Privacy Enhancing Technologies Flashcards

1
Q

Which requirement categories of a system may contradict privacy?

A

Functionality, efficiency, accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are key attributes vs quasi-identifiers?

A

Key attributes: uniquely identifying information

Quasi-identifiers: Combination of attributes that can be used to identify users in many / most / some cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is K-anonymity?

A

Each person represented in the table is in an anonymity set of at least k people.
Or: A table is k-anonymous if any quasi-identifier present in the released table appears in at least k records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two techniques to reach k-anonymity

A
  • Generalization: replace quasi-identifiers with less specific values
  • Suppression: blunt the data (extreme case of generalization)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe two attacks on k-anonymity

A
  • Homogeneity Attack: use lack of diversity in equivalence class
  • Background Knowledge Attack: use background knowledge -> may be problematic even if records are diverse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is L-diversity?

A

A table is L-diverse if every equivalence class in the table has at least L different values of the sensitive attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three other types of L-diversity

A

Probabilistic L-diversity, Entropy L-diversity, Recursive (c,L)-diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two attacks on L-diversity

A
  • Skewness Attack: statistical anomalies in blocks may be telling
  • Similarity Attack: values may be semantically correlated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is t-Closeness?

A

T-Closeness is described by the distance between two distributions:
- Q: distribution of the sensitive attribute value in the whole table
- P: distribution of the sensitive attribute value in one block
A table has t-closeness if for every block the distance between P and Q is below a threshold t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the idea behind Differential Privacy?

A

Differential privacy aims to provide means to maximize the accuracy of queries from statistical databases while minimizing the chances of identifying its records. -> plausible deniability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is access to data monitored in an inverse transparency system?

A
  • Direct access: blocked
  • API access: Monitored API wrapper
  • Analytical tool access: Monitored plug-ins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What path does data take through the monitored API wrapper?

A

Request: Request authenticator -> allowance module -> request translator -> data source
Response: data source -> Risk computation -> allowance module, access logger -> response generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two benefits of monitored plug-ins vs apis?

A
  • Raw data never leaves the plug-in (?)

- additional benefit of rich access semantics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly