Perjovschi Dan Perjovschi, 2007 Jaap-Henk Hoepman - PDF document

06/02/2020 Dan Perjovschi Dan Perjovschi, 2007 Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 1 1 Privacy Seminar Introduction Jaap-Henk Hoepman Privacy & Identity Lab Radboud University Tilburg University University of


  1. 06/02/2020 Dan Perjovschi Dan Perjovschi, 2007 Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 1 1 Privacy Seminar Introduction Jaap-Henk Hoepman Privacy & Identity Lab Radboud University Tilburg University University of Groningen * jhh@cs.ru.nl // 8 www.cs.ru.nl/~jhh // 8 blog.xot.nl // @xotoxot 2 Agenda n Course overview n Privacy: an introduction Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 3 3 1

  2. 06/02/2020 Organsiation 4 Organisation n Teachers ● Jaap-Henk Hoepman (jhh@cs.ru.nl); Erasmus 19.12 n Blackboard not used ● Website: https://www.cs.ru.nl/~jhh/secsem.html ● Wiki: http://wiki.science.ru.nl/privacy/ Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 5 5 Seminar n Seminar ● Student lecture ● Student paper ● Student opposition n Grade = weighted average ● But only if all grades at least 5.5 ● If not, lowest grade is final grade! n Working in groups ● 2 or 3 people n Attendance required n Lecture rooms ● From February 6 to March 19 in room HFML 0220. From April 16 to June 11 in HG 00.310. Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 6 6 2

  3. 06/02/2020 Course schedule Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 7 7 Topics (first come first serve) n Privacy in databases n Privacy friendly revocation of credentials ● How to provide (controlled) access to personal data stored in ● How to (efficiently) revoke anonymous credentials. I.e. how to databases, without immediately threatening the privacy of revoke a particular credential, even though individual the people involved, using mechanisms like differential credentials cannot be traced by definition privacy or statistical disclosure control. n Revocable privacy n Privacy friendly search ● How to guarantee privacy while also guaranteeing that all ● How to hide the query (i.e. what is searched for) from the users of a system abide by some predetermined rules, i.e. how party hosting the database. to design systems that are both privacy friendly and secure. n Searching in encrypted databases n Privacy friendly location based services ● How to also hide the underlying data in the database from ● How to provide a service that depends on the user's current the party hosting the database. location, without revealing the actual, exact location? n Privacy in machine learning n Privacy in asynchronous messaging ● How to ensure that individual data used to train a machine ● How to establish contact anonymously, and how to learning model is not leaked when using the model. subsequently exchange messages in an unlinkable fashion that prevents the service provider to learn who is n Polymorphic encryption communicating with who. ● How to protect privacy in e.g. health care where data must be n Anonymous cryptocurrencies made conditionally accessible to certain care providers while staying encrypted in general. ● How to make Bitcoin like cryptocurrencies privacy friendly. n Privacy friendly identity management n Secure multiparty computation ● How to use e.g. attribute based credentials or other claims ● How to jointly compute the output of a function (e.g. some based approaches to make identity management more aggregate statistic) without revealing the individual inputs. privacy friendly. Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 8 8 Research n analyse a particular practical case ● what are the privacy issues (from a societal and legal perspective) and how are they dealt with n give a precise and concise problem description ● in technical terms: define your model; your assumpions n investigate possible PETs that apply ● summarise your analysis n pick one and solve the problem (involves a protocol) ● describe this in sufficient detail! n (informally) prove or argue correctness Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 9 9 3

  4. 06/02/2020 Student lecture n Goal of lecture ● to inform other students about your research n Important ● make lecture interactive ● add additional material n Discuss draft ● thursday 13:00-13:15 the week before, in my office ● mail slides etc. at least two day before Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 10 10 Student lecture: grading Content Form and performance n Argumentation and Depth n Structure ● Whether your lecture provides a solid basis and ● Logical ordering of your lecture, the relationship backing of all statements and claims made, and between the topics. whether it covers all important topics in sufficient detail. n Attractiveness ● Whether your lecture captivates the audience, your n Intelligibility use of supporting materials (e.g. powerpoint). ● Whether the message comes across, whether your lecture connects to what your audience expects and understands, how well you explain certain topics. Delivery n n Comprehensiveness ● Level of engagement and contact with the audience, ● Whether your lecture covers all important aspects, your presence in front of the class, the liveliness and and clearly separates important issues from tone of your lecture secondary details. Equal attention should be paid to technical and legal/societal issues. n Interaction ● Level of interactivity, the way you respond to questions. n Language ● Pronunciation, vocabulary, grammar. Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 11 11 Student paper n Goal ● Report on research ● Express own perspective and opinion on PETs n Format ● Roughly 12 pages (excluding references) « A4, reasonable margins, 10-11 pt font n Beware ● Collect your own literature as well ● Use input obtained during presentation in class Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 12 12 4

  5. 06/02/2020 Student paper n Typical structure ● Context ● Problem description « Including legal/social analysis ● Proposed solution ● Technical analysis ● Conclusions Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 13 13 Student paper: planning n Average timespan ● Literature study: 2 weeks ● Perform research: 2 weeks ● Write skeleton: 1 week ● Write final paper: 3 weeks n Deadlines ● April 23: Skeleton ● June 11: Final paper n So start as soon as you can! Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 14 14 Student paper: grading Contet Form n (Technical) quality n Style ● Whether the paper shows an understanding of the ● Clarity of writing, objectiveness, linguistic quality (in (technical) issues involved. Correctness of all terms of spelling and grammar). (technical) statements and claims. n Structure n Analysis ● Logical structure of the paper, helping the reader Whether a proper argumentation is given, and understand what he is about to read, giving the ● whether all main aspects of the topic are addressed, paper a natural flow. with proper regard of what are the main points and n Attractiveness what are only secondary points. (This covers the criteria argumentation, depth and intelligibility, and ● Formatting of the paper, including precise comprehensiveness used for scoring the formatting of the bibliography. presentation.) n Quality of references Whether you found and cite all relevant literature. ● Originality (finding relevant references yourself) is appreciated. n Own opinion ● Whether the paper clearly expresses and argues your own opinion on the subject matter. Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 15 15 5

  6. 06/02/2020 Working in groups n Everyone responsible for all output ● Review each others work! n Work together, not seperately n Plan your work n Equally divide work ● And make sure everyone delivers ● If not: notify me before everything escalates…. Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 16 16 Remaining points n Contribute to the wiki ● http://wiki.science.ru.nl/privacy/ Jaap-Henk Hoepman // 9-2-2017 // Privacy Seminar 17 17 2. Privacy: an overview Privacy: an overview 18 6

  7. 06/02/2020 Contents n Privacy under threat ● Government ● Business ● People n What is privacy? n The value of privacy ● Individual liberty ● Social value n How the law protects privacy Jaap-Henk Hoepman // 19 Government surveillance Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 20 20 Fraud detection, policing Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 21 21 7

  8. 06/02/2020 Commercial surveillance Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 22 22 Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 23 23 Cambridge Analytica https://www.theguardian.com/uk-news/cambridge-analytica Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 24 24 8

  9. 06/02/2020 They know things before you yourself do! Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 25 25 They track you even in real shops Jaap-Henk Hoepman // 9-2-2017 // Privacy: an overview 26 26 People… n Online 24 hours/day n Do many things over the Internet ● Social networking ● Communications ● Reading ● Video ● Finance ● Maps ● Platforms (Airbnb, Uber) Jaap-Henk Hoepman // 30-01-2018 // Privacy by design 27 27 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend