Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 68))

  • 513 Accesses

Abstract

In this chapter, we provide a brief review of related work on privacy preservation and side-channel attacks especially in the three related domains: data publishing, Web applications, and smart metering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gergely Ács and Claude Castelluccia. Dream: Differentially private smart metering. CoRR, abs/1201.2531, 2012.

    Google Scholar 

  2. N.R. Adam and J.C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv., 21(4):515–556, 1989.

    Article  Google Scholar 

  3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. k-anonymity: Algorithms and hardness. Technical report, Stanford University, 2004.

    Google Scholar 

  4. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT’05, pages 246–258, 2005.

    Google Scholar 

  5. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. Journal of Privacy Technology, November 2005.

    Google Scholar 

  6. A. Askarov, D. Zhang, and A.C. Myers. Predictive black-box mitigation of timing channels. In CCS ’10, pages 297–307, 2010.

    Google Scholar 

  7. D. Asonov and R. Agrawal. Keyboard acoustic emanations. Security and Privacy, IEEE Symposium on, page 3, 2004.

    Google Scholar 

  8. A. Aviram, S. Hu, B. Ford, and R. Gummadi. Determinating timing channels in compute clouds. In CCSW ’10, pages 103–108, 2010.

    Google Scholar 

  9. Michael Backes, Goran Doychev, Markus Dürmuth, and Boris Köpf. Speaker recognition in encrypted voice streams. In ESORICS ’10, pages 508–523, 2010.

    Google Scholar 

  10. Michael Backes, Goran Doychev, and Boris Köpf. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In NDSS’13, 2013.

    Google Scholar 

  11. K. Bauer, D. Mccoy, B. Greenstein, D. Grunwald, and D. Sicker. Physical layer attacks on unlinkability in wireless lans. In PETS ’09, pages 108–127, 2009.

    Google Scholar 

  12. R.J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217–228, 2005.

    Google Scholar 

  13. I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad. Privacy in mobile computing for location-sharing-based services. In PETS, pages 77–96, 2011.

    Google Scholar 

  14. BillyBob Brumley and Nicola Tuveri. Remote timing attacks are still practical. In ESORICS’11, pages 355–371. 2011.

    Google Scholar 

  15. D. Brumley and D. Boneh. Remote timing attacks are practical. In USENIX, 2003.

    Google Scholar 

  16. J. Byun and E. Bertino. Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. SIGMOD Record, 35(1):9–13, 2006.

    Article  Google Scholar 

  17. N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou. Privacy-preserving query over encrypted graph-structured data in cloud computing. In ICDCS’11, pages 393–402, 2011.

    Google Scholar 

  18. C. Castelluccia, E. De Cristofaro, and D. Perito. Private information disclosure from web searches. In PETS’10, pages 38–55, 2010.

    Google Scholar 

  19. Peter Chapman and David Evans. Automated black-box detection of side-channel vulnerabilities in web applications. In CCS ’11, pages 263–274, 2011.

    Google Scholar 

  20. S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Theory of Cryptography Conference, 2005.

    Google Scholar 

  21. Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In IEEE Symposium on Security and Privacy ’10, pages 191–206, 2010.

    Google Scholar 

  22. F. Chin. Security problems on inference control for sum, max, and min queries. J.ACM, 33(3):451–464, 1986.

    Article  MathSciNet  Google Scholar 

  23. Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, and Jianying Zhou. Privacy-preserving smart metering with regional statistics and personal enquiry services. In ASIA CCS ’13, pages 369–380, 2013.

    Google Scholar 

  24. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. k-anonymous data mining: A survey. In Privacy-Preserving Data Mining: Models and Algorithms. 2008.

    Google Scholar 

  25. C. Clifton and T. Tassa. On syntactic anonymity and differential privacy. In ICDEW ’13, pages 88–93, 2013.

    Google Scholar 

  26. L.H. Cox. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in the u.s. economic censuses. In Proceedings of the Internatinal Seminar on Statistical Confidentiality, 1982.

    Google Scholar 

  27. L.H. Cox. New results in disclosure avoidance for tabulations. In International Statistical Institute Proceedings, pages 83–84, 1987.

    Google Scholar 

  28. L.H. Cox. Suppression, methodology and statistical disclosure control. J. of the American Statistical Association, pages 377–385, 1995.

    Google Scholar 

  29. T. Dalenius and S. Reiss. Data swapping: A technique for disclosure control. Journal of Statistical Planning and Inference, 6:73–85, 1982.

    Article  MathSciNet  MATH  Google Scholar 

  30. G. Danezis, T. Aura, S. Chen, and E. Kiciman. How to share your favourite search results while preserving privacy and quality. In PETS’10, pages 273–290, 2010.

    Google Scholar 

  31. George Danezis, Markulf Kohlweiss, and Alfredo Rial. Differentially private billing with rebates. In IH’11, pages 148–162, 2011.

    Google Scholar 

  32. A. Deutsch. Privacy in database publishing: a bayesian perspective. In Handbook of Database Security: Applications and Trends, pages 464–490. Springer, 2007.

    Google Scholar 

  33. A. Deutsch and Y. Papakonstantinou. Privacy in database publishing. In ICDT, pages 230–245, 2005.

    Google Scholar 

  34. P. Diaconis and B. Sturmfels. Algebraic algorithms for sampling from conditional distributions. Annals of Statistics, 26:363–397, 1995.

    MathSciNet  MATH  Google Scholar 

  35. D.P. Dobkin, A.K. Jones, and R.J. Lipton. Secure databases: Protection against user influence. ACM TODS, 4(1):76–96, 1979.

    Article  Google Scholar 

  36. A. Dobra and S.E. Feinberg. Bounding entries in multi-way contingency tables given a set of marginal totals. In Foundations of Statistical Inference: Proceedings of the Shoresh Conference 2000. Springer Verlag, 2003.

    Google Scholar 

  37. Y. Du, T. Xia, Y. Tao, D. Zhang, and F. Zhu. On multidimensional k-anonymity with local recoding generalization. In ICDE, pages 1422–1424, 2007.

    Google Scholar 

  38. G.T. Duncan and S.E. Feinberg. Obtaining information while preserving privacy: A markov perturbation method for tabular data. In Joint Statistical Meetings. Anaheim,CA, 1997.

    Google Scholar 

  39. C. Dwork. Differential privacy. In ICALP (2), pages 1–12, 2006.

    Google Scholar 

  40. Z. Erkin, J.R. Troncoso-Pastoriza, R.L. Lagendijk, and F. Perez-Gonzalez. Privacy-preserving data aggregation in smart metering systems: An overview. Signal Processing Magazine, IEEE, 30(2):75–86, 2013.

    Article  Google Scholar 

  41. I.P. Fellegi. On the question of statistical confidentiality. Journal of the American Statistical Association, 67(337):7–18, 1993.

    Article  MATH  Google Scholar 

  42. E. W. Felten and M. A. Schneider. Timing attacks on web privacy. In CCS ’00, pages 25–32, 2000.

    Google Scholar 

  43. Philip W. L. Fong, Mohd Anwar, and Zhen Zhao. A privacy preservation model for facebook-style social network systems. In ESORICS ’09, pages 303–320, 2009.

    Google Scholar 

  44. Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, and David C. Parkes. On non-cooperative location privacy: a game-theoretic analysis. In CCS ’09, pages 324–337, 2009.

    Google Scholar 

  45. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4):14:1–14:53, June 2010.

    Google Scholar 

  46. X. Gong, N. Borisov, N. Kiyavash, and N. Schear. Website detection using remote traffic analysis. In PETS’12, pages 58–78. 2012.

    Google Scholar 

  47. X. Gong, N. Kiyavash, and N. Borisov. Fingerprinting websites using remote traffic analysis. In CCS, pages 684–686, 2010.

    Google Scholar 

  48. G.W. Hart. Nonintrusive appliance load monitoring. Proceedings of the IEEE, 80(12):1870–1891, 1992.

    Article  Google Scholar 

  49. X. Jin, N. Zhang, and G. Das. Algorithm-safe privacy-preserving data publishing. In EDBT ’10, pages 633–644, 2010.

    Google Scholar 

  50. X. Jin, N. Zhang, and G. Das. Asap: Eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf. Syst., 36:859–880, July 2011.

    Google Scholar 

  51. K. Kenthapadi, N. Mishra, and K. Nissim. Simulatable auditing. In PODS, pages 118–127, 2005.

    Google Scholar 

  52. D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD ’11, pages 193–204, 2011.

    Google Scholar 

  53. J. Kleinberg, C. Papadimitriou, and P. Raghavan. Auditing boolean attributes. In PODS, pages 86–91, 2000.

    Google Scholar 

  54. Klaus Kursawe, George Danezis, and Markulf Kohlweiss. Privacy-friendly aggregation for the smart-grid. In PETS’11, pages 175–191, 2011.

    Google Scholar 

  55. H. Y. Lam, G. S.K. Fung, and W. K. Lee. A novel method to construct taxonomy electrical appliances based on load signaturesof. IEEE Trans. on Consum. Electron., 53(2):653–660, May 2007.

    Google Scholar 

  56. K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, pages 49–60, 2005.

    Google Scholar 

  57. N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, pages 106–115, 2007.

    Google Scholar 

  58. N. Li, W. H. Qardaji, and D. Su. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs/1101.2604, 2011.

    Google Scholar 

  59. Ninghui Li, Wahbeh Qardaji, and Dong Su. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In ASIACCS ’12, pages 32–33, 2012.

    Google Scholar 

  60. Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, and Bao-Shuh P. Lin. A practical smart metering system supporting privacy preserving billing and load monitoring. In ACNS’12, pages 544–560, 2012.

    Google Scholar 

  61. W. M. Liu and L. Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In CODASPY, pages 193–204, 2012.

    Google Scholar 

  62. W. M. Liu, L. Wang, and L. Zhang. k-jump strategy for preserving privacy in micro-data disclosure. In ICDT ’10, pages 104–115, 2010.

    Google Scholar 

  63. Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. Parallel and Distributed Systems, IEEE Transactions on, 23(9):1621–1631, 2012.

