SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Signal Processing and Data Privacy
Literature Review
By Kato Mivule
COSC891 Fall 2013
The Role of Signal Processing in Meeting Privacy Challenges: An
Overview
• Sankar, L.; Trappe, W.; Ramchandran, K.; Poor, H.V.; Debbah, M., "The Role of Signal Processing in Meeting Privacy Challenges:
An Overview," Signal Processing Magazine, IEEE , vol.30, no.5, pp.95,106, Sept. 2013, doi: 10.1109/MSP.2013.2264541
Bowie State University Department of Computer Science
Introduction: Information Leakage Everywhere
• Growth of information technology has made personal data easily available.
• This overflow of unconstrained personal data raises privacy concerns.
• Yet such data sources have remarkable value (utility) to their users.
• This leads to a tension between data privacy and utility needs.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Introduction: Information Leakage Everywhere
• Users post information to social networks, unaware of the privacy risks.
• Companies use the cloud for data processing unaware of privacy risks.
• The data cloud is a risk to “leakage” of private data.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Privacy is differs from Security
• Data privacy deals with confidentiality control.
• Data security involves the handling of accessibility control.
• Data privacy is the procedure of protection against illegal data disclosure.
• Data security is the control of data from illegal access. [ 1 2]
• To exemplify this fundamental point, a house might be secured with locks to ensure access
control; however, bystanders could still look inside the house from a distance if there are
no curtains in the windows, thus no privacy even while access is denied to the bystanders.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Privacy differs from Cryptography
• Cryptography works as an access control methodology.
• Privacy works as a confidentiality control method.
• After decryption, a plaintext database is a risk to ‘inside knowledge’ attacks.
• After decryption, a plaintext database loses its confidentiality.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Adversaries could be insiders
• Every user is a potential adversary.
• A database might be secure but vulnerable to confidentiality breaches.
• For example a user learning private information by inference.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Inference Vulnerabilities – Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
Attribute types in statistical databases
• Authors: Public attributes and Private attributes.
• More on attributes:
• PII – Personally Identifiable Information attributes
• Quasi attributes
• Non-sensitive attributes
• Sensitive attributes
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Privacy versus utility – a.k.a. the Utility-Privacy (U-P) tradeoff problem.
• Data utility – how beneficial a privatized dataset is to a user.
• Data utility (usefulness) diminishes during the data privacy process:
• When PII is removed.
• When data is perturbed.
• Equilibrium between data privacy and utility needs is an intractable problem.
• “Perfect privacy can be achieved by publishing nothing at all, but this has no utility;
perfect utility can be obtained by publishing the data exactly as received, but this offers no
privacy” Dwork (2006)
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Types of Privacy
• Database privacy
• Consumer privacy
• Competitive privacy
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Data Privacy Mechanisms
Author: k-anonymity and Differential privacy
• Non-perturbative methods: original data values are not modified.
• k-anonymity
• l-diversity
• Suppression
• Generalization
• Perturbative methods: original data values are transformed.
• Noise addition
• Multiplicative noise
• Logarithmic noise
• Differential privacy
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Data Privacy Mechanisms
• Non-perturbative methods: original data values are not modified.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Data Privacy Mechanisms – Perturbation methods – data values modified
• Noise addition: random values are added to sensitive numerical attribute
values to ensure privacy. The general expression is:
• 𝑋 + 𝜀 = 𝑍
• X is the original continuous dataset and ɛ is the set of random values (noise) with a
distribution 𝑒~𝑁 0, 𝜎2
that is added to X, and finally Z is the privatized dataset.
• Multiplicative noise: random values with mean µ= 1 and variance 𝜎2, is
multiplied to the original values. The general expression is:
• 𝑋𝑗 𝜀𝑗 = 𝑌𝑗
• Logarithmic noise: a logarithmic adjustment of the original values is done:
• 𝑙𝑛𝑋𝑗 = 𝑌𝑗
• Random values 𝜀𝑗 are then created and added the logarithmic values, 𝑌𝑗, producing the privatized
values 𝑍𝑗 as shown below:
• 𝑌𝑗 + 𝜀𝑗 = 𝑍𝑗
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Data Privacy Mechanisms – Perturbation methods – data values modified
Differential Privacy (DP):
• DP is enforced by adding Laplace noise to query results from the database.
• With DP, the users of the database cannot discern if an item has been changed in that database.
• A DP mechanism satisfies the following criteria:
•
𝑃[𝑞 𝑛(𝐷1)∈𝑅]
𝑃[𝑞 𝑛 𝐷2 ∈𝑅]
≤ 𝑒 𝜀
• Laplace noise between (0, b) is generated and added to f(x), the original query response, such that:
• 𝑏 =
∆𝑓
𝜀
• The max difference is calculated, ∆𝑓 is the max difference (most influential observation):
• ∆𝑓 = 𝑀𝑎𝑥 𝑓 𝐷1 − 𝑓 𝐷2
• Finally, 𝐷𝑖𝑓𝑓𝑒𝑟𝑒𝑛𝑡𝑖𝑎𝑙 𝑝𝑟𝑖𝑣𝑎𝑡𝑒 𝑑𝑎𝑡𝑎 = 𝑓 𝑥 + 𝐿𝑎𝑝𝑙𝑎𝑐𝑒(0, 𝑏)
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Utility-Privacy(U-P) Trade-off
• Data sanitization is concerned with:
• The statistics of the output that achieve a desired level of utility and privacy
• Deciding which input values to perturb.
• How to probabilistically perturb values.
• The U-P tradeoff framework requires the following three components:
• A (statistical) model for the data
• Measures for privacy and utility
• A method to formalize the mappings from 𝑋 to 𝑋
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Utility-Privacy(U-P) Trade-off
• Data sanitization is concerned with:
• The statistics of the output that achieve a desired level of utility and privacy
• Deciding which input values to perturb.
• How to probabilistically perturb values.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Tension between Privacy and utility - Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
Data Utility Measure
• Utility captures how close the revealed database is to the original.
• A possible measure for the utility u is the requirement that the average distortion of the public
variables is upper bounded, for each 𝜀 > 0, and all sufficiently large n:
𝑢 ≡ 𝐸
1
𝑛
𝑝
𝑛
𝑖=1
𝑋 𝐾 𝑟,𝑖
, 𝑋 𝐾 𝑟,𝑖
≤ 𝐷 + 𝜖
• p . , . is the distortion function
• 𝐸 is the expectation over the joint distribution 𝑋 𝐾 𝑟,𝑖
, 𝑋 𝐾 𝑟,𝑖
• The subscription 𝑖 , is the 𝑖 𝑡ℎ
𝑡ℎ entry of the database
• Distance based distortion examples include:
• Euclidean distance
• Hamming distance
• Kullback-Leibler divergence
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Privacy Quantification
• Entropy is used as a measure of information or uncertainty.
• Privacy requires that there is randomness or uncertainty of all the private variables
• 𝑒 ≡
1
𝑛
𝐻 𝑋 𝐾ℎ
| 𝐽 ≥ 𝐸 − 𝜖
• 𝐻(. |. ) is Shannon’s conditional entropy
• X and Y are two random variables with a joint distribution 𝑝 𝑋𝑌
• The conditional entropy 𝐻 𝑋 𝑌 = −(𝑥,𝑦) 𝑝 𝑋𝑌 𝑥, 𝑦 𝑙𝑜𝑔𝑝 𝑋|𝑌(𝑥|𝑦)
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Signal Processing applications of Data Privacy
Categories of database privacy:
• Statistical Data Privacy: which involves guaranteeing privacy of any individual in a
database that is used for statistical information processing (utility).
• Competitive Privacy: which involves information sharing for a common system good
(utility) between competing agents that comprise the system.
• Consumer Privacy: guaranteeing privacy in smart devices.
• Image Classification Privacy: privacy guarantees in biometric identification.
• The FBI to spend US$1 billion on a face recognition to scan surveillance video system.
• Civil rights groups are raising objections about possible privacy violations.
• Privacy preserving algorithms could be employed to find a balance by focusing on criminals only
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Signal Processing applications of Data Privacy
Categories of database privacy:
• Statistical Data Privacy
• Competitive Privacy
• Consumer Privacy
• Image Classification Privacy
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
Database Privacy Categories – Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
Conclusion
• A general overview of the data privacy and utility problem is given.
• Most data privacy implementations center around data perturbation methods.
• Signal processing could be applied to:
• Finding the optimal balance between privacy and utility
• Filtering out unneeded noise during the perturbation process.
• The paper focused much on the data privacy and utility problem.
• The paper offered new quantification approach to the data privacy and utility problem.
• The actual application and implementation of signal processing to data privacy
problems is left to the readers.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy
References
• Sankar, L.; Trappe, W.; Ramchandran, K.; Poor, H.V.; Debbah, M., "The Role of Signal Processing in Meeting
Privacy Challenges: An Overview," Signal Processing Magazine, IEEE , vol.30, no.5, pp.95,106, Sept. 2013,
doi: 10.1109/MSP.2013.2264541
• Mivule, Kato; Turner, Claude, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment,
Using Machine Learning Classification as a Gauge”, Complex Adaptive Systems 2013, Nov 13-15, 2013,
Baltimore, MD, USA, (In Press)
• Mivule, K; Turner, Claude, "A Review of Privacy Essentials for Confidential Mobile Data Transactions",
eprint arXiv:1309.3953, 09/2013, ARXIV, online; http://arxiv.org/pdf/1309.3953v1
• Mivule, Kato, "Utilizing Noise Addition for Data Privacy, an Overview", Proceedings of the International
Conference on Information and Knowledge Engineering (IKE 2012), Pages 65-71, Las Vegas, NV, USA.
Bowie State University Department of Computer Science
Signal Processing and Data Privacy

Más contenido relacionado

La actualidad más candente

BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSBROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSMicah Altman
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventionsdnac
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clusteringidescitation
 
11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving techniqueAlexander Decker
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...IJECEIAES
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveMicah Altman
 
Tacoma, WA 98422
Tacoma, WA 98422Tacoma, WA 98422
Tacoma, WA 98422butest
 
(Icmia 2013) personalized community detection using collaborative similarity ...
(Icmia 2013) personalized community detection using collaborative similarity ...(Icmia 2013) personalized community detection using collaborative similarity ...
(Icmia 2013) personalized community detection using collaborative similarity ...Waqas Nawaz
 
03 Ego Network Analysis
03 Ego Network Analysis03 Ego Network Analysis
03 Ego Network Analysisdnac
 
09 Respondent Driven Sampling and Network Sampling with Memory
09 Respondent Driven Sampling and Network Sampling with Memory09 Respondent Driven Sampling and Network Sampling with Memory
09 Respondent Driven Sampling and Network Sampling with Memorydnac
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacyMicah Altman
 
Scalable Topic-Specific Influence Analysis on Microblogs
Scalable Topic-Specific Influence Analysis on MicroblogsScalable Topic-Specific Influence Analysis on Microblogs
Scalable Topic-Specific Influence Analysis on MicroblogsYuanyuan Tian
 
IRJET- A Survey on Link Prediction Techniques
IRJET-  	  A Survey on Link Prediction TechniquesIRJET-  	  A Survey on Link Prediction Techniques
IRJET- A Survey on Link Prediction TechniquesIRJET Journal
 
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionDeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionWilly Marroquin (WillyDevNET)
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguardsdnac
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects1crore projects
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improvingIJMIT JOURNAL
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 

La actualidad más candente (20)

BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSBROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALS
 
11 Network Experiments and Interventions
11 Network Experiments and Interventions11 Network Experiments and Interventions
11 Network Experiments and Interventions
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
 
11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique11.bio inspired approach as a problem solving technique
11.bio inspired approach as a problem solving technique
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
Tacoma, WA 98422
Tacoma, WA 98422Tacoma, WA 98422
Tacoma, WA 98422
 
(Icmia 2013) personalized community detection using collaborative similarity ...
(Icmia 2013) personalized community detection using collaborative similarity ...(Icmia 2013) personalized community detection using collaborative similarity ...
(Icmia 2013) personalized community detection using collaborative similarity ...
 
