Universität Passau
5881V Vorlesung: Privacy Enhancing Techniques - Kurzinfo

Grunddaten

Zeit / Veranstaltungsort
Montag: 12:00 - 16:00, wöchentlich (ab 22.10.2018), Ort: (ITZ) SR 001
Termine am Montag. 11.02. 10:30 - 17:00, Montag. 25.03. 10:00 - 16:00, Ort: (ITZ) R 010
Nächster Termin
Mo , 17.12.2018 12:00 - 16:00, Ort: (ITZ) SR 001
Lehrende
Dr. Jorge Cuellar, Prof. Dr. Joachim Posegga

news Ankündigungen

news IMPORTANT: Topics and Dates for Presentations (Complete), updated, 12.11.18

Lecture: 5881V Privacy Enhancing Techniques: Topics and Literature for Presentations
Wintersemester 2018/2019

Instructions:
- Each Topic has a number T-01 to T-20
- Each Topic has up to 3 Groups G1, G2, G3
- Each pair (T-xx,Gy) has a Date for presentation and an article (*or two, or three*) to be presented (see the "**" just above the (T-xx,Gy).

Dates:
 D-1 Mo 22.10.2018
 D-2 Mo 29.10.2018
 D-3 Mo 12.11.2018
 D-4 Mo 19.11.2018
 D-5 Mo 03.12.2018
 D-6 Mo 17.12.2018
 D-7 Mo 14.01.2019
 D-8 Mo 28.01.2019

Assignment of topics to groups for presentation (T=Topic, G= GroupNr):
* T-01-Block-Chain-Methods
** Dorri, Ali, et al.
Blockchain for IoT security and privacy: The case study of a smart home
Pervasive Computing and Communications Workshops (PerCom Workshops) IEEE, 2017.
and
A. Dorri, S. S. Kanhere, and R. Jurdak
Blockchain in internet of things: Challenges and solutions arXiv preprint arXiv:1608.05187, 2016
| T-01 G1 | D-8 | 90317 |
| T-01 G1 | D-8 | 90060 |
** TBD
| T-01 G2 | D-8 | 96530 |
* T-02-Blind-Signatures:
** http://www.notablesoftware.com/Papers/Chaum%20Secret%20Ballot%20Receipts.pdf
| T-02 G1 | D-3 | 82790 |
| T-02 G1 | D-3 | 86503 |
** Chaum-D: Security-without-identification-Transaction-systems-to-make-big brother obsolete: CACM 28(10) 1985
| T-02 G2 | D-4 | 90072 |
* T-03-Declarative-Policies
** Karsten Martiny, Daniel Elenius, Grit Denker:
Protecting Privacy with a Declarative Policy Framework, 2018 12th IEEE International Conference on Semantic Computing
| T-03 G1 | D-8 | 87619 |
| T-03 G1 | D-8 | 87643 |
* T-04-eToll
** Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System
| T-04 G1 | D-5 | 82140 |
| T-04 G1 | D-5 | 86792 |
** Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens
PrETP: Privacy-Preserving Electronic Toll Pricing
| T-04 G2 | D-7 | 67169 |
| T-04 G2 | D-7 | 68393 |
* T-05-IoT-Priv
** Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner
Security and privacy challenges in industrial internet of things
Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE. IEEE, 2015.
*OR*
Claude Castelluccia, Mathieu Cunche, Daniel Le Metayer, Victor Morel
Enhancing Transparency and Consent in the IoT
| T-05 G1 | D-3 | (82745) |
| T-05 G1 | D-3 | 82721 |
** S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini
Security, privacy and trust in Internet of Things: The road ahead
Computer Networks 76 (2015) 146-164
In particular, Section 3. Privacy in IoT (+conlusions, etc)
| T-05 G2 | D-5 | 82250 |
| T-05 G2 | D-5 | 82836 |
** Chao Li and Balaji Palanisamy
Privacy in Internet of Things: from Principles to Technologies
| T-05 G3 | D-8 | 82173 |
| T-05 G3 | D-8 | 82103 |
* T-06-k-anonymity-l-diversity-t-closedness
** t-Closeness: Privacy Beyond k-Anonymity and `-Diversity
Ninghui Li Tiancheng Li, Suresh Venkatasubramanian
| T-06 G1 | D-6 | 89020 |
| T-06 G1 | D-6 | 87632 |
* T-07-Legal
** DANIEL J. SOLOVE: A TAXONOMY OF PRIVACY, University of Pennsylvania Law Review, Jan 06
| T-07 G1 | D-3 | 82789 |
| T-07 G1 | D-3 | 86555 |
* T-08-Managing-PETs
** Ashley, Paul, Calvin Powers, and Matthias Schunter
From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise
Proceedings of the 2002 workshop on New security paradigms. ACM, 2002
and
By Annie I. Anton, Elisa Bertino, Ninghui Li, Ting Yu
A Roadmap For Comprehensive Online Privacy Policy Management
Communications of the ACM, July 2007, Vol. 50 No. 7, Pages 109-116
| T-08 G1 | D-7 | 87648 |
| T-08 G1 | D-7 | 87546 |
* T-09-Practical-PETs
** Jan Hajny, Lukas Malina and Petr Dzurenda
Practical Privacy-Enhancing Technologies, TSP 2015 IEEE
| T-09 G1 | D-6 | 79204 |
| T-09 G1 | D-6 | 78495 |
* T-11-Priv-via-SMC
** Marcel von Maltitz, Stefan Smarzly, Holger Kinkelin and Georg Carle
A Management Framework for Secure Multiparty Computation
https://arxiv.org/pdf/1804.03918
| T-11 G1 | D-8 | 86890 |
* T-12-pseudonyms-linking-revoking
** Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil,
Jefferson E. Ricardini, Leonardo T. D. Ferraz, and Marcos Vinicius M. Silva
Privacy-preserving method for temporarily linking/revoking pseudonym certificates in VANETs
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
| T-12 G1 | D-7 | 89633 |
| T-12 G1 | D-7 | 90580 |

** David Eckhoff, Falko Dresslery and Christoph Sommer
SmartRevoc: An Efficient and Privacy Preserving Revocation System Using Parked Vehicles
8th Annual IEEE Conference on Local Computer Networks
| T-12 G2 | D-8 | 64738 |
* T-13-Simple-Oblivious-Transfer-Simple-PIR changed to Mental Poker
** Philippe Golle: Dealing Cards in Poker Games
http://crypto.stanford.edu/~pgolle/papers/poker.pdf
| T-13 G1 | D-6 | 90543 | 
| T-13 G1 | D-6 | 90742 | 

* T-14-Smart-City
** David Eckhoff and Isabel Wagner
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1
Privacy in the Smart City - Applications, Technologies, Challenges, and Solutions
| T-14 G1 | D-4 | 87055 |
| T-14 G1 | D-4 | 87263 |
** Bartoli, A., et al.
Security and privacy in your smart city
Proceedings of the Barcelona smart cities congress. Vol. 292. 2011.
| T-14 G2 | D-6 | 63055 |
| T-14 G2 | D-6 | 80970 |
** Martínez-Ballesté, Antoni, Pablo A. Pérez-Martínez, and Agusti Solanas
The pursuit of citizens' privacy: a privacy-aware smart city is possible
IEEE Communications Magazine 51.6 (2013): 136-141.
and
Mulligan, Catherine EA, and Magnus Olsson
Architectural implications of smart city business models: An evolutionary perspective
IEEE Communications Magazine 51.6 (2013): 80-85.
| T-14 G3 | D-7 | 87572 |
* T-15-smart-metering
** Gunther Eibl, Dominik Engel and Christian Neureiter
Privacy-Relevant Smart Metering Use Cases
| T-15 G1 | D-4 | 73490 |
| T-15 G1 | D-4 | 72154 |
** Rial, Alfredo, and George Danezis
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. ACM, 2011.
| T-15 G2 | D-7 | 86794 |
| T-15 G2 | D-7 | 86577 |
* T-16-source-location-privacy-in-WLAN
** Rios, Ruben, Jorge Cuellar, and Javier Lopez. "Probabilistic receiver-location privacy protection in wireless sensor networks." Information Sciences 321 (2015): 205-223.
and
Rios, Ruben, Jorge Cuellar, and Javier Lopez
Robust probabilistic fake packet injection for receiver-location privacy in wsn European Symposium on Research in Computer Security. Springer, Berlin, Heidelberg, 2012
| T-16 G1 | D-8 | 86844 |
| T-16 G2 | D-8 | 86567 |
* T-17-Trusted-Computing-and-Priv
** Davidson, Susan B., et al.
On provenance and privacy
Proceedings of the 14th International Conference on Database Theory. ACM, 2011.
| T-17 G1 | D-7 | 87501 |
| T-17 G1 | D-7 | 86456 |
* T-18-Vehicular-NWs
** Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh and Yuzhe Tang
Location Privacy with Road network Mix-zones
https://ieeexplore.ieee.org/document/6516475
and
Pathrose, Anju, and T. Poornima. Location Privacy using Traffic-Aware Mix zones in Vehicular or Mobile Networks. International Journal Of Engineering And Computer Science 3.05 (2014).
and
Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha
Poovendran, AMOEBA: Robust Location Privacy
Scheme for VANET, IEEE JOURNAL ON SELECTED AREAS IN
COMMUNICATIONS, vol. 25, no. 8, october 2007

| T-18 G1 | D-5 | 73625 |
| T-18 G1 | D-5 | 73235 |
* T-20-wearables
** Byron Lowens, Vivian Genaro Motti, Kelly Caine
Wearable Privacy: Skeletons in The Data Closet
2017 IEEE International Conference on Healthcare Informatics
| T-20 G1 | D-4 | 82012 |
** Roberto Hoyley Robert Templemany Denise Anthonyz David Crandally Apu Kapadia
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras, CHI 2015, April 18 - 23, 2015
and (same authors)
Privacy Behaviors of Lifeloggers using Wearable Cameras, Ubicomp 14, September 13-17 2014, Seattle
| T-20 G2 | D-4 | 86633 |
| T-20 G2 | D-4 | 86686 |
** Das, Aveek K, Pathak, Parth H., Chuah, Chen-Nee
Uncovering Privacy Leakage in BLE Network Traffic ofWearable Fitness Trackers
https://escholarship.org/uc/item/52h8734r
| T-20 G3 | D-5 | 86457 |
| T-20 G3 | D-5 | 85150 |
 

news Dates of presentations

T= Topic, (for topics see below), G = Group , D = Date Nr

Dates:
 D-1 Mo 22.10.2018
 D-2 Mo 29.10.2018
 D-3 Mo 12.11.2018
 D-4 Mo 19.11.2018
 D-5 Mo 03.12.2018
 D-6 Mo 17.12.2018
 D-7 Mo 14.01.2019
 D-8 Mo 28.01.2019

|-----+---------+---------|
| D-3 | T-02 G1 |   82790 |
| D-3 | T-02 G1 |   86503 |
| D-3 | T-05 G1 |   82721 |
| D-3 | T-05 G1 | (82745) |
| D-3 | T-07 G1 |   82789 |
| D-3 | T-07 G1 |   86555 |
|-----+---------+---------|
| D-4 | T-02 G2 |   90072 |
| D-4 | T-14 G1 |   87055 |
| D-4 | T-14 G1 |   87263 |
| D-4 | T-15 G1 |   72154 |
| D-4 | T-15 G1 |   73490 |
| D-4 | T-20 G1 |   82012 |
| D-4 | T-20 G2 |   86633 |
| D-4 | T-20 G2 |   86686 |
|-----+---------+---------|
| D-5 | T-04 G1 |   82140 |
| D-5 | T-04 G1 |   86792 |
| D-5 | T-05 G2 |   82250 |
| D-5 | T-05 G2 |   82836 |
| D-5 | T-18 G1 |   73235 |
| D-5 | T-18 G1 |   73625 |
| D-5 | T-20 G3 |   85150 |
| D-5 | T-20 G3 |   86457 |
|-----+---------+---------|
| D-6 | T-06 G1 |   87632 |
| D-6 | T-06 G1 |   89020 |
| D-6 | T-09 G1 |   78495 |
| D-6 | T-09 G1 |   79204 |
| D-6 | T-13 G1 |   90543 |
| D-6 | T-13 G1 |   90742 |
| D-6 | T-14 G2 |   63055 |
| D-6 | T-14 G2 |   80970 |
|-----+---------+---------|
| D-7 | T-15 G2 |   86577 |
| D-7 | T-15 G2 |   86794 |
| D-7 | T-04 G2 |   67169 |
| D-7 | T-04 G2 |   68393 |
| D-7 | T-08 G1 |   87546 |
| D-7 | T-08 G1 |   87648 |
| D-7 | T-12 G1 |   89633 |
| D-7 | T-12 G1 |   90580 |
| D-7 | T-14 G3 |   87572 |
| D-7 | T-17 G1 |   86456 |
| D-7 | T-17 G1 |   87501 |
|-----+---------+---------|
| D-8 | T-01 G1 |   90060 |
| D-8 | T-01 G1 |   90317 |
| D-8 | T-01 G2 |   96530 |
| D-8 | T-03 G1 |   87619 |
| D-8 | T-03 G1 |   87643 |
| D-8 | T-05 G3 |   82103 |
| D-8 | T-05 G3 |   82173 |
| D-8 | T-11 G1 |   86890 |
| D-8 | T-12 G2 |   64738 |
| D-8 | T-16 G1 |   86844 |
| D-8 | T-16 G2 |   86567 |
|-----+---------+---------|

