Abstract
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how you might be able to apply your expertise to them.
- Balachander Krishnamurthy and Craig Will. On the Leakage of Personally Identifiable Information via Online Social Network. ACM SIGCOMM Computer Communication Review, Jan 2010. (SIGCOMM 2009: Best Workshop Papers) http://ccr.sigcomm.org/online/?q=node/577. Google ScholarDigital Library
- A. Dey and S. Weis. PseudoID: Enhancing Privacy in Federated Login. In Hot Topics in Privacy Enhancing Technologies, December 2010. http://research.google.com/pubs/archive/36553.pd.Google Scholar
- M. Hiltzik. Is your privacy secure online. http://articles.latimes.com/2010/jun/06/business/la-fi-hiltzik-20100606/2 June 6, 2010.Google Scholar
- C. Johnson III. Safeguarding against and responding to the breach of personally identifiable information, May 22 2007. Office of Management and Budget Memorandum. http://www.whitehouse.gov/omb/memoranda/fy2007/m07--16.pdf.Google Scholar
- B. Krishnamurthy and C. E. Wills. Cat and Mouse: Content Delivery Tradeoffs in Web Access. In WWW, May 2006. http://www.research.att.com/~bala/papers/cam.pdf. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Privacy Diffusion on the Web: A Longitudinal Perspective. In WWW, April 2009. http://www.research.att.com/~bala/papers/www09.pdf. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Privacy Leakage in Mobile Online Social Networks. In Proceedings of the Workshop on Online Social Networks, Jun. 2010. http://www.research.att.com/~bala/papers/pmob.pd. Google ScholarDigital Library
- Mark Crovella and Balachander Krishnamurthy. Internet Measurement: Infrastructure, Traffic, and Application. John Wiley & Sons. 550pp, 2006. Google ScholarDigital Library
- Congressman Ed Markey, Privacy. http://markey.house.gov/index.php?option=com_issues&task=view_issue&issue=13&Itemid=15.Google Scholar
- F. McSherry and R. Mahajan. Differentially-private network trace analysis. In Proceedings of the ACM SIGCOMM Conference, September 2010. Google ScholarDigital Library
- F. McSherry and I. Mironov. Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In Proceedings of the ACM KDD Conference, June 2009. http://research.microsoft.com/pubs/80511/NetflixPrivacy.pdf. Google ScholarDigital Library
- Network Advertising Initiative: Opt out of NAI member ad networks. http://networkadvertising.org/managing/opt_out.aspGoogle Scholar
- The Platform for Privacy Preferences 1.1 (P3P 1.1) specification. http://www.w3.org/TR/P3P11, July 2005.Google Scholar
- A. Shakimov, A. Varshavsky, L. Cox, and R. Caceres. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. In Proceedings of the Workshop on Online Social Networks. August 2009. http://www.kiskeya.net/ramon/work/pubs/wosn09.pd. Google ScholarDigital Library
- E. Steel and J. E. Vascellaro. Facebook, MySpace Confront Privacy Loophole. http://online.wsj.com/article/SB10001424052748704513104575256701215465596.html May 21, 2010.Google Scholar
- L. Sweeney. k-anonymity: A Model for Protecting Privacy. International Journal of Uncertain. Fuzziness and Knowledge-Based Systems, 10(5):557--570, 2002. Google ScholarDigital Library
- A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: Better Privacy for Social Networks. In Proceedings of Co-Next, December 2009. http://lockr.org/papers/lockr-conext2009.pd. Google ScholarDigital Library
- J. E. Vascellaro. Google Agonizes on Privacy as Ad World Vaults Ahead. http://online.wsj.com/article/SB10001424052748703309704575413553851854026.html Aug 10, 2010.Google Scholar
- S. Yekhanin. Private information retrieval. Communications of the ACM 53(4):68--73, 2010. Google ScholarDigital Library
- M. Zuckerberg. From Facebook, answering privacy concerns with new settings. http://www.washingtonpost.com/wp-dyn/content/article/2010/05/23/AR2010052303828.html, May 24, 2010.Google Scholar
Index Terms
- I know what you will do next summer
Recommendations
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
A Survey on Privacy Preserving Dynamic Data Publishing
Many organizations, especially small and medium business SMB enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy ...
An evolutionary feature set decomposition based anonymization for classification workloads: Privacy Preserving Data Mining
Privacy has become an important concern while publishing micro data about a population. The emerging area called privacy preserving data mining (PPDM) focus on individual privacy without compromising data mining results. An adversarial exploitation of ...
Comments