Some interesting topics

2019/05/21 Research


There are some interesting topics

  1. Game Theory Meets Multi-party Access Control:
    In multi-party access control, several agents are authorized to make a decision (permit or deny) about an access request for co-owned resource, e.g. a photo shared in social network. The main issue in multi-party access control arises from privacy conflicts in collaborative management of the shared data. In practice, stakeholders might prefer to maximize their own profit without considering the benefit of entire system. The goal of this project is to formulate multi-party access control as a game that models the interaction between stakeholders. The participated stakeholders are considered as the players of the game where their highest rewards is obtained when the privacy requirements is relaxed as much as possible. To this end, Nash Equilibrium needs to be set in the point that the best balance between privacy and system efficiency is guaranteed.
    • Suggested reading:
      1. Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang. Game Theoretic Analysis of Multiparty Access Control in Online Social Networks, Proceedings of the 19th ACM symposium on Access control models and technologies, 2014
      2. Fang Liu , Li Pan , Li-hong Yao. Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks, IEEE International Conference on Data Science in Cyberspace (DSC), 2018.
      3. Tansu Alpcan , Lacra Pavel. Nash Equilibrium Design and Optimization. International Conference on Game Theory for Networks, 2009.
  2. Privacy Preserving Stream Data Analysis:
    Streaming data is data that is continuously generated by different sources. As an example consider the application in finance where it allows to track changes in the stock market in real time, computes value-at-risk, and automatically rebalances portfolios based on stock price movements. It is on the global benefit of organizations, companies, individuals to complete their knowledge by sharing the stream data continuously. However, the data holders are unwilling to publish their original datasets due to privacy issues. In this project we plan to perform analysis on distributed stream data, while the privacy requirements of data owners needs to be preserved dynamically.
    • Suggested reading:
      1. Jingchao Sun , Rui Zhang , Jinxue Zhang , Yanchao Zhang, PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016.Battista Biggio , Giorgio Fumera , Fabio Roli, Design of robust classifiers for adversarial environments, IEEE International Conference on Systems, Man, and Cybernetics, 2011.
      2. Battista Biggio, Giorgio Fumera, Fabio Roli, Multiple classifier systems for robust classifier design in adversarial environments, International Journal of Machine Learning and Cybernetics, 2010.
  3. Game Theory Meets Privacy-preserving Collaborative Data Classification:
    Companies, organization, and even individuals find mutual benefits in sharing their own information to make better decisions or to increase their revenues. However, generally for privacy concerns data holders are unwilling to share their original data, but they are interested in obtaining more complete knowledge out of shared data. Thence, it is essential to define a platform in which several aspects of data-sharing come under consideration and through a game theoretic approach all parties relax their privacy requirements as much as possible to obtain a more effective output. The goal of this project is to model privacy-preserving data-sharing as a game in which several aspects of data-sharing come under consideration: 1) the value of shared data (freshness, size,..), 2) privacy gain (in terms of anonymization or differential privacy), 3) trust, 4) utility of result, etc. The output of the game is setting the Nash Equilibrium in the point that the best balance in terms of utility and privacy is obtained.
    • Suggested reading:
      1. Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Jean-Pierre Hubaux, Game Theory Meets Network Security and Privacy, ACM Computing Surveys (CSUR) Journal, 2013.
      2. Aron Laszka , Mark Felegyhazi , Levente Butty´an, A Survey of Interdependent Security Games, ACM Computing Surveys (CSUR) Journal, 2014.
  4. The Privacy of Collaborative Classifier Output:
    Privacy preserving data mining has focused on obtaining valid result when the input data is private. For example, secure multi-party computation techniques are utilized to construct a data-mining algorithm on whole distributed data, without revealing the original data. However, these approaches still might leave potential privacy breach. The aim of this project is to investigate how the output of collaborative classifier construction over private data might violate the privacy, and to find the solutions to address these privacy breaches.
    • Suggested reading:
      1. Murat Kantarcioglu, Jiashun Jin, Chris Clifton; When do Data Mining Results Violate Privacy?, ACM SIGKDD International conference on Knowledge discovery and data mining, 2004.Radhika Kotecha, Sanjay Garg; Preserving output-privacy in data stream classification, Progress in Artificial Intelligence, June 2017, Volume 6, Issue 2, pp 87–10.
      2. TING WANG, LING LIU, Output Privacy in Data Mining, ACM Transactions on Database Systems, 2011.



    Table of Contents