- Sponsor:
- sigsac
It is my great pleasure to welcome you to the 10th annual ACM Workshop on Privacy in the Electronic Society -- WPES 2011. The purpose of this workshop is to discuss problems of privacy in the global interconnected societies and to propose solutions to these problems. This year WPES continues to be a workshop at the ACM CCS conference.
The call for papers attracted 73 submissions from North America, South America, Africa, Asia, Australia, and Europe. This was a record number of submissions and each paper was reviewed by at least 3 program committee members, and sometimes 4. The program committee accepted 12 full papers and 9 short papers that cover a variety of topics, including social network privacy, cloud privacy, privacy policies, anonymity systems, privacy preferences, and location privacy. We hope that these proceedings will serve as a valuable reference for privacy researchers and developers.
Proceeding Downloads
Loose tweets: an analysis of privacy leaks on twitter
Twitter has become one of the most popular microblogging sites for people to broadcast (or "tweet") their thoughts to the world in 140 characters or less. Since these messages are available for public consumption, one may expect these tweets not to ...
Who clicks there!: anonymising the photographer in a camera saturated society
In recent years, social media has played an increasingly important role in reporting world events. The publication of crowd-sourced photographs is one of the reasons behind the high impact. However, the use of a camera can draw the photographer into a ...
Protecting against physical resource monitoring
This paper considers the problem of resource monitoring. We consider the scenario where an adversary is physically monitoring on the resource access, such as the electricity line or gas pipeline, of a user in order to learn private information about his ...
On the limits of privacy in reputation systems
This paper describes a formal model for multiple privacy notions that apply to reputation systems and shows that, for certain classes of systems, very strong privacy notions are unachievable. In particular, it is shown that, systems where a user's ...
Pythia: a privacy aware, peer-to-peer network for social search
Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ...
Privacy-preserving smart metering
Smart grid proposals threaten user privacy by potentially disclosing fine-grained consumption data to utility providers, primarily for time-of-use billing, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose ...
SPEcTRe: spot-checked private ecash tolling at roadside
Traditional stop-and-pay toll booths inconvenience drivers and are infeasible for complicated urban areas. As a way to minimize traffic congestion and avoid the inconveniences caused by toll booths, electronic tolling has been suggested. For example, as ...
Private data indexes for selective access to outsourced data
Cloud storage services have recently emerged as a successful approach for making resources conveniently available to large communities of users. Several techniques have been investigated for enabling such services, including encryption for ensuring data ...
Non-interactive distributed encryption: a new primitive for revocable privacy
In this paper we introduce and instantiate a new cryptographic primitive, called non-interactive distributed encryption, that allows a receiver to decrypt a ciphertext only if a minimum number of different senders encrypt the same plaintext. The new ...
BridgeSPA: improving Tor bridges with single packet authorization
Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a ...
Website fingerprinting in onion routing based anonymization networks
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and the content of communications from a local observer, i.e., an entity that can eavesdrop the traffic between the user and the first anonymization node. Especially ...
SPARC: a security and privacy aware virtual machinecheckpointing mechanism
Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back the VM to a previous "good" state in order to recover from a VM crash or to undo a previous VM ...
FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting
We introduce Faust, a solution to the "anonymous blacklisting problem:" allow an anonymous user to prove that she is authorized to access an online service such that if the user misbehaves, she retains her anonymity but will be unable to authenticate in ...
Privacy-preserving traffic padding in web-based applications
While web-based applications are gaining popularity, they also pose new security challenges. In particular, Chen et al. recently revealed that many popular Web applications actually leak out highly sensitive data from encrypted traffic due to side-...
Adapt-lite: privacy-aware, secure, and efficient mhealth sensing
As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to ...
Cover locations: availing location-based services without revealing the location
Location-Based Services (LBSs) have been gaining popularity due to a wide range of interesting and important applications being developed. However, the users availing such services are concerned about their location privacy, in that they are forced to ...
Private searching for single and conjunctive keywords on streaming data
Current solutions for private searching on streaming data only support searching for "OR" of keywords or "AND" of two sets of keywords. In this paper, we extend the types of private queries to support searching on streaming data for an "OR" of a set of ...
Data mining without data: a novel approach to privacy-preserving collaborative distributed data mining
With the proliferation of organizations that independently collect various types of data, with the growing awareness of corporations and public to keep their sensitive data private, and with the ever-increasing need of government and corporate policy ...
I know where you live: analyzing privacy protection in public databases
Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property ...
Privacy of data outsourced to a cloud for selected readers through client-side encryption
We propose a scheme using client-side encryption with symmetric keys for the privacy of data outsourced to the cloud for selected readers. The scheme is safe under the most popular "honest, but curious" model. Readers get the keys from access grants or ...
Compressive mechanism: utilizing sparse representation in differential privacy
Differential privacy provides the first theoretical foundation with provable privacy guarantee against adversaries with arbitrary prior knowledge. The main idea to achieve differential privacy is to inject random noise into statistical query results. ...
Index Terms
- Proceedings of the 10th annual ACM workshop on Privacy in the electronic society