skip to main content
research-article

I know what you will do next summer

Published:22 October 2010Publication History
Skip Abstract Section

Abstract

This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how you might be able to apply your expertise to them.

References

  1. Balachander Krishnamurthy and Craig Will. On the Leakage of Personally Identifiable Information via Online Social Network. ACM SIGCOMM Computer Communication Review, Jan 2010. (SIGCOMM 2009: Best Workshop Papers) http://ccr.sigcomm.org/online/?q=node/577. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Dey and S. Weis. PseudoID: Enhancing Privacy in Federated Login. In Hot Topics in Privacy Enhancing Technologies, December 2010. http://research.google.com/pubs/archive/36553.pd.Google ScholarGoogle Scholar
  3. M. Hiltzik. Is your privacy secure online. http://articles.latimes.com/2010/jun/06/business/la-fi-hiltzik-20100606/2 June 6, 2010.Google ScholarGoogle Scholar
  4. C. Johnson III. Safeguarding against and responding to the breach of personally identifiable information, May 22 2007. Office of Management and Budget Memorandum. http://www.whitehouse.gov/omb/memoranda/fy2007/m07--16.pdf.Google ScholarGoogle Scholar
  5. B. Krishnamurthy and C. E. Wills. Cat and Mouse: Content Delivery Tradeoffs in Web Access. In WWW, May 2006. http://www.research.att.com/~bala/papers/cam.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Krishnamurthy and C. E. Wills. Privacy Diffusion on the Web: A Longitudinal Perspective. In WWW, April 2009. http://www.research.att.com/~bala/papers/www09.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Krishnamurthy and C. E. Wills. Privacy Leakage in Mobile Online Social Networks. In Proceedings of the Workshop on Online Social Networks, Jun. 2010. http://www.research.att.com/~bala/papers/pmob.pd. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mark Crovella and Balachander Krishnamurthy. Internet Measurement: Infrastructure, Traffic, and Application. John Wiley & Sons. 550pp, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Congressman Ed Markey, Privacy. http://markey.house.gov/index.php?option=com_issues&task=view_issue&issue=13&Itemid=15.Google ScholarGoogle Scholar
  10. F. McSherry and R. Mahajan. Differentially-private network trace analysis. In Proceedings of the ACM SIGCOMM Conference, September 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. McSherry and I. Mironov. Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In Proceedings of the ACM KDD Conference, June 2009. http://research.microsoft.com/pubs/80511/NetflixPrivacy.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Network Advertising Initiative: Opt out of NAI member ad networks. http://networkadvertising.org/managing/opt_out.aspGoogle ScholarGoogle Scholar
  13. The Platform for Privacy Preferences 1.1 (P3P 1.1) specification. http://www.w3.org/TR/P3P11, July 2005.Google ScholarGoogle Scholar
  14. A. Shakimov, A. Varshavsky, L. Cox, and R. Caceres. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. In Proceedings of the Workshop on Online Social Networks. August 2009. http://www.kiskeya.net/ramon/work/pubs/wosn09.pd. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Steel and J. E. Vascellaro. Facebook, MySpace Confront Privacy Loophole. http://online.wsj.com/article/SB10001424052748704513104575256701215465596.html May 21, 2010.Google ScholarGoogle Scholar
  16. L. Sweeney. k-anonymity: A Model for Protecting Privacy. International Journal of Uncertain. Fuzziness and Knowledge-Based Systems, 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: Better Privacy for Social Networks. In Proceedings of Co-Next, December 2009. http://lockr.org/papers/lockr-conext2009.pd. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. E. Vascellaro. Google Agonizes on Privacy as Ad World Vaults Ahead. http://online.wsj.com/article/SB10001424052748703309704575413553851854026.html Aug 10, 2010.Google ScholarGoogle Scholar
  19. S. Yekhanin. Private information retrieval. Communications of the ACM 53(4):68--73, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Zuckerberg. From Facebook, answering privacy concerns with new settings. http://www.washingtonpost.com/wp-dyn/content/article/2010/05/23/AR2010052303828.html, May 24, 2010.Google ScholarGoogle Scholar

Index Terms

  1. I know what you will do next summer

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 40, Issue 5
        October 2010
        73 pages
        ISSN:0146-4833
        DOI:10.1145/1880153
        Issue’s Table of Contents

        Copyright © 2010 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 October 2010

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader