Security with Privacy-Opportunities and Challenges

this paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel. Keywords—cyber security; information privacy; privacypreserving data analytics

[1]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[2]  Elisa Bertino,et al.  Data Protection from Insider Threats , 2012, Data Protection from Insider Threats.

[3]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[4]  Chris Clifton,et al.  Privacy-Preserving Data Mining , 2006, Encyclopedia of Database Systems.

[5]  Elisa Bertino,et al.  Privacy Preserving Biometrics-Based and User Centric Authentication Protocol , 2014, NSS.

[6]  Elisa Bertino,et al.  Efficient privacy-aware record integration , 2013, EDBT '13.

[7]  Elisa Bertino,et al.  Privacy preserving schema and data matching , 2007, SIGMOD '07.

[8]  Dongxi Liu,et al.  Privacy of outsourced k-means clustering , 2014, AsiaCCS.

[9]  Kartik Nayak,et al.  Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..

[10]  Elisa Bertino,et al.  Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.