Attacks on traditional privacy enhancing techniques
9
Reasons for optimism
10
Reconstruction attacks are useful!
11
What reconstruction attacks teach us?
12
Progressing towards a definition
13
A privacy desiderata
14
A more realistic privacy desiderata
15
Differential privacy [Dwork McSherry N Smith 86]
16
New privacy concepts
17
What makes a good privacy concept? (2)
18
What makes a good privacy concept? (3)
19
What makes a good privacy concept? (4)
20
Differentially Private Computations
21
What can be computed with differential Privacy?
22
What differential privacy is not?
23
U.S. Census Bureau
24
GOOGLE
25
Apple
26
Some challenges
27
A perspective talk
28
Data Privacy: The Problem
29
A computer scientist and a legal scholar meet at the Simons Institute
30
What does "protecting individual privacy" mean?
31
Legal approach
Description:
Explore the foundations and applications of data privacy in this comprehensive lecture from the Data Privacy Boot Camp at Simons Institute. Delve into the challenges of informational privacy, examining reconstruction attacks and their implications. Analyze traditional privacy-enhancing techniques and their vulnerabilities. Discover the concept of differential privacy, its principles, and real-world applications in organizations like the U.S. Census Bureau, Google, and Apple. Investigate the characteristics of effective privacy concepts and the challenges faced in implementing privacy measures. Gain insights into the interdisciplinary nature of privacy research, bridging computer science and legal perspectives. Learn about the evolving landscape of data privacy and its significance in today's digital world.
Foundations and Applications of Data Privacy - A Perspective