18-734 — Foundations of Privacy

 

Schedule (subject to change)

 

Date

Topic

Reading

Notes

Classes start Sep 9

Mon Sep 09

Course Overview [Slides, Video]

Central Questions:

·         What is privacy?

·         How can we protect privacy?

 

 

Wed Sep 11

Conceptual frameworks for understanding privacy [Slides, Video]

Recitation: Friday Sep 13: Introduction to Logic [Slides, Video]

 

 

Privacy through Accountability

Application domains: Healthcare and Web Privacy

 

Mon Sep 16

Specifying Privacy Policies:

Contextual Integrity & Logics of Privacy

Case study: HIPAA Privacy Rule [Slides, Video]

  • Privacy and Contextual Integrity: Framework and Applications [PDF]
  • Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws [PDF]

 

Wed Sep 18

Privacy Policy Enforcement through Audit

Case study: HIPAA Privacy Rule [Slides, Video]

  • Policy Auditing over Incomplete Logs: Theory, Implementation and Applications [PDF] [TR]

Recitation: More Logic [Slides, Video]

HW1 out (Sep 20) [PDF]

Mon Sep 23

Purpose Restrictions in Privacy Policies: Semantics and Audit

[Slides] [No video today - the video has no sound due to technical errors]

  • Formalizing and Enforcing Purpose Restrictions in Privacy Policies [PDF]
  • Purpose Restrictions on Information Use [PDF]

 

Wed Sep 25

Privacy-related Compliance:

Industry Experiences: Methods and Tools I [Lecture not recorded]

 

Recitation: Introduction to MDP Slides, Slides, Video]

Mon Sep 30

(Guest Lecture:

Jing MacKenzie, Aetna)

Health Information Privacy and Security: Industry Perspective

[Slides, Video]

 

Wed Oct 02

Privacy-related Compliance:

Industry Experiences: Methods and Tools II [Lecture not recorded]

 

HW1 in (Oct 4)

HW2 out (Oct 4) [PDF]

Mon Oct 07

Project Proposals

 

 

Wed Oct 09

(Guest Lecture:

Michael C. Tschantz, Berkeley)

Web Privacy: Online Tracking and Advertising I [Slides, Video]

  • Information Flow Investigations [PDF]
  • Challenges in Measuring Online Advertising Systems [PDF]
  • Understanding What They Do with What They Know [PDF]
  • Optional: Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising [PDF]

Recitation: Basic probability overview [Video]

Mon Oct 14

Audit Games

[Slides, Video]

  • Regret Minimizing Audits [PDF]
  • Audit Games [PDF]

Wed Oct 16

(Guest Lecture:

Jonathan Mayer, Stanford)

Web Privacy: Online Tracking and Advertising II [Slides, Video]

 

  •  Third-party Web Tracking: Policy and Technology [PDF]
  •  Why Johnny Can’t Opt-Out [PDF]

HW2 in (Oct 18)

HW3 out (Oct 18) [PDF]

 

 

Privacy-Preserving Statistics

Application Domains: Web privacy (tabular and graph-structured data)

 

Mon Oct 21

Audit Games and Database Privacy: k-anonymity and de-anonymization attacks

[See the slides from the last lecture on Audit Games, Slides, Video]

  • Protecting Respondents’ Identities in Microdata Release [PDF]
  • Robust De-anonymization of Large Sparse Datasets (How to Break Anonymity of the Netflix Prize Dataset) [PDF]

 

Wed Oct 23

Database Privacy: Differential Privacy

[See the slides from the last lecture on k-anonymity, Slides, Video]

  • Differential Privacy [PDF]
  • Optional: No Free Lunch in Data Privacy [PDF]

Recitation: Probability distributions and distance metrics

[Video]

Mon Oct 28

Database Privacy: Differential Privacy Applied

[Slides, Video]

  • Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders [PDF]

 

HW3 in (Oct 28)

HW4 out (Oct 28) [PDF]

Wed Oct 30

Database Privacy: Differential Privacy Applied

[Slides, Video]

  • Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders [PDF]
  • Optional: Differentially-Private Network Trace Analysis [PDF]

Recitation: Laplace mechanism

[Video]

Mon Nov 04

(Guest lecture:

Aleksandra Korolova, Google)

Privacy in Social Networks

[Video not permitted to be shared]

  • Privacy Violations Using Microtargeted Ads: A Case Study [PDF]
  • Personalized Social Recommendations - Accurate or Private? [PDF]

 

Wed Nov 06

(Guest lecture:

Moritz Hardt, IBM Research)

Web Privacy: Fairness in Online Advertising

[Slides] [Video]

  • Fairness through Awareness [PDF]

Recitation: Interactive proofs

[Video]

 

 

Cryptographic Mechanisms for Privacy Protection

Applications: Anonymous communication, identification

Mon Nov 11

Anonymous communication protocols

[Slides] [Slides]

[Video]

  • Untraceable Electronic Mail ... [PDF]
  • The Dining Cryptographers Problem… [PDF]
  • Tor: The Second-Generation Onion Router [PDF]

HW4 in (Nov 11)

HW5 out (Nov 11) [PDF] [scores.txt]

Wed Nov 13

Zero Knowledge: Theory

[Slides][Video]

Recitation: Zero Knowledge proofs

[Video]

Mon Nov 18

Zero Knowledge Applications

[Slides]

[Video]

 

  • Optional: Untraceable Electronic Cash [PDF] CL anonymous credentials [PDF]

 

Wed Nov 20

Secure Two-party Computation

[Slides] [Video]

  • Yao’s Garbled Circuits [PDF]
  • Faster Secure Two Party Computation Using Garbled Circuits [Web page]

 

Mon Nov 25

(Guest lecture:

Ananth Raghunathan, Stanford)

Functional Encryption/Search over Encrypted Data

[Slides] [Video]

  • Public Key Encryption with keyword Search [PDF]
  • Conjunctive, Subset, and Range Queries on Encrypted Data [PDF]
  • Optional: Practical Techniques for Searches on Encrypted Data [PDF]

HW5 in (Nov 25)

Wed Nov 27

No class—university holiday

Mon Dec 02

Project presentations

 

Project Report in (Dec 02)

Wed Dec 04

Course Review

[Slides]