T-01-Block-Chain-Methods
T-02-Blind-Signatures:   soon!
T-03-Declarative-Policies
T-04-eToll
T-05-IoT-Priv
T-06-k-anonymity-l-diversity-t-closedness
T-07-Legal
T-08-Managing-PETs
T-09-Practical-PETs
T-10-Privacy-Paradox
T-11-Priv-via-SMC
T-12-pseudonyms-linking-revoking
T-13-Simple-Oblivious-Transfer-Simple-PIR
T-14-Smart-City
T-15-smart-metering
T-16-source-location-privacy-in-WLAN
T-17-Trusted-Computing-and-Priv
T-18-Vehicular-NWs
T-19-Voting
T-20-wearables

For any comments/problems/questions/requests contact me at:
jorge.cuellar__at__siemens.com with subject: "PET Course Presentation"

news List of Topics for Presentations

This is the list of topics for presentations.  On most of the topics there is enough material (literature) for several presentations.  Each student must choose a topic, and if there are too many students, the presentations will be done in groups.  In that case, student must find a group.
01-Block-Chain-Methods
02-Blind-Signatures
03-Declarative-Policies
04-eToll
05-IoT-Priv
06-k-anonymity-l-diversity-t-closedness
07-Legal
08-Managing-PETs
09-Practical-PETs
10-Privacy-Paradox
11-Priv-via-SMC
12-pseudonyms-linking-revoking
13-Simple-Oblivious-Transfer-Simple-PIR
14-Smart-Citiy
15-smart-metering
16-source-location-privacy-in-WLAN
17-Trusted-Computing-and-Priv
18-Vehicular-NWs
19-Voting
20-wearables

Best regards, Jorge

news Course dates

Sorry for the late announcement.  The planned dates for the classes are:

 1  Mo 22.10.2018
 2  Mo 29.10.2018
 3  Mo 12.11.2018
 4  Mo 19.11.2018
 5  Mo 03.12.2018
 6  Mo 17.12.2018
 7  Mo 14.01.2019
 8  Mo 28.01.2019

During the semester we might need to
- add an 8th day of classes *and/or*
- move the one or other day to another Monday.

Best regards,
Jorge Cuellar

news Limited slots in the course and madatory first session

This year, each student has to give a mandatory presentation during the semester. As we only have a certain amount of presentation slots, we cannot accept more than 30+ students.

Presentation topics will be assigned to groups (three students each) in the first session. So, presence is mandatory! Without a given presentation you cannot pass the course!

Next steps:

  • Decide if you really want to take the course. Please do not register for a topic and quit later. Wasting slots is not fair for your fellow students.
  • If you want to participate, try to find a team before the first session (not mandatory).
  • If there are more students than slots, the semester count of students might indicate if someone has to be prioritized (i.e. higher semester has to finish studies). Alternatively we have to “toss a coin”.


Remark: Until now, all students are “preliminary enrolled”. Further details will be discussed in the first session.