Abstract
In this chapter, we provide a brief review of related work on privacy preservation and side-channel attacks especially in the three related domains: data publishing, Web applications, and smart metering.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gergely Ács and Claude Castelluccia. Dream: Differentially private smart metering. CoRR, abs/1201.2531, 2012.
N.R. Adam and J.C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv., 21(4):515–556, 1989.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. k-anonymity: Algorithms and hardness. Technical report, Stanford University, 2004.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT’05, pages 246–258, 2005.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. Journal of Privacy Technology, November 2005.
A. Askarov, D. Zhang, and A.C. Myers. Predictive black-box mitigation of timing channels. In CCS ’10, pages 297–307, 2010.
D. Asonov and R. Agrawal. Keyboard acoustic emanations. Security and Privacy, IEEE Symposium on, page 3, 2004.
A. Aviram, S. Hu, B. Ford, and R. Gummadi. Determinating timing channels in compute clouds. In CCSW ’10, pages 103–108, 2010.
Michael Backes, Goran Doychev, Markus Dürmuth, and Boris Köpf. Speaker recognition in encrypted voice streams. In ESORICS ’10, pages 508–523, 2010.
Michael Backes, Goran Doychev, and Boris Köpf. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In NDSS’13, 2013.
K. Bauer, D. Mccoy, B. Greenstein, D. Grunwald, and D. Sicker. Physical layer attacks on unlinkability in wireless lans. In PETS ’09, pages 108–127, 2009.
R.J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217–228, 2005.
I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad. Privacy in mobile computing for location-sharing-based services. In PETS, pages 77–96, 2011.
BillyBob Brumley and Nicola Tuveri. Remote timing attacks are still practical. In ESORICS’11, pages 355–371. 2011.
D. Brumley and D. Boneh. Remote timing attacks are practical. In USENIX, 2003.
J. Byun and E. Bertino. Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. SIGMOD Record, 35(1):9–13, 2006.
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou. Privacy-preserving query over encrypted graph-structured data in cloud computing. In ICDCS’11, pages 393–402, 2011.
C. Castelluccia, E. De Cristofaro, and D. Perito. Private information disclosure from web searches. In PETS’10, pages 38–55, 2010.
Peter Chapman and David Evans. Automated black-box detection of side-channel vulnerabilities in web applications. In CCS ’11, pages 263–274, 2011.
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Theory of Cryptography Conference, 2005.
Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In IEEE Symposium on Security and Privacy ’10, pages 191–206, 2010.
F. Chin. Security problems on inference control for sum, max, and min queries. J.ACM, 33(3):451–464, 1986.
Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, and Jianying Zhou. Privacy-preserving smart metering with regional statistics and personal enquiry services. In ASIA CCS ’13, pages 369–380, 2013.
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. k-anonymous data mining: A survey. In Privacy-Preserving Data Mining: Models and Algorithms. 2008.
C. Clifton and T. Tassa. On syntactic anonymity and differential privacy. In ICDEW ’13, pages 88–93, 2013.
L.H. Cox. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in the u.s. economic censuses. In Proceedings of the Internatinal Seminar on Statistical Confidentiality, 1982.
L.H. Cox. New results in disclosure avoidance for tabulations. In International Statistical Institute Proceedings, pages 83–84, 1987.
L.H. Cox. Suppression, methodology and statistical disclosure control. J. of the American Statistical Association, pages 377–385, 1995.
T. Dalenius and S. Reiss. Data swapping: A technique for disclosure control. Journal of Statistical Planning and Inference, 6:73–85, 1982.
G. Danezis, T. Aura, S. Chen, and E. Kiciman. How to share your favourite search results while preserving privacy and quality. In PETS’10, pages 273–290, 2010.
George Danezis, Markulf Kohlweiss, and Alfredo Rial. Differentially private billing with rebates. In IH’11, pages 148–162, 2011.
A. Deutsch. Privacy in database publishing: a bayesian perspective. In Handbook of Database Security: Applications and Trends, pages 464–490. Springer, 2007.
A. Deutsch and Y. Papakonstantinou. Privacy in database publishing. In ICDT, pages 230–245, 2005.
P. Diaconis and B. Sturmfels. Algebraic algorithms for sampling from conditional distributions. Annals of Statistics, 26:363–397, 1995.
D.P. Dobkin, A.K. Jones, and R.J. Lipton. Secure databases: Protection against user influence. ACM TODS, 4(1):76–96, 1979.
A. Dobra and S.E. Feinberg. Bounding entries in multi-way contingency tables given a set of marginal totals. In Foundations of Statistical Inference: Proceedings of the Shoresh Conference 2000. Springer Verlag, 2003.
Y. Du, T. Xia, Y. Tao, D. Zhang, and F. Zhu. On multidimensional k-anonymity with local recoding generalization. In ICDE, pages 1422–1424, 2007.
G.T. Duncan and S.E. Feinberg. Obtaining information while preserving privacy: A markov perturbation method for tabular data. In Joint Statistical Meetings. Anaheim,CA, 1997.
C. Dwork. Differential privacy. In ICALP (2), pages 1–12, 2006.
Z. Erkin, J.R. Troncoso-Pastoriza, R.L. Lagendijk, and F. Perez-Gonzalez. Privacy-preserving data aggregation in smart metering systems: An overview. Signal Processing Magazine, IEEE, 30(2):75–86, 2013.
I.P. Fellegi. On the question of statistical confidentiality. Journal of the American Statistical Association, 67(337):7–18, 1993.
E. W. Felten and M. A. Schneider. Timing attacks on web privacy. In CCS ’00, pages 25–32, 2000.
Philip W. L. Fong, Mohd Anwar, and Zhen Zhao. A privacy preservation model for facebook-style social network systems. In ESORICS ’09, pages 303–320, 2009.
Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, and David C. Parkes. On non-cooperative location privacy: a game-theoretic analysis. In CCS ’09, pages 324–337, 2009.
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, 42(4):14:1–14:53, June 2010.
X. Gong, N. Borisov, N. Kiyavash, and N. Schear. Website detection using remote traffic analysis. In PETS’12, pages 58–78. 2012.
X. Gong, N. Kiyavash, and N. Borisov. Fingerprinting websites using remote traffic analysis. In CCS, pages 684–686, 2010.
G.W. Hart. Nonintrusive appliance load monitoring. Proceedings of the IEEE, 80(12):1870–1891, 1992.
X. Jin, N. Zhang, and G. Das. Algorithm-safe privacy-preserving data publishing. In EDBT ’10, pages 633–644, 2010.
X. Jin, N. Zhang, and G. Das. Asap: Eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf. Syst., 36:859–880, July 2011.
K. Kenthapadi, N. Mishra, and K. Nissim. Simulatable auditing. In PODS, pages 118–127, 2005.
D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD ’11, pages 193–204, 2011.
J. Kleinberg, C. Papadimitriou, and P. Raghavan. Auditing boolean attributes. In PODS, pages 86–91, 2000.
Klaus Kursawe, George Danezis, and Markulf Kohlweiss. Privacy-friendly aggregation for the smart-grid. In PETS’11, pages 175–191, 2011.
H. Y. Lam, G. S.K. Fung, and W. K. Lee. A novel method to construct taxonomy electrical appliances based on load signaturesof. IEEE Trans. on Consum. Electron., 53(2):653–660, May 2007.
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, pages 49–60, 2005.
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, pages 106–115, 2007.
N. Li, W. H. Qardaji, and D. Su. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs/1101.2604, 2011.
Ninghui Li, Wahbeh Qardaji, and Dong Su. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In ASIACCS ’12, pages 32–33, 2012.
Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, and Bao-Shuh P. Lin. A practical smart metering system supporting privacy preserving billing and load monitoring. In ACNS’12, pages 544–560, 2012.
W. M. Liu and L. Wang. Privacy streamliner: a two-stage approach to improving algorithm efficiency. In CODASPY, pages 193–204, 2012.
W. M. Liu, L. Wang, and L. Zhang. k-jump strategy for preserving privacy in micro-data disclosure. In ICDT ’10, pages 104–115, 2010.
Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. Parallel and Distributed Systems, IEEE Transactions on, 23(9):1621–1631, 2012.
