Privacy analytics

People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Neither the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed -- and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential. In this editorial we briefly discuss work in this area, the challenges still faced, and some potential avenues for addressing them.

[1]  B. Malin,et al.  Anonymization of electronic medical records for validating genome-wide association studies , 2010, Proceedings of the National Academy of Sciences.

[2]  Tyrone Grandison,et al.  Compliance with data protection laws using Hippocratic Database active enforcement and auditing , 2007, IBM Syst. J..

[3]  Balachander Krishnamurthy,et al.  For sale : your data: by : you , 2011, HotNets-X.

[4]  Graham Greenleaf,et al.  Global Data Privacy in a Networked World , 2011 .

[5]  Avanidhar Subrahmanyam,et al.  The Value of Private Information , 2005 .

[6]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[7]  Douwe Korff,et al.  Using NHS Patient Data for Research Without Consent , 2010 .

[8]  Sushil Jajodia,et al.  Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.

[9]  Jules Polonetsky,et al.  To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .

[10]  Adam J. Lee,et al.  Secured histories: computing group statistics on encrypted data while preserving individual privacy , 2010, ArXiv.

[11]  Jon Crowcroft,et al.  The case for crowd computing , 2010, MobiHeld '10.

[12]  Anne Adams,et al.  Privacy in Multimedia Communications: Protecting Users, Not Just Data , 2001, BCS HCI/IHM.

[13]  Claude Castelluccia,et al.  I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.

[14]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[15]  Jon Crowcroft,et al.  EpiMap: towards quantifying contact networks and modelling the spread of infections in developing countries , 2011, ACWR '11.

[16]  Saikat Guha,et al.  Serving Ads from localhost for Performance, Privacy, and Profit , 2009, HotNets.

[17]  Aaron Roth,et al.  Selling privacy at auction , 2010, EC '11.

[18]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[19]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[20]  Derek McAuley,et al.  The Dataware manifesto , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[21]  Ian Brown,et al.  Security against compelled disclosure , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[22]  Hamed Haddadi,et al.  MobiAd: private and scalable mobile advertising , 2010, MobiArch '10.

[23]  Carmela Troncoso,et al.  On the Impact of Social Network Profiling on Anonymity , 2008, Privacy Enhancing Technologies.

[24]  Haixu Tang,et al.  Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.

[25]  Ratul Mahajan,et al.  Differentially-private network trace analysis , 2010, SIGCOMM '10.