Skip to main content

Selected Privacy Research Topics in the ARES Project: An Overview

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 567))

Abstract

This chapter gives an overview of some of the data privacy research carried out by the team at Universitat Rovira i Virgili within the ARES project. Topics reviewed include query profile privacy, location privacy, differential privacy and anti-discrimination.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    However, using the Torbutton browser add-on helps eliminating cookings and allows using Tor to protect the query history of a user.

References

  1. Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: 24th International Conference on Data Engineering, pp. 376–385 (2008)

    Google Scholar 

  2. Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8), 884–910 (2010)

    Article  Google Scholar 

  3. Bras-Amorós, M., Domingo-Ferrer, J., Stokes, K.: Configuraciones combinatóricas y recuperación privada de información por pares. In: Nuevos Avances en Criptografía y Codificación de la Información (2009)

    Google Scholar 

  4. Bras-Amorós, M., Stokes, K.: The semigroup of combinatorial configurations. Semigroup Forum 84(1), 91–96 (2011)

    Article  Google Scholar 

  5. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science, pp. 41–50 (1995)

    Google Scholar 

  6. Chor, B., Gilboa, N., Naor, M.: Private Information Retrieval by keywords. Technical Report TR CS0917. Departament of computer Science, Technion (1997)

    Google Scholar 

  7. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM 45, 965–981 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  8. Castellà, D., Romero-Tris, C., Viejo, A., Castellà-Roca, J., Solsona, F., Giné, F.: Diseño de una red P2P optimizada para la privatización de consultas en WSEs. In: XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 273–278 (2012)

    Google Scholar 

  9. Castellà-Roca, J., Viejo, A., Herrera-Joancomartí, J.: Preserving users’ privacy in web search engines. Comput. Commun. 32(13), 1541–1551 (2009)

    Article  Google Scholar 

  10. Domingo-Ferrer, J., Bras-Amorós, M.: Peer-to-peer private information retrieval. In: PSD 2008. LNCS, vol. 5262, pp. 315–323 (2008)

    Google Scholar 

  11. Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a Peer-to-Peer community. Data Knowl. Eng. 68(11), 1237–1252 (2009)

    Article  Google Scholar 

  12. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference. LNCS, vol. 3876, pp. 265–284. Springer, New York (2006)

    Google Scholar 

  13. Dwork, C.: Differential privacy. In: Automata, Languages and Programming. LNCS, vol. 4052, pp. 1–12. Springer, New York (2006)

    Google Scholar 

  14. Domingo-Ferrer, J., Sramka, M., Trujillo, R.: Privacy preserving Publication of Trajectories using microaggregation. In: 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (2010)

    Google Scholar 

  15. Domingo-Ferrer, J., Solanas, A., Castellà-Roca, J.: \(h(k)\)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Rev. 33(4), 720–744 (2009)

    Article  Google Scholar 

  16. Domingo-Ferrer, J., Trujillo-Rasua, R.: Microaggregation- and permutation-based anonymization of movement data. Inf. Sci. 208, 55–80 (2012)

    Article  Google Scholar 

  17. Erola, A., Castellà-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs. In: PSD 2010. LNCS, vol. 6344, pp. 127–137 (2010)

    Google Scholar 

  18. Erola, A., Castellà-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs using the open directory project. SORT-Statistics and Operations Research Transactions, pp. 41–58, Special issue (2011)

    Google Scholar 

  19. Erola, A., Castellà-Roca, J., Viejo, A., Mateo-Sanz, J.M.: Exploting social networks to provide privacy in personalized web search. J. Syst. Soft. 84(10), 1734–1745 (2011)

    Article  Google Scholar 

  20. Hajian, S., Domingo-Ferrer, J., Martínez-Ballesté, A.: Discrimination prevention in data mining for intrusion and crime detection. In: IEEE Symposium Series in Computational Intelligence in Cyber Security (2011)

    Google Scholar 

  21. Hajian, S., Domingo-Ferrer, J., Martínez-Ballesté, A.: Rule protection for indirect discrimination prevention in data mining. In: MDAI 2011. LNCS, vol. 6820, pp. 211–222 (2011)

    Google Scholar 

  22. Hajian, S., Domingo-Ferrer, J.: A methodology for direct and indirect discrimination prevention in data mining. IEEE Trans. Knowl. Data Eng. 25(7), 1445–1459 (2013)

    Article  Google Scholar 

  23. Howe, D.C., Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Kerr, I., Lucock, C., Steeves, V. (eds.) Lessons from the Identity Trail: Privacy, Anonymity and Identity in a Networked Society, pp. 409–428. Oxford University Press, Oxford UK (2009)

    Google Scholar 

  24. Jones, R., Kumar, R., Pang, B., Tomkins, A.: I know what you did last summer: query logs and user privacy. In: Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management, pp. 909–914 (2007)

    Google Scholar 

  25. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: Wireless Communications and Networking Conference-WCNC 2005, vol. 2, pp. 1200–1205 (2005)

    Google Scholar 

  26. Navarro-Arribas, G., Torra, V., Erola, A., Castellà-Roca, J.: User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manage. 48(3), 476–487 (2012)

    Article  Google Scholar 

  27. Pérez-Martínez, P.A., Solanas, A.: Location privacy through users’ collaboration: a distributed pseudonymizer. In: Third International Conference on Mobile Ubiquitous Computing, Systems. Services and Technologies (2009)

    Google Scholar 

  28. Romero-Tris, C., Castellà-Roca, J., Viejo, A.: Multi-party private web search with untrusted partners. In: 7th International Conference on Security and Privacy in Communication Networks (2011)

    Google Scholar 

  29. Romero-Tris, C., Viejo, A., Castellà-Roca, J.: Improving query delay in private web search. In: International Workshop on Securing Information in Distributed Environments and Ubiquitous Systems (2011)

    Google Scholar 

  30. Soria-Comas, J., Domingo-Ferrer, J.: Sensitivity-independent differential privacy via prior knowledge refinement. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 20(6), 855–876 (2012)

    Article  MathSciNet  Google Scholar 

  31. Soria-Comas, J., Domingo-Ferrer, J.: Optimal data-independent noise for differential privacy. Inf. Sci. 250, 200–214 (2013)

    Article  MathSciNet  Google Scholar 

  32. Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., Martínez, S.: Improving the utility of differentially private data releases via k-anonymity. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)

    Google Scholar 

  33. Soria-Comas, J., Domingo-Ferrer, J.: Differential privacy via t-closeness in data publishing. In: 11th Annual Conference on Privacy, Security and Trust, pp. 27–35 (2013)

    Google Scholar 

  34. Stinson, D.R.: Combinatorial designs: constructions and analysis. SIGACT News 39(4), 17–21 (2008)

    Article  MathSciNet  Google Scholar 

  35. Solanas, A., Martínez-Ballesté, A.: Privacy protection in location-based services through a public-key privacy homomorphism. In: Euro PKI 2007. LNCS, vol. 4582, pp. 362–368 (2007)

    Google Scholar 

  36. Solanas, A., Martínez-Ballesté, A.: A TTP-free protocol for location privacy in location-based services. Comput. Commun. 31(6), 1181–1191 (2008)

    Article  Google Scholar 

  37. Stokes, K., Bras-Amorós, M.: Optimal configurations for Peer-to-Peer user-private information retrieval. Comput. Math. Appl. 59(4), 1568–1577 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  38. Stokes, K., Bras-Amorós, M.: Associating a numerical semigroup to the triangle-free configurations. Adv. Math. Commun. 5(2), 351–371 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  39. Stokes, K., Farràs, O.: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search. Des. Codes Crypt. 71, 503–524 (2014)

    Article  MATH  Google Scholar 

  40. Trujillo, R., Domingo-Ferrer, J.: On the privacy offered by k-d-anonymity. Inf. Syst. 38(4), 491–494 (2013)

    Article  Google Scholar 

  41. Viejo, A., Castellà-Roca, J.: Using social networks to distort users’ profiles generated by web search engines. Comput. Netw. 54(9), 1343–1357 (2010)

    Article  MATH  Google Scholar 

  42. AOL Search Data Scandal. http://en.wikipedia.org/wiki/AOL_search_data_leak. Accessed Aug 2006

  43. ODP. Open directory project. http://www.dmoz.org/

  44. The Tor Project Inc: Tor: Overview. http://torproject.org/overview.html.en

Download references

Acknowledgments

The second author is partially supported by the Government of Catalonia through an ICREA Acadèmia Prize. The following partial supports are also gratefully acknowledged: the Spanish Government under projects CONSOLIDER INGENIO 2010 CSD2007-00004 “ARES” and TIN2011-27076-C03-01 “CO-PRIVACY”, and the European Commission under FP7 projects “DwB” and “Inter-Trust”. The second author is with the UNESCO Chair in Data Privacy, but the views expressed in this chapter neither necessarily reflect the position of UNESCO nor commit that organization.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jesús A. Manjón .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Manjón, J.A., Domingo-Ferrer, J. (2015). Selected Privacy Research Topics in the ARES Project: An Overview. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09885-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09884-5

  • Online ISBN: 978-3-319-09885-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics