from Part IV - Data Systems and Related Applications
Published online by Cambridge University Press: 28 June 2017
The Internet has revolutionized the process of obtaining and sharing information. However, this functionality comes hand-in-hand with pervasive, often subtle, privacy violations. In this chapter, we discuss algorithmic approaches for accessing and disseminating information while protecting the privacy of network users. In particular, we focus on mechanisms that offer information theoretic privacy guarantees; that is, these mechanisms offer protection even against computationally unbounded adversaries. We provide a high-level overview of various classes of privacy-preserving algorithms, with concrete intuition-building examples.
Introduction
People today generate, share, and consume information with unprecedented efficiency. The Internet has enabled realities that seemed impossible a few decades ago: instantaneous global message dissemination, large-scale data storage at minimal cost, and lightning-fast information search and retrieval, to name a few. However, these advances come hand-in-hand with unique privacy threats, which were largely ignored in the push to develop seamless user experiences. Namely, the very information that users willingly consume and produce on the Internet can be deeply revealing about the users themselves. More problematically, leakage of this information poses a significant privacy risk, which can have serious societal repercussions, both psychological and physical [1,2]. In this chapter, we explore several privacy challenges and offer solutions associated with two key aspects of information flow: data dissemination and data access.
When people disseminate information – for instance, by posting a message on a social network – they can inadvertently reveal sensitive information about themselves. Sometimes, this information might be inherent to the content a user posts. For example, if Alice posts on Twitter that she is going to the cinema at 8 pm, then she is implicitly telling her contacts that she will not be home at 8 pm; in the worst case, this could facilitate a robbery. Such content-based data leakage is inevitable, and must be managed by educating users about the privacy implications of posting personal information. However, sometimes information dissemination can also cause unintentional leakage of metadata, or data that is not directly related to content. For example, if Alice posts a picture of her cats to a social network at 3 pm, and the social network includes her GPS location when it propagates the message to her contacts, then Alice's contacts could learn her location at 3 pm.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.