This seminar is about new and emerging approaches to adjust and balance privacy and utility in data intensive applications, such as information retrieval, data mining and personalisation. These new approaches have the potential to enable a new generation of privacy-enabled services which are not focused on maximizing the collection of user data. Instead these new approaches enable user privacy under different threat models, such as protecting the identity of individual users when querying aggregated data, or preventing leakage of query patterns when users retrieve data from a database. As a result, these new approaches may help businesses in their compliance with increasingly regulatory trust and reinforce user trust, while enabling new business models at the same time.
Type | Seminar |
Term | WS 2023 |
Mentor(s) |
Stefan Decker |
Assistant(s) |
Lasse Nitz Mehdi Akbari G. fehermsen Avikarsha Mandal matzutt osen |
Users of contemporary information technology services have come to expect a “smart” user experience, which requires collecting a lot of data about the user. For instance, Google Maps “knows” about traffic jams because it collects movement data by default from all smart phones it is installed on. In addition, the dominant business model on the web is to offer services for free and monetize the service by selling the user data [1]. Therefore the majority of current services have not been designed with the privacy of users in mind.
Each iteration of this seminar includes new topics based on current research literature.
When applying for this seminar, please summarise your knowledge about cryptography, probability theory, IT-security, machine learning, or formal computer science, e.g. by listing related lectures you have attended. Please also mention if you have attended the lecture “Privacy Enhancing Technologies for Data Science (PETs4DS)”.
This seminar will be organised as a block event (“Blockseminar”).
[1] https://www.schneier.com/news/archives/2014/04/surveillance_is_the.html
- This seminar will take place in English. Good knowledge of the English language (reading, speaking, writing) is hence required.
- Familiarity with LaTeX is helpful.
- A good understanding of cryptography, probability theory, IT-security, machine learning, or formal computer science is helpful for most topics.