Privacy Issues in Computing (CS 6v81 003)
        Tuesday-Thursday 05:30-06:45pm  
        ECSS 2.203
Murat Kantarcioglu
          

Prerequisites
Grading
Course Topics
Course Outline

Prerequisites: 
 
None. Undergraduate level knowledge in basic statistics, databases and  algorithms are needed.
                                       

Grading:

  •   Paper reviews: %20 of your grade will be based on paper reviews. You need to write a reviewfor papers covered in the class. Your review should have at least three paragraphs. One paragraph that summarizes the paper, one paragraph that describes the three good ideas mentioned in the paper; another paragraph about three things that can be improved in the paper. Overall, your review should be at most one page with reasonable margins, 1.5 spacing and 11 font.  Print outs of the reviews for the current week should be submitted during the class every thursday.
  • Paper Presentations: %30 of your grade will be based on paper presentations. You need to prepare a 50 minute power  point presentation for the paper that is assigned to you.  You are welcomed to discuss the details of the paper and the presentation with me.
  • Class Project: %30 of your grade will be based on your class project. Your project should try to create novel solution ideas  or new solution implementations about some privacy problem. Projects can be done as an group or as an invidual. Groups can have at most three students in it.  Your project will proceed  in two phases:
    1.  Before March 3th,  you should schedule an appointment to discuss the project topic with me.
    2.  You should give a presentation related to outcome of your project on either April 18 or April 20.
  • Class Participation: %20 of your grade will be based on your class participation.  You should exchange ideas and engage in a class discussion for the paper that you are not presenting.
  

Course Topics: (tentative)

The increasing use of many new technologies have enabled corporations
and governments to collect and use huge amount of data related to
individuals. At the same time, legitimate uses in healthcare, crime
prevention and terrorism demand the collected information to be shared
by more people than most of us ever know. Today, the challenge is
enabling the legitimate use of the collected data without violating
privacy. In this course, we are going to analyze the legal and social
aspects of privacy and explore potential tools, techniques and
technologies that can enhance privacy.
 
Part I: Understanding Privacy
    Social Aspects of Privacy: End of Privacy? 
    Legal Aspects of Privacy,
    Privacy Regulations
    Effect on Database and Data Mining technologies on privacy.
    Privacy challenges raised by new emerging technologies such 
    RFID, biometrics.
 
Part II: Using technology for preserving privacy.
    Statistical Database security
    Inference Control
    Access Control
    Secure Multi-party computation and Cryptography
    Privacy-preserving Data mining
    Hippocratic databases  
Course Outline:
01.10.06 Tuesday
  We will go over the course topics and discuss the grading issues.

01.12.06 Thursday
  We will discuss two articles from the Economist.
  Murat will lead the discussion.  Presentation slides (ppt)
01.17.06 Tuesday  We will discuss the Chapters 1&2 from the book named "The Database Nation"
 by Simson Garfinkel (Available as an e-book through library)
 Presentation Slides (ppt)

01.19.06 Thursday  We will discuss the Chapter 3 from the book named "The Database Nation"
 by Simson Garfinkel (Available as an e-book through library)
 Presentation Slides (ppt)
01.24.06 Tuesday  We will discuss the legal aspects of privacy.
 You should write one page review related to HIPAA Laws.
  Wade will present the following papers: Presentation Slides (ppt)
01.26.06 Thursday
 We will discuss the privacy issues related to DNA databases.
   Jim will present the following paper.  Presentation slides (ppt)
  One page review is needed for the  second article.
01.31.06 Tuesday
 We will discuss privacy issues due to surveilance devices
  Li will present the following papers. One page summary is only needed for the  second paper.
02.02.06 Thursday
 We will discuss privacy issues related to RFID and Biometrics
  Alam will present the following papers. One page summary can be written for anyone of them. Presentation Slides(ppt)
02.07.06 Tuesday
 We will discuss a technique called k-anonymity
  Sweta will present the following paper.
02.09.06 Thursday
 We will continue discussing  k-anonymity.
  Cathy will present the following paper.
02.14.06 Tuesday
 Murat will give an overview of statistical methods for privacy
Hand written lecture notes in [tif format]
02.16.06 Thursday
  We will discuss the first part (pages 1-20) of the following paper:
  Ryan will present the first part.
Security-Control Methods for Statistical Databases: A Comparative Study by Adam and Worthmann
02.21.06 Tuesday
  We will cover the second part (21 to 42) of the Adam and Worthmann paper.
  Desalegn will present the second part.
02.23.06 Thursday
 We will read a summary  of multi-level security from Ross Anderson's
Security Engineering Book.
The photocopy of the Chapter 8 will be given in class.
Anand will  present the chapter.

02.28.06 Tuesday
We will read the following two papers, please write a review for the first one.
 Cathy will present the following papers:
1) Data mining, national security, privacy and civil liberties
    Bhavani Thuraisingham
2)The inference problem: a survey
   Csilla Farkas, Sushil Jajodia

03.02.06 Thursday
We will read the following two papers, please write a review for the second one.
  Ryan will present the following papers:
1)Randomization in privacy preserving data mining
 Alexandre Evfimievski
2)Cryptographic techniques for privacy-preserving data mining
  Benny Pinkas

03.07.06 Tuesday
SPRING BREAK
03.09.06 Thursday
SPRING BREAK
03.14.06 Tuesday
Overview of Secure Multi-party Computation Techniques.
We will cover the survey of "Varieties of Secure Computing" by
 Mathew Franklin and Moti Yung
Murat will present the part one of the survey. No review is needed.

03.16.06 Thursday
Overview of Secure Multi-party Computation Techniques.
We will cover the survey of "Varieties of Secure Computing" by
 Mathew Franklin and Moti Yung
Murat will present the part two of the survey. No review is needed
03.21.06 Tuesday Overview of Secure Multi-party Computation Techniques.
We will cover the survey of "Varieties of Secure Computing" by
 Mathew Franklin and Moti Yung
Murat will present the part three of the survey. No review is needed.
Hand written lecture notes in: [tif format][mht format]
03.23.06 Thursday
Privacy-preserving Data Mining by Pinkas and Lindel
  Desalegn will present the paper
03.28.06 Tuesday
Privacy-preserving Distributed Data Mining of Association Rules
 on Horrizontally Partitioned Data by Murat Kantarcioglu and Chris Clifton
 Sweta will present the paper.   No review is needed for this paper.
Reprints of the paper will be given in class.
03.30.06 Thursday
Privacy Preserving Set Operations  by Lea Kissner Dawn Song
  Alam will present the part one (pages 1-20) of the paper.
04.04.06 Tuesday
NO CLASS.
04.06.06 Thursday
Privacy Preserving Data Mining by Agrawal and Srikant
  Wade will present the paper.
04.11.06 Tuesday
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
by Dakshi Agrawal  and Charu C. Aggarwal
  Li will present the paper.
04.13.06 Thursday
Hippocratic Databases by Agrawal and Srikant
  Anand will present the paper.
04.18.06 Tuesday
Project Presentations
04.20.06 Thursday
Project Presentations