    Article  Google Scholar 

  64. X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In NDSS ’11.

    Google Scholar 

  65. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.

    Google Scholar 

  66. Stephen McLaughlin, Patrick McDaniel, and William Aiello. Protecting consumer privacy from electric load monitoring. In CCS ’11, pages 87–98, 2011.

    Google Scholar 

  67. A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In ACM PODS, pages 223–228, 2004.

    Google Scholar 

  68. G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575–586, 2004.

    Google Scholar 

  69. Andrés Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. Private memoirs of a smart meter. In BuildSys ’10, pages 61–66, 2010.

    Google Scholar 

  70. S. Nagaraja, V. Jalaparti, M. Caesar, and N. Borisov. P3ca: private anomaly detection across isp networks. In PETS’11, pages 38–56, 2011.

    Google Scholar 

  71. Arvind Narayanan and Vitaly Shmatikov. De-anonymizing social networks. In IEEE Symposium on Security and Privacy ’09, pages 173–187, 2009.

    Google Scholar 

  72. Alfredo Rial and George Danezis. Privacy-preserving smart metering. In WPES ’11, pages 49–60, 2011.

    Google Scholar 

  73. Ian Richardson, Murray Thomson, David Infield, and Conor Clifford. Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(10):1878–1887, 2010.

    Article  Google Scholar 

  74. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199–212, 2009.

    Google Scholar 

  75. Ishtiaq Rouf, Hossen Mustafa, Miao Xu, Wenyuan Xu, Rob Miller, and Marco Gruteser. Neighborhood watch: security and privacy analysis of automatic meter reading systems. In CCS ’12, pages 462–473, 2012.

    Google Scholar 

  76. P. Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010–1027, 2001.

    Article  Google Scholar 

  77. T. S. Saponas and S. Agarwal. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX ’07, pages 5:1–5:16, 2007.

    Google Scholar 

  78. J. Schlorer. Identification and retrieval of personal records from a statistical bank. In Methods Info. Med., pages 7–13, 1975.

    Google Scholar 

  79. A. Slavkovic and S.E. Feinberg. Bounds for cell entries in two-way tables given conditional relative frequencies. Privacy in Statistical Databases, 2004.

    Google Scholar 

  80. J. Sun, X. Zhu, C. Zhang, and Y. Fang. Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare. In ICDCS’11, pages 373–382, 2011.

    Google Scholar 

  81. Q. Sun, D. R. Simon, Y. M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy ’02, pages 19–, 2002.

    Google Scholar 

  82. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. In ICDCS’10, pages 253–262, 2010.

    Google Scholar 

  83. Wenye Wang and Zhuo Lu. Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5):1344–1371, 2013.

    Article  Google Scholar 

  84. R. C. Wong and A. W. Fu. Privacy-Preserving Data Publishing: An Overview. Morgan and Claypool Publishers, 2010.

    MATH  Google Scholar 

  85. R.C. Wong, A.W. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, pages 543–554, 2007.

    Google Scholar 

  86. R.C. Wong, J. Li, A. Fu, and K. Wang. alpha-k-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, pages 754–759, 2006.

    Google Scholar 

  87. C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS ’09.

    Google Scholar 

  88. X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD, pages 229–240, 2006.

    Google Scholar 

  89. X. Xiao, Y. Tao, and N. Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2):1–48, 2010.

    Article  Google Scholar 

  90. X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE ’10, pages 225–236, 2010.

    Google Scholar 

  91. Xiaokui Xiao and Yufei Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In SIGMOD ’07, pages 689–700, 2007.

    Google Scholar 

  92. Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, Stephen McLaughlin, and Patrick McDaniel. Minimizing private data disclosures in the smart grid. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pages 415–427, 2012.

    Google Scholar 

  93. K. Zhang, Z. Li, R. Wang, X. Wang, and S. Chen. Sidebuster: automated detection and quantification of side-channel leaks in web application development. In CCS ’10, pages 595–606, 2010.

    Google Scholar 

  94. L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: privacy versus optimality. In CCS, pages 573–583, 2007.

    Google Scholar 

  95. L. Zhang, L. Wang, S. Jajodia, and A. Brodsky. Exclusive strategy for generalization algorithms in micro-data disclosure. In Data and Applications Security XXII, volume 5094 of Lecture Notes in Computer Science, pages 190–204. 2008.

    Google Scholar 

  96. L. Zhang, L. Wang, S. Jajodia, and A. Brodsky. L-cover: Preserving diversity by anonymity. In SDM ’09, pages 158–171, 2009.

    Google Scholar 

  97. Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, pages 313–328, 2011.

    Google Scholar 

  98. Li Zhuang, Feng Zhou, and J. D. Tygar. Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur., 13(1):3:1–3:26, November 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Liu, W.M., Wang, L. (2016). Related Work. In: Preserving Privacy Against Side-Channel Leaks. Advances in Information Security, vol 68. Springer, Cham. https://doi.org/10.1007/978-3-319-42644-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42644-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42642-6

  • Online ISBN: 978-3-319-42644-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics