European Union regulations on algorithmic decision making and a “right to explanation”

European Union regulations on algorithmic decision-making and a “right to explanation” Goodman & Flaxman, 2016 In just over a year, the General Data Protection Regulation (GDPR) becomes law in European member states. This paper focuses on just one particular aspect of the new law, article 22, as it relates to profiling, non-discrimination, and the right … Continue reading European Union regulations on algorithmic decision making and a “right to explanation”

Generic attacks on secure outsourced databases

Generic Attacks on Secure Outsourced Databases Kellaris et al. CCS 2016 Here’s a really interesting paper that helps to set some boundaries around what we can expect from encrypted databases in the cloud. Independently of the details of any one system (or encryption scheme), the authors look at what data it is possible to recover … Continue reading Generic attacks on secure outsourced databases

A Bayesian approach to graphical record linkage and de-duplication

A Bayesian approach to graphical record linkage and de-duplication Steorts et al. AISTATS, 2014 I don't normally cover papers from statistics conferences and journals, but this one caught my eye as addressing a high-value problem. Through a different lens, it also shows some of the challenges in maintaining privacy when it is possible to join … Continue reading A Bayesian approach to graphical record linkage and de-duplication

BlindBox: Deep packet inspection over encrypted traffic

BlindBox: Deep packet inspection over encrypted traffic Sherry et al. SIGCOMM 2015 This is the final paper from the inaugural Research for Practice selections, and the third of Justine Sherry's three picks. The fundamental problem addressed is the same as we looked at yesterday: how do you accommodate middleboxes in HTTPS traffic? More specifically, this … Continue reading BlindBox: Deep packet inspection over encrypted traffic

Scalable and private media consumption with Popcorn

Scalable and private media consumption with Popcorn - Gupta et al. 2016 What price can we put on privacy? For streaming media consumption (think Netflix) in which you have complete privacy concerning the media you are watching (i.e., not even the service provider knows - how is this even possible? We'll get to that...), it … Continue reading Scalable and private media consumption with Popcorn

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds - Wang et al. 2016 Who owns your data? With cloud services, 'your' data is typically spread across multiple walled gardens, one per service. I'm reminded of a great line from "On the duality of resilience and privacy:" It is a truth universally acknowledged … Continue reading Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy - Downlin et al. 2016 Fixed misspellings of homomorphic ! With the rise of machine learning, it's easy to imagine all sorts of cloud services that can process your data and make predictions of some kind (Machine Learning as a Service - MLAS). … Continue reading CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy

Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis

Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis - van den Hooff, Lazar, et al. 2015 Many users would like their communications over the Internet to be private, and for some, such as reporters, lawyers, or whistleblowers, privacy is of paramount concern... Recently, officials at the NSA have even stated that “if you have enough … Continue reading Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis

Efficient Algorithms for Public-Private Social Networks

Efficient Algorithms for Public-Private Social Networks - Chierichetti et al. 2015 Today's choice won a best paper award at KDD'15. The authors examine a number of algorithms for computing graph (network) measures in the context of social networks that enable private groups and connections. These are characterised by a large public graph G=(V,E), and for … Continue reading Efficient Algorithms for Public-Private Social Networks

Bloom Cookies: web search personalization without user tracking

Bloom Cookies: Web search personalization without user tracking - Mor et al. 2015 After yesterday's homomorphic encryption-based paper it's a relief to read a privacy paper I can follow from end to end! Online services track us as much as they can get away with, in order to offer personalized services (including the 'service' of … Continue reading Bloom Cookies: web search personalization without user tracking