Parisian Master of Research in Computer Science
Master Parisien de Recherche en Informatique (MPRI)

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

cours:c-2-3-2 [2018/03/06 19:23]
kostas
cours:c-2-3-2 [2019/09/17 04:29] (current)
catuscia [Material]
Line 1: Line 1:
 ===== Foundations of privacy (24h, 3 ECTS) ===== ===== Foundations of privacy (24h, 3 ECTS) =====
  
-==== Teachers for 2017-18 ====+==== Teachers for 2019-20 ====
  
-  * [[http://www.lix.polytechnique.fr/~kostas/|Kostas Chatzikokolakis]], LIX, Ecole Polytechnique +    * [[http://www.lix.polytechnique.fr/~catuscia/|Catuscia Palamidessi]], LIX, Ecole Polytechnique 
-  * [[http://www.lix.polytechnique.fr/~catuscia/|Catuscia Palamidessi]], LIX, Ecole Polytechnique+    * [[http://webpages.lss.supelec.fr/perso/pablo.piantanida/Welcome.html|Pablo Piantanida]], CentraleSupélec
  
 ==== Exams ==== ==== Exams ====
  
-  * March 8th, 12h45 - 15h45+  * November 26, 12h45 - 15h45  
   * Only printouts of the slides and hand-written notes are allowed.   * Only printouts of the slides and hand-written notes are allowed.
  
Line 14: Line 14:
  
 The course aims at presenting modern approaches to privacy protection, in a The course aims at presenting modern approaches to privacy protection, in a
-wide range of applications such as anonymous communication systems, statistical databases, location based systems, information flow analysis in software, +wide range of applications such as statistical databases, location based systems, machine learning, and information flow analysis. 
-etc. We will put a particular emphasis on the foundational and formal aspects,+We will put a particular emphasis on the foundational and formal aspects,
 proposing rigorous definitions of privacy properties, and providing analyses and proposing rigorous definitions of privacy properties, and providing analyses and
 proofs of correctness of the methods to achieve them. In accordance with the proofs of correctness of the methods to achieve them. In accordance with the
 modern tendency, we will adopt a quantitative point of view, and reason in modern tendency, we will adopt a quantitative point of view, and reason in
-terms of degree of leakage, risk of privacy violation, etc. (rather than presence / +terms of degree of leakage, risk of privacy violation, etc.  
-absence of leakage, risk, etc.). In general, this will amount to take into account +In general, this will require to take into account 
-the probabilistic dimension, and formalize the protection of sensitive information in terms of bounds on the probabilistic knowledge of the adversary, and on+the probabilistic dimension,  
 +and formalize the protection of sensitive information  
 +in terms of bounds on the probabilistic knowledge  
 +of the adversary, and on
 the probability of success of its attacks. the probability of success of its attacks.
  
 ==== Plan of the course ==== ==== Plan of the course ====
  
-== Motivations, history and overview of applications (3h) == +== Motivations, history and overview (2h) == 
-  * Overview of applications (anonymous communication, statistical queries, side-channel analysis, location based systems) +  * Anonymity  
-  * Overview of attacks +  * k-anonymity 
-  * Traditional definitions: k-anonymity, non-interference, strong probabilistic anonymity+  * De-anonymization attacks
  
-== Quantitative Information Flow (9h) == +== Differential Privacy (4h) == 
-  * Vulnerability and entropy – operational interpretation +  * Definition  
-  * Information-theoretic approaches+  * Semantics  
 +  * Properties  
 +  * Implementation: Laplace, Geometric, Exponential noise 
 +  * Utility 
 +  * Trade-off between privacy and utility 
 + 
 +== Local Differential Privacy (4h) == 
 +  * Definition 
 +  * Implementation: k-RR 
 +  * Statistical utility 
 +  * Matrix inversion 
 +  * Iterative Bayesian update 
 + 
 +== d-Privacy (2h) == 
 +  * Definition 
 +  * Implementation: Laplace and Geometric noise 
 +  * Application to location privacy: Geo-indistinguishability 
 + 
 +== Quantitative Information Flow (3h) == 
 +  * Vulnerability and leakage – operational interpretation 
 +  * Information-theoretic approaches: Shannon entropy, Renyi min-entropy
   * Decision-theoretic approaches: g-leakage   * Decision-theoretic approaches: g-leakage
   * The lattice of information   * The lattice of information
   * Axiomatization   * Axiomatization
-  * Applications 
  
-== Statistical databases: Differential Privacy (9h) == +== Privacy issues in Machine Learning (6h) == 
-  * Privacy protection via anonymization techniques +  * A short introduction to machine learning and to Neural Networks 
-  * De-anonymization attacks +  * Model inversion attacks 
-  * Differential privacy: motivation, definition, semantics +  * Membership inference attacks
-  * Trade-off between privacy and utility +
-  * Extensions of differential privacy+
  
-== Location privacy (3h) == 
-  * Simple counter-measures, attacks 
-  * Optimal Bayesian approaches 
-  * Geo-indistinguishability 
  
 ==== Language ==== ==== Language ====
Line 57: Line 73:
 ==== Material ==== ==== Material ====
  
-  * Lecture 1: Motivationshistory, and applications. [[http://www.lix.polytechnique.fr/~catuscia/teaching/MPRI/17-18/lecture1-Catuscia.pdf|Slides Catuscia]],[[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/lecture1.pdf|Slides Kostas]] +  * Lecture 1: Anonymityk-anonymityde-anonymization attacks. Differential Privacy. Sensitivity of a query. The Laplace and the Geometric Mechanisms. [[http://www.lix.polytechnique.fr/~catuscia/teaching/MPRI/19-20/lecture1.pdf|Slides]]
- +
-  * Lecture 2: Differential Privacy. Sensitivity of a query. The Laplacian and the Geometric Mechanisms. [[http://www.lix.polytechnique.fr/~catuscia/teaching/MPRI/17-18/lecture2.pdf|Slides]] +
- +
-  * Lecture 3: Truncation. Utility. Optimal trade-off between Privacy and Utility. [[http://www.lix.polytechnique.fr/~catuscia/teaching/MPRI/17-18/lecture3.pdf|Slides]] +
- +
-  * Lecture 4: Exercises. Local Differential Privacy. [[http://www.lix.polytechnique.fr/~catuscia/teaching/MPRI/17-18/lecture4.pdf|Slides]] +
- +
-  * Lecture 5: Secrets and vulnerability. [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/lecture2.pdf|Slides]] +
- +
-  * Lecture 6: Channels. [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/lecture3.pdf|Slides]] +
- +
-  * Lecture 7: Leakage and capacity. [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/lecture4.pdf|Slides]] +
- +
-  * Lecture 8: Refinement, applications. [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/lecture5.pdf|Slides]] +
- +
-  * [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/allslides-print.pdf|All information flow slides]], for printing +
- +
-  * [[http://www.lix.polytechnique.fr/~kostas/teaching/mpri-2017-2018/exercises.pdf|Exercises]] for both parts+
  
 +  * Lecture 2: 
  
 
Universités partenaires Université Paris-Diderot
Université Paris-Saclay
ENS Cachan École polytechnique Télécom ParisTech
ENS
Établissements associés Université Pierre-et-Marie-Curie CNRS INRIA CEA