Understand and Measure Privacy
group_project
Submitted by Hemanta Maji on Tue, 12/19/2017 - 3:24pm
Secure multi-party computation (MPC) allows mutually distrusting parties to securely compute over their private data. The goal of this project is to provide novel MPC solutions that are efficient and simultaneously support operations of varying complexity on the input under their respective native representations. Driven by efficiency goals, this project studies the theory of MPC protocol design in the offline-online paradigm.
group_project
Submitted by Haining Wang on Tue, 12/19/2017 - 2:33pm
Living in an age when services are often rated, people are increasingly depending on reputation of sellers or products/apps when making purchases online. This puts pressure on people to gain and maintain a high reputation by offering reliable and high-quality services and/or products, which benefits the society at large. Unfortunately, due to extremely high competition in e-commerce or app stores, recently reputation manipulation related services have quickly developed into a sizable business, which is termed Reputation-Escalation-as-a-Service (REaaS).
group_project
Submitted by ozankoy on Tue, 12/19/2017 - 2:21pm
A wide range of cloud services and applications operate on sensitive data such as business, personal, and governmental information. This renders security and privacy as the most critical concerns in the cloud era. The objective of this project is to question the separation approach in the design of security and reliability features of storage systems, and to investigate new, coding-based security mechanisms based on a joint-design principle. The proposed program will result in a myriad of outcomes.
group_project
Submitted by ozankoy on Tue, 12/19/2017 - 2:20pm
A wide range of cloud services and applications operate on sensitive data such as business, personal, and governmental information. This renders security and privacy as the most critical concerns in the cloud era. The objective of this project is to question the separation approach in the design of security and reliability features of storage systems, and to investigate new, coding-based security mechanisms based on a joint-design principle. The proposed program will result in a myriad of outcomes.
group_project
Submitted by Franziska Roesner on Tue, 12/19/2017 - 1:50pm
This research focuses on understanding the digital security and privacy needs of journalists and their sources to evaluate and design communication technologies that better support the fundamental operations of a globally free and unfettered press. Journalists -- along with their organizations and sources -- are known to be high-risk targets for cyberattack. This community can serve as a privacy and security bellwether, motivated to use new technologies, but requiring flexibility and ease-of-use. Many existing secure tools are too cumbersome for journalists to use on a regular basis.
group_project
Submitted by dml on Tue, 12/19/2017 - 1:43pm
The Public Key Infrastructure (PKI), along with the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, are responsible for securing Internet transactions such as banking, email, and e-commerce; they provide users with the ability to verify with whom they are communicating online, and enable encryption of those communications. While the use of the PKI is mostly automated, there is a surprising amount of human intervention in management tasks that are crucial to its proper operation.
group_project
Submitted by ljean on Tue, 12/19/2017 - 1:33pm
More and more objects used in daily life have Internet connectivity, creating an "Internet of Things" (IoT). Computer security and privacy for an IoT ecosystem are fundamentally important because security breaches can cause real and significant harm to people, their homes, and their community.
group_project
Submitted by Laura Dabbish on Tue, 12/19/2017 - 1:25pm
Internet users may have compelling reasons to seek anonymity online, for example, to discuss stigmatizing issues with others like themselves, or to express dissident opinions. This project studies what people believe it means to be anonymous online, how their privacy and security are affected by their strategies to achieve anonymity, and how they are likely to use new anonymity services. These questions are important because the traceability of users? actions across sites and contexts is ever greater, increasing risks for users who may misjudge their actual anonymity.
group_project
Submitted by Wei Jiang on Tue, 12/19/2017 - 1:20pm
Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.
group_project
Submitted by ghafoor on Tue, 12/19/2017 - 12:38pm
A fundamental but challenging issue in information security is secure sharing and management of sensitive data and information among numerous organizations that form large-scale e-enterprises. Today, an increasing number of enterprises are using the Internet for managing and sharing users? and enterprise information through online databases. However, security and privacy of data is an overriding concern currently limiting the proliferation of information technology.