Privacy Technologies (B-KUL-H09L2A)

3 ECTSEnglish35 First term
N. |  Das Debajyoti (substitute)
POC Elektrotechniek

Here are three reasons why you might want to take this course:

First, as engineer you will be designing, implementing, or managing electronic systems and services that in most cases have privacy implications. For example, ambient sensors and biomedical implants collect, process, store, and communicate (sometimes highly sensitive) data related to individuals; the data generated by ubiquitous electronic communications provides detailed insight into people’s activities and lifestyle; and the personalization of multimedia applications and services relies on learning about individuals’ most intimate preferences and adapting to them.

The first objective (O1) of the course is that you are able to identify the privacy concerns that arise in different scenarios. For example, if you are designing a new video-on-demand service for mobile phones, what could go wrong for your future users’ privacy?

The second objective (O2) is that you are able to relate privacy concerns to technical design choices. For example, what privacy risks arise from relying on unique identifiers? or from centralizing the storage and processing of data?

Privacy technologies aim to mitigate privacy concerns. The third objective (O3) is that you understand the principles underlying the design of privacy technologies. For example, anonymity technologies require diversity (of users, uses, attributes, internet subnets, etc.); advanced cryptographic protocols enable sophisticated services (e.g., smart metering) while minimizing the disclosure of data beyond what seems intuitively possible; and differential privacy ensures that queries to database of personal records cannot be used to determine if a particular individual record is included in the database.

Second, you will deal with privacy issues not only as an engineer but also as an individual and as a member of society. As an individual, you use a variety of services: mobile communications, online shopping, search engines such as Google, social media such as Facebook or Twitter, etc. The fourth objective of this course (O4) is that you become aware of what privacy issues are associated to the use of different services, what are your basic (legal) rights concerning privacy and data protection, and what technologies you can use to mitigate your exposure to privacy risks. As a result of this, you will be able to form your own informed opinions on how privacy issues should be addressed in our increasingly technological society. Many of these privacy issues are at the heart of ongoing debates whose outcome will have an influence on how society is shaped: Is the tracking of Internet users necessary for the economic sustainability of the Internet? Might profiling and personalization lead to social sorting and discrimination? Should certain content be censored? Should we have real name policies in social media to combat harassment? Should user communications be stored for long periods of time for the purpose of law-enforcement investigations? Are we building an unprecedented mass surveillance infrastructure, or are overblown privacy concerns an obstacle to data-driven innovation?

Finally, the course is heavily based on recent research. By participating in this course you will get a first hand experience of what research is like. The sixth objective (O5) is that you learn to read scientific articles, as well as to develop and present your own ideas. 

 

Ideally, students have a basic background in:

  • probability theory and statistics: computing probabilities in basic models; understanding what is joint probability, conditional probability, random variable; knowing basic distributions (uniform, exponential, binomial); etc.
  • information theory: familiarity with concepts such as entropy and mutual information
  • cryptography, computer and network security: basic knowledge of cryptographic primitives such as symmetric key encryption, hash functions, and digital signatures; and of internet protocols, such as TLS or SSH.

Students lacking parts of this background will also be able to follow the course – with a bit of preparation they can quickly be up to speed with the basic background knowledge required.


This course unit is a prerequisite for taking the following course units:
H0Q29A : Advanced Privacy Technologies

Activities

1.8 ects. Privacy Technologies: Lectures (B-KUL-H09L2a)

1.8 ECTSEnglishFormat: Lecture14 First term
N. |  Das Debajyoti (substitute)
POC Elektrotechniek

This course provides an introduction to privacy technologies. We will explain the various types of privacy risks and introduce a range of existing privacy technologies that address these risks. These include:        

  • cryptographic protocols with applications to privacy, including: private information retrieval, oblivious transfer, anonymous e-cash, anonymous authentication, and private search.        
  • privacy engineering, including: privacy in agile frameworks, introduction to anonymous communication systems.
  • database privacy & data anonymization, including: k-anonymization, re-identification algorithms, and differential privacy.       
  • ML/AI privacy, including: privacy preserving ML/AI and ML/AI for privacy.
  • web privacy, including: web tracking techniques, cookies, device fingerprinting.
  • legal aspects of privacy, including: GDPR and Human Rights legal frameworks.

 

Slides, notes, and research articles for further reading.

The lectures are interactive. Students are expected to ask and answer questions and actively participate in class discussions.

1.2 ects. Privacy Technologies: Exercises and Laboratory Sessions (B-KUL-H09L3a)

1.2 ECTSEnglishFormat: Practical21 First term
N. |  Das Debajyoti (substitute)
POC Elektrotechniek

There will be four exercise sessions in total.

Session 1: Privacy scandals session (1 point)

In this session students give a presentation (of a few minutes) on a privacy scandal of their choice. To prepare for this session, the student must search online news and documentation of a high-profile incident of the last year that violated the privacy of a person or a group of people. Examples of incidents may include data breaches, unlawful data saring/use practices by organizations, or any other event. During the session the student should explain the story of the incident, the reasons (e.g., some security vulnerability), and the consequences.  

Sessions 2 & 3: Assignment feedback sessions (no points)

In these two sessions students work in groups of about 4 people. Each student takes about half an hour to explain to the others in the group the topic they have chosen for their assignment and their approach to addressing that problem. Students discuss and give feedback to each other on their respective assignments. 

Session 4: Assignment presentation session (4 points)

In this session students will have a few minutes to present their assignment to the lecturers and TAs of the course, who may ask questions and give feedback to the students. The students will still have some days to finalize the assignment incorporating the received feedback and addressing issues identified during the presentation. 

Scientific articles, software tools. 

Evaluation

Evaluation: Privacy Technologies (B-KUL-H29L2a)

Type : Continuous assessment without exam during the examination period
Description of evaluation : Paper/Project, Report, Presentation
Type of questions : Open questions
Learning material : Course material


The final grades in a scale of 20 points will be computed as follows:     

  • [1 pt] For the presentations of the privacy scandals exercise session (see exercise sessions). 
  • [4 pt] For the assigment presentation (see exercise sessions). 
  • [15 pt] For the final written assignment. 

The assignment is a paper that motivates, designs and evaluates a privacy-enhanced system, including: 

  • Define a functionality, system model, assumptions, privacy/security properties, and threat model
  • Define an architecture combining building blocks (technologies, protocols) seen in the lectures 
  • Discuss/argue which desired security/privacy properties are achieved and which are not achieved 

Students can work either individually or in pairs to write an paper of between 3500 and 4500 words. The final version of the paper must be submitted before the start of the January examination period. The presentation of the assigment takes place in December so that students can receive feedback before they finalize and submit their final paper. 

 

In the second chance, all 20 points are evaluated on the basis of the written assignment. The deadline for submitting the assignent is BEFORE the start of the examination period (last day before the examination period starts).