X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In NDSS ’11.
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.
Stephen McLaughlin, Patrick McDaniel, and William Aiello. Protecting consumer privacy from electric load monitoring. In CCS ’11, pages 87–98, 2011.
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In ACM PODS, pages 223–228, 2004.
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575–586, 2004.
Andrés Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. Private memoirs of a smart meter. In BuildSys ’10, pages 61–66, 2010.
S. Nagaraja, V. Jalaparti, M. Caesar, and N. Borisov. P3ca: private anomaly detection across isp networks. In PETS’11, pages 38–56, 2011.
Arvind Narayanan and Vitaly Shmatikov. De-anonymizing social networks. In IEEE Symposium on Security and Privacy ’09, pages 173–187, 2009.
Alfredo Rial and George Danezis. Privacy-preserving smart metering. In WPES ’11, pages 49–60, 2011.
Ian Richardson, Murray Thomson, David Infield, and Conor Clifford. Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(10):1878–1887, 2010.
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199–212, 2009.
Ishtiaq Rouf, Hossen Mustafa, Miao Xu, Wenyuan Xu, Rob Miller, and Marco Gruteser. Neighborhood watch: security and privacy analysis of automatic meter reading systems. In CCS ’12, pages 462–473, 2012.
P. Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010–1027, 2001.
T. S. Saponas and S. Agarwal. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX ’07, pages 5:1–5:16, 2007.
J. Schlorer. Identification and retrieval of personal records from a statistical bank. In Methods Info. Med., pages 7–13, 1975.
A. Slavkovic and S.E. Feinberg. Bounds for cell entries in two-way tables given conditional relative frequencies. Privacy in Statistical Databases, 2004.
J. Sun, X. Zhu, C. Zhang, and Y. Fang. Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare. In ICDCS’11, pages 373–382, 2011.
Q. Sun, D. R. Simon, Y. M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In IEEE Symposium on Security and Privacy ’02, pages 19–, 2002.
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure ranked keyword search over encrypted cloud data. In ICDCS’10, pages 253–262, 2010.
Wenye Wang and Zhuo Lu. Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5):1344–1371, 2013.
R. C. Wong and A. W. Fu. Privacy-Preserving Data Publishing: An Overview. Morgan and Claypool Publishers, 2010.
R.C. Wong, A.W. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, pages 543–554, 2007.
R.C. Wong, J. Li, A. Fu, and K. Wang. alpha-k-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, pages 754–759, 2006.
C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS ’09.
X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD, pages 229–240, 2006.
X. Xiao, Y. Tao, and N. Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2):1–48, 2010.
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE ’10, pages 225–236, 2010.
Xiaokui Xiao and Yufei Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In SIGMOD ’07, pages 689–700, 2007.
Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, Stephen McLaughlin, and Patrick McDaniel. Minimizing private data disclosures in the smart grid. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pages 415–427, 2012.
K. Zhang, Z. Li, R. Wang, X. Wang, and S. Chen. Sidebuster: automated detection and quantification of side-channel leaks in web application development. In CCS ’10, pages 595–606, 2010.
L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: privacy versus optimality. In CCS, pages 573–583, 2007.
L. Zhang, L. Wang, S. Jajodia, and A. Brodsky. Exclusive strategy for generalization algorithms in micro-data disclosure. In Data and Applications Security XXII, volume 5094 of Lecture Notes in Computer Science, pages 190–204. 2008.
L. Zhang, L. Wang, S. Jajodia, and A. Brodsky. L-cover: Preserving diversity by anonymity. In SDM ’09, pages 158–171, 2009.
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, pages 313–328, 2011.
Li Zhuang, Feng Zhou, and J. D. Tygar. Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur., 13(1):3:1–3:26, November 2009.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Liu, W.M., Wang, L. (2016). Related Work. In: Preserving Privacy Against Side-Channel Leaks. Advances in Information Security, vol 68. Springer, Cham. https://doi.org/10.1007/978-3-319-42644-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-42644-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42642-6
Online ISBN: 978-3-319-42644-0
eBook Packages: Computer ScienceComputer Science (R0)