Abstract
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
- Archer, D.W. Maturity and performance of programmable secure computation. IACR Cryptology ePrint Archive, (1039), 2015.Google Scholar
- Barlow, R. Computational thinking breaks a Logjam: Hariri Institute helps address Boston's male-female pay gap. (Apr. 27, 2015); BU Today.Google Scholar
- Bogdanov, D. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. Springer, Berlin, Heidelberg, 2015, 227--234. Google ScholarCross Ref
- Boston Women's Workforce Council Report 2016; http://bit.ly/2iR2KhWGoogle Scholar
- El Emam, K. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. Journal of the American Medical Informatics Association 18, 3 (May 2011), 212--217. Google ScholarCross Ref
- Gog, I. Musketeer: All for one, one for all in data processing systems. In Proceedings of the Tenth European Conference on Computer Systems (EuroSys), (2015), 2:1--2:16. Google ScholarDigital Library
- Hamlin, A. Cryptography for big data security. In Fei Hu, Ed., Big Data: Storage, Sharing, and Security. CRC Press, May 2016. Google ScholarCross Ref
- Lapets, A. Secure Multi-Party Computation for Analytics Deployed as a Lightweight Web Application. Technical Report BUCS-TR-2016-008, CS Dept., Boston University, July 2016.Google Scholar
- Lindell, Y. and Pinkas, B. Secure multiparty computation for privacy-preserving data mining. The Journal of Privacy and Confidentiality 1 (2009), 59--93.Google ScholarCross Ref
- McSherry, F. Scalability! But at what COST? In Proceedings of the 15th Workshop on Hot Topics in Operating Systems (HotOS XV), Kartause Ittingen, Switzerland (May 2015). USENIX Association.Google Scholar
- 100% Talent: The Boston Women's Compact; http://bit.ly/YWryu2Google Scholar
- Shen, E. Cryptographically secure computation. IEEE Computer 48, 4 (2015), 78--81. Google ScholarCross Ref
- Signers of 100% Talent: The Boston Women's Compact; http://bit.ly/2bN48QJGoogle Scholar
- Volgushev, N. DEMO: Integrating MPC in big data workflows. In Proceedings of CCS 2016: The 23rd ACM SIGSAC Conference on Computer and Communications Security, 2016.Google Scholar
- Will Data Help Close The Gender Pay Gap?; http://wbur.fm/2hdbjXaGoogle Scholar
- Yung, M. From mental poker to core business: Why and how to deploy secure computation protocols? In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, ACM, 2015. Google ScholarDigital Library
Index Terms
- User-centric distributed solutions for privacy-preserving analytics
Recommendations
Privacy Preserving Unstructured Big Data Analytics
Big data analytics has created opportunities for researchers to process huge amount of data but created a big threat to privacy of individual. Data processed by big data analytics platforms may have personal information which need to be taken care of ...
Privacy-enhanced user-centric identity management
ICC'09: Proceedings of the 2009 IEEE international conference on CommunicationsUser-centric identity management approaches have received significant attention for managing private and critical identity attributes from the user's perspective. User-centric identity management allows users to control their own digital identities. ...
Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web
WI-IAT '14: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02We address the research challenges of privacy-preserving Web ID analytics on the decentralized Social Web. We first argue why we should use open and decentralized control but not closed and centralized control of personal data management. Then, we ...
Comments