skip to main content
10.1145/2046556acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'11: the ACM Conference on Computer and Communications Security Chicago Illinois USA 17 October 2011
ISBN:
978-1-4503-1002-4
Published:
17 October 2011
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is my great pleasure to welcome you to the 10th annual ACM Workshop on Privacy in the Electronic Society -- WPES 2011. The purpose of this workshop is to discuss problems of privacy in the global interconnected societies and to propose solutions to these problems. This year WPES continues to be a workshop at the ACM CCS conference.

The call for papers attracted 73 submissions from North America, South America, Africa, Asia, Australia, and Europe. This was a record number of submissions and each paper was reviewed by at least 3 program committee members, and sometimes 4. The program committee accepted 12 full papers and 9 short papers that cover a variety of topics, including social network privacy, cloud privacy, privacy policies, anonymity systems, privacy preferences, and location privacy. We hope that these proceedings will serve as a valuable reference for privacy researchers and developers.

Skip Table Of Content Section
SESSION: Privacy in new applications
research-article
Loose tweets: an analysis of privacy leaks on twitter

Twitter has become one of the most popular microblogging sites for people to broadcast (or "tweet") their thoughts to the world in 140 characters or less. Since these messages are available for public consumption, one may expect these tweets not to ...

research-article
Who clicks there!: anonymising the photographer in a camera saturated society

In recent years, social media has played an increasingly important role in reporting world events. The publication of crowd-sourced photographs is one of the reasons behind the high impact. However, the use of a camera can draw the photographer into a ...

research-article
Protecting against physical resource monitoring

This paper considers the problem of resource monitoring. We consider the scenario where an adversary is physically monitoring on the resource access, such as the electricity line or gas pipeline, of a user in order to learn private information about his ...

research-article
On the limits of privacy in reputation systems

This paper describes a formal model for multiple privacy notions that apply to reputation systems and shows that, for certain classes of systems, very strong privacy notions are unachievable. In particular, it is shown that, systems where a user's ...

research-article
Pythia: a privacy aware, peer-to-peer network for social search

Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ...

SESSION: Cryptographic solutions for privacy
research-article
Privacy-preserving smart metering

Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose ...

research-article
SPEcTRe: spot-checked private ecash tolling at roadside

Traditional stop-and-pay toll booths inconvenience drivers and are infeasible for complicated urban areas. As a way to minimize traffic congestion and avoid the inconveniences caused by toll booths, electronic tolling has been suggested. For example, as ...

research-article
Private data indexes for selective access to outsourced data

Cloud storage services have recently emerged as a successful approach for making resources conveniently available to large communities of users. Several techniques have been investigated for enabling such services, including encryption for ensuring data ...

research-article
Non-interactive distributed encryption: a new primitive for revocable privacy

In this paper we introduce and instantiate a new cryptographic primitive, called non-interactive distributed encryption, that allows a receiver to decrypt a ciphertext only if a minimum number of different senders encrypt the same plaintext. The new ...

SESSION: Network and system privacy
research-article
BridgeSPA: improving Tor bridges with single packet authorization

Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a ...

research-article
Website fingerprinting in onion routing based anonymization networks

Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and the content of communications from a local observer, i.e., an entity that can eavesdrop the traffic between the user and the first anonymization node. Especially ...

research-article
SPARC: a security and privacy aware virtual machinecheckpointing mechanism

Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back the VM to a previous "good" state in order to recover from a VM crash or to undo a previous VM ...

research-article
FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting

We introduce Faust, a solution to the "anonymous blacklisting problem:" allow an anonymous user to prove that she is authorized to access an online service such that if the user misbehaves, she retains her anonymity but will be unable to authenticate in ...

research-article
Privacy-preserving traffic padding in web-based applications

While web-based applications are gaining popularity, they also pose new security challenges. In particular, Chen et al. recently revealed that many popular Web applications actually leak out highly sensitive data from encrypted traffic due to side-...

research-article
Adapt-lite: privacy-aware, secure, and efficient mhealth sensing

As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to ...

SESSION: Data privacy
research-article
Cover locations: availing location-based services without revealing the location

Location-Based Services (LBSs) have been gaining popularity due to a wide range of interesting and important applications being developed. However, the users availing such services are concerned about their location privacy, in that they are forced to ...

research-article
Private searching for single and conjunctive keywords on streaming data

Current solutions for private searching on streaming data only support searching for "OR" of keywords or "AND" of two sets of keywords. In this paper, we extend the types of private queries to support searching on streaming data for an "OR" of a set of ...

research-article
Data mining without data: a novel approach to privacy-preserving collaborative distributed data mining

With the proliferation of organizations that independently collect various types of data, with the growing awareness of corporations and public to keep their sensitive data private, and with the ever-increasing need of government and corporate policy ...

research-article
I know where you live: analyzing privacy protection in public databases

Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property ...

research-article
Open Access
Privacy of data outsourced to a cloud for selected readers through client-side encryption

We propose a scheme using client-side encryption with symmetric keys for the privacy of data outsourced to the cloud for selected readers. The scheme is safe under the most popular "honest, but curious" model. Readers get the keys from access grants or ...

research-article
Compressive mechanism: utilizing sparse representation in differential privacy

Differential privacy provides the first theoretical foundation with provable privacy guarantee against adversaries with arbitrary prior knowledge. The main idea to achieve differential privacy is to inject random noise into statistical query results. ...

Contributors
  • Rutgers University–New Brunswick
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate106of355submissions,30%
YearSubmittedAcceptedRate
WPES'18251144%
WPES '17561425%
WPES '16721419%
WPES '15321134%
WPES '14672639%
WPES '131033029%
Overall35510630%