03 Ego Network Analysis
03 Ego Network Analysis03 Ego Network Analysis
03 Ego Network Analysis
 
09 Respondent Driven Sampling and Network Sampling with Memory
09 Respondent Driven Sampling and Network Sampling with Memory09 Respondent Driven Sampling and Network Sampling with Memory
09 Respondent Driven Sampling and Network Sampling with Memory
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
 
Scalable Topic-Specific Influence Analysis on Microblogs
Scalable Topic-Specific Influence Analysis on MicroblogsScalable Topic-Specific Influence Analysis on Microblogs
Scalable Topic-Specific Influence Analysis on Microblogs
 
IRJET- A Survey on Link Prediction Techniques
IRJET-  	  A Survey on Link Prediction TechniquesIRJET-  	  A Survey on Link Prediction Techniques
IRJET- A Survey on Link Prediction Techniques
 
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood DetectionDeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 

Destacado

The Role of Natural Language Processing in Information Retrieval
The Role of Natural Language Processing in Information RetrievalThe Role of Natural Language Processing in Information Retrieval
The Role of Natural Language Processing in Information RetrievalTony Russell-Rose
 
India food processing overview
India food processing overviewIndia food processing overview
India food processing overviewYuvraj Kadam
 
Basic supply-chain APMC bhaji market
Basic supply-chain APMC bhaji marketBasic supply-chain APMC bhaji market
Basic supply-chain APMC bhaji marketChetan Kute
 
Food Processing Industry India
Food Processing Industry IndiaFood Processing Industry India
Food Processing Industry IndiaAnkit Agarwal
 
Food processing industry.
Food processing industry.Food processing industry.
Food processing industry.Rachana Tiwari
 

Destacado (6)

The Role of Natural Language Processing in Information Retrieval
The Role of Natural Language Processing in Information RetrievalThe Role of Natural Language Processing in Information Retrieval
The Role of Natural Language Processing in Information Retrieval
 
India food processing overview
India food processing overviewIndia food processing overview
India food processing overview
 
Basic supply-chain APMC bhaji market
Basic supply-chain APMC bhaji marketBasic supply-chain APMC bhaji market
Basic supply-chain APMC bhaji market
 
Indian Food Processing Sector_2016
Indian Food Processing Sector_2016Indian Food Processing Sector_2016
Indian Food Processing Sector_2016
 
Food Processing Industry India
Food Processing Industry IndiaFood Processing Industry India
Food Processing Industry India
 
Food processing industry.
Food processing industry.Food processing industry.
Food processing industry.
 

Similar a Signal Processing and Data Privacy Literature Review

An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion Alket Cecaj
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)Krishnaram Kenthapadi
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...Kato Mivule
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Characterizing Data and Software for Social Science Research
Characterizing Data and Software for Social Science ResearchCharacterizing Data and Software for Social Science Research
Characterizing Data and Software for Social Science ResearchMicah Altman
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Krishnaram Kenthapadi
 
Christoph Barrett - Policy Informatics at Societal Scale
Christoph Barrett - Policy Informatics at Societal ScaleChristoph Barrett - Policy Informatics at Societal Scale
Christoph Barrett - Policy Informatics at Societal ScaleGlobal Risk Forum GRFDavos
 
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...KamleshKumar394
 
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...Krishnaram Kenthapadi
 
Bigdata and Hadoop with applications
Bigdata and Hadoop with applicationsBigdata and Hadoop with applications
Bigdata and Hadoop with applicationsPadma Metta
 

Similar a Signal Processing and Data Privacy Literature Review (20)

An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion Presentation of PhD thesis on Location Data Fusion
Presentation of PhD thesis on Location Data Fusion
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
03 presentation-bothiesson
03 presentation-bothiesson03 presentation-bothiesson
03 presentation-bothiesson
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Characterizing Data and Software for Social Science Research
Characterizing Data and Software for Social Science ResearchCharacterizing Data and Software for Social Science Research
Characterizing Data and Software for Social Science Research
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
 
DBMS
DBMSDBMS
DBMS
 
Christoph Barrett - Policy Informatics at Societal Scale
Christoph Barrett - Policy Informatics at Societal ScaleChristoph Barrett - Policy Informatics at Societal Scale
Christoph Barrett - Policy Informatics at Societal Scale
 
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...
Mining on Relationships in Big Data era using Improve Apriori Algorithm with ...
 
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...
Privacy-preserving Data Mining in Industry: Practical Challenges and Lessons ...
 
Bigdata and Hadoop with applications
Bigdata and Hadoop with applicationsBigdata and Hadoop with applications
Bigdata and Hadoop with applications
 
DOWLD SLIDES.pptx
DOWLD SLIDES.pptxDOWLD SLIDES.pptx
DOWLD SLIDES.pptx
 
NCCT.pptx
NCCT.pptxNCCT.pptx
NCCT.pptx
 

Más de Kato Mivule

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization Kato Mivule
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialKato Mivule
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...Kato Mivule
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Kato Mivule
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Kato Mivule
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in UgandaKato Mivule
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyKato Mivule
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsKato Mivule
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Kato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeKato Mivule
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoostKato Mivule
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierKato Mivule
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...Kato Mivule
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Kato Mivule
 

Más de Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning ClassifierTowards A Differential Privacy Preserving Utility Machine Learning Classifier
Towards A Differential Privacy Preserving Utility Machine Learning Classifier
 
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
A Robust Layered Control System for a Mobile Robot, Rodney A. Brooks; A Softw...
 
Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview Two Pseudo-random Number Generators, an Overview
Two Pseudo-random Number Generators, an Overview
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Signal Processing and Data Privacy Literature Review

  • 1. Signal Processing and Data Privacy Literature Review By Kato Mivule COSC891 Fall 2013 The Role of Signal Processing in Meeting Privacy Challenges: An Overview • Sankar, L.; Trappe, W.; Ramchandran, K.; Poor, H.V.; Debbah, M., "The Role of Signal Processing in Meeting Privacy Challenges: An Overview," Signal Processing Magazine, IEEE , vol.30, no.5, pp.95,106, Sept. 2013, doi: 10.1109/MSP.2013.2264541 Bowie State University Department of Computer Science
  • 2. Introduction: Information Leakage Everywhere • Growth of information technology has made personal data easily available. • This overflow of unconstrained personal data raises privacy concerns. • Yet such data sources have remarkable value (utility) to their users. • This leads to a tension between data privacy and utility needs. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 3. Introduction: Information Leakage Everywhere • Users post information to social networks, unaware of the privacy risks. • Companies use the cloud for data processing unaware of privacy risks. • The data cloud is a risk to “leakage” of private data. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 4. Privacy is differs from Security • Data privacy deals with confidentiality control. • Data security involves the handling of accessibility control. • Data privacy is the procedure of protection against illegal data disclosure. • Data security is the control of data from illegal access. [ 1 2] • To exemplify this fundamental point, a house might be secured with locks to ensure access control; however, bystanders could still look inside the house from a distance if there are no curtains in the windows, thus no privacy even while access is denied to the bystanders. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 5. Privacy differs from Cryptography • Cryptography works as an access control methodology. • Privacy works as a confidentiality control method. • After decryption, a plaintext database is a risk to ‘inside knowledge’ attacks. • After decryption, a plaintext database loses its confidentiality. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 6. Adversaries could be insiders • Every user is a potential adversary. • A database might be secure but vulnerable to confidentiality breaches. • For example a user learning private information by inference. Bowie State University Department of Computer Science Signal Processing and Data Privacy Inference Vulnerabilities – Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
  • 7. Attribute types in statistical databases • Authors: Public attributes and Private attributes. • More on attributes: • PII – Personally Identifiable Information attributes • Quasi attributes • Non-sensitive attributes • Sensitive attributes Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 8. Privacy versus utility – a.k.a. the Utility-Privacy (U-P) tradeoff problem. • Data utility – how beneficial a privatized dataset is to a user. • Data utility (usefulness) diminishes during the data privacy process: • When PII is removed. • When data is perturbed. • Equilibrium between data privacy and utility needs is an intractable problem. • “Perfect privacy can be achieved by publishing nothing at all, but this has no utility; perfect utility can be obtained by publishing the data exactly as received, but this offers no privacy” Dwork (2006) Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 9. Types of Privacy • Database privacy • Consumer privacy • Competitive privacy Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 10. Data Privacy Mechanisms Author: k-anonymity and Differential privacy • Non-perturbative methods: original data values are not modified. • k-anonymity • l-diversity • Suppression • Generalization • Perturbative methods: original data values are transformed. • Noise addition • Multiplicative noise • Logarithmic noise • Differential privacy Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 11. Data Privacy Mechanisms • Non-perturbative methods: original data values are not modified. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 12. Data Privacy Mechanisms – Perturbation methods – data values modified • Noise addition: random values are added to sensitive numerical attribute values to ensure privacy. The general expression is: • 𝑋 + 𝜀 = 𝑍 • X is the original continuous dataset and ɛ is the set of random values (noise) with a distribution 𝑒~𝑁 0, 𝜎2 that is added to X, and finally Z is the privatized dataset. • Multiplicative noise: random values with mean µ= 1 and variance 𝜎2, is multiplied to the original values. The general expression is: • 𝑋𝑗 𝜀𝑗 = 𝑌𝑗 • Logarithmic noise: a logarithmic adjustment of the original values is done: • 𝑙𝑛𝑋𝑗 = 𝑌𝑗 • Random values 𝜀𝑗 are then created and added the logarithmic values, 𝑌𝑗, producing the privatized values 𝑍𝑗 as shown below: • 𝑌𝑗 + 𝜀𝑗 = 𝑍𝑗 Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 13. Data Privacy Mechanisms – Perturbation methods – data values modified Differential Privacy (DP): • DP is enforced by adding Laplace noise to query results from the database. • With DP, the users of the database cannot discern if an item has been changed in that database. • A DP mechanism satisfies the following criteria: • 𝑃[𝑞 𝑛(𝐷1)∈𝑅] 𝑃[𝑞 𝑛 𝐷2 ∈𝑅] ≤ 𝑒 𝜀 • Laplace noise between (0, b) is generated and added to f(x), the original query response, such that: • 𝑏 = ∆𝑓 𝜀 • The max difference is calculated, ∆𝑓 is the max difference (most influential observation): • ∆𝑓 = 𝑀𝑎𝑥 𝑓 𝐷1 − 𝑓 𝐷2 • Finally, 𝐷𝑖𝑓𝑓𝑒𝑟𝑒𝑛𝑡𝑖𝑎𝑙 𝑝𝑟𝑖𝑣𝑎𝑡𝑒 𝑑𝑎𝑡𝑎 = 𝑓 𝑥 + 𝐿𝑎𝑝𝑙𝑎𝑐𝑒(0, 𝑏) Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 14. Utility-Privacy(U-P) Trade-off • Data sanitization is concerned with: • The statistics of the output that achieve a desired level of utility and privacy • Deciding which input values to perturb. • How to probabilistically perturb values. • The U-P tradeoff framework requires the following three components: • A (statistical) model for the data • Measures for privacy and utility • A method to formalize the mappings from 𝑋 to 𝑋 Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 15. Utility-Privacy(U-P) Trade-off • Data sanitization is concerned with: • The statistics of the output that achieve a desired level of utility and privacy • Deciding which input values to perturb. • How to probabilistically perturb values. Bowie State University Department of Computer Science Signal Processing and Data Privacy Tension between Privacy and utility - Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
  • 16. Data Utility Measure • Utility captures how close the revealed database is to the original. • A possible measure for the utility u is the requirement that the average distortion of the public variables is upper bounded, for each 𝜀 > 0, and all sufficiently large n: 𝑢 ≡ 𝐸 1 𝑛 𝑝 𝑛 𝑖=1 𝑋 𝐾 𝑟,𝑖 , 𝑋 𝐾 𝑟,𝑖 ≤ 𝐷 + 𝜖 • p . , . is the distortion function • 𝐸 is the expectation over the joint distribution 𝑋 𝐾 𝑟,𝑖 , 𝑋 𝐾 𝑟,𝑖 • The subscription 𝑖 , is the 𝑖 𝑡ℎ 𝑡ℎ entry of the database • Distance based distortion examples include: • Euclidean distance • Hamming distance • Kullback-Leibler divergence Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 17. Privacy Quantification • Entropy is used as a measure of information or uncertainty. • Privacy requires that there is randomness or uncertainty of all the private variables • 𝑒 ≡ 1 𝑛 𝐻 𝑋 𝐾ℎ | 𝐽 ≥ 𝐸 − 𝜖 • 𝐻(. |. ) is Shannon’s conditional entropy • X and Y are two random variables with a joint distribution 𝑝 𝑋𝑌 • The conditional entropy 𝐻 𝑋 𝑌 = −(𝑥,𝑦) 𝑝 𝑋𝑌 𝑥, 𝑦 𝑙𝑜𝑔𝑝 𝑋|𝑌(𝑥|𝑦) Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 18. Signal Processing applications of Data Privacy Categories of database privacy: • Statistical Data Privacy: which involves guaranteeing privacy of any individual in a database that is used for statistical information processing (utility). • Competitive Privacy: which involves information sharing for a common system good (utility) between competing agents that comprise the system. • Consumer Privacy: guaranteeing privacy in smart devices. • Image Classification Privacy: privacy guarantees in biometric identification. • The FBI to spend US$1 billion on a face recognition to scan surveillance video system. • Civil rights groups are raising objections about possible privacy violations. • Privacy preserving algorithms could be employed to find a balance by focusing on criminals only Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 19. Signal Processing applications of Data Privacy Categories of database privacy: • Statistical Data Privacy • Competitive Privacy • Consumer Privacy • Image Classification Privacy Bowie State University Department of Computer Science Signal Processing and Data Privacy Database Privacy Categories – Image Source: Sankar, Trappe, Ramchandran, Poor, Debbah (2013)
  • 20. Conclusion • A general overview of the data privacy and utility problem is given. • Most data privacy implementations center around data perturbation methods. • Signal processing could be applied to: • Finding the optimal balance between privacy and utility • Filtering out unneeded noise during the perturbation process. • The paper focused much on the data privacy and utility problem. • The paper offered new quantification approach to the data privacy and utility problem. • The actual application and implementation of signal processing to data privacy problems is left to the readers. Bowie State University Department of Computer Science Signal Processing and Data Privacy
  • 21. References • Sankar, L.; Trappe, W.; Ramchandran, K.; Poor, H.V.; Debbah, M., "The Role of Signal Processing in Meeting Privacy Challenges: An Overview," Signal Processing Magazine, IEEE , vol.30, no.5, pp.95,106, Sept. 2013, doi: 10.1109/MSP.2013.2264541 • Mivule, Kato; Turner, Claude, “A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge”, Complex Adaptive Systems 2013, Nov 13-15, 2013, Baltimore, MD, USA, (In Press) • Mivule, K; Turner, Claude, "A Review of Privacy Essentials for Confidential Mobile Data Transactions", eprint arXiv:1309.3953, 09/2013, ARXIV, online; http://arxiv.org/pdf/1309.3953v1 • Mivule, Kato, "Utilizing Noise Addition for Data Privacy, an Overview", Proceedings of the International Conference on Information and Knowledge Engineering (IKE 2012), Pages 65-71, Las Vegas, NV, USA. Bowie State University Department of Computer Science Signal Processing and Data Privacy