Show simple item record

dc.contributor.advisorMuriel M̌dard.en_US
dc.contributor.authorSalamatian, Salman.en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2021-01-06T20:17:34Z
dc.date.available2021-01-06T20:17:34Z
dc.date.copyright2020en_US
dc.date.issued2020en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/129304
dc.descriptionThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, September, 2020en_US
dc.descriptionCataloged from student-submitted PDF of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 143-153).en_US
dc.description.abstractThe tremendous increase of personal data being shared online, along with the rapid development of data mining techniques is a serious threats to privacy and security, as evidenced by the numerous privacy and security scandals of the past several years. At their core, the new privacy and security challenges that the big data revolution poses are due to the unclear boundary between data shared willingly, which is deemed not-sensitive, and the sensitive data that one wants to keep private. Traditional tools in security and privacy provide protection by encrypting personal data, but this method is not sustainable when it is unclear whether, or how much, the data is sensitive to begin with. The premise of this thesis is that information theoretic tools and insights are useful to identify how releasing personal data can impact privacy and security, and can serve as a design driver for building privacy preserving, and security enhancing systems.en_US
dc.description.abstractIn particular, we will be focused on two types of attacks. In the first, we consider how a user may release some personal data (e.g. movie ratings) in exchange for a service (e.g. movie recommendations), while simultaneously not leaking information about a sensitive attribute correlated with the personal data (e.g. political orientation). To this end, we design a privacy framework which captures the inference threat of releasing data, and use the latter to find optimal privacy-preserving mechanisms, which allows the user to trade utility for privacy. In the second part, we look at brute-force attacks where an adversary attempts to breach into a password secured system by querying potential passwords. Users of such systems are likely to generate poor passwords, re-use passwords across systems, and especially susceptible to targeted attacks if their password is correlated with personal data that is available online.en_US
dc.description.abstractWe consider various setups under which Brute-force attacks occur, and analyze the security guarantees one obtain via Guesswork - an information theoretic quantity that is a surrogate for the computational effort than the attacker has to perform. The analysis of both attacks reveals that data is a precious commodity which should be handled with care, and how the entire data acquisition and communication pipeline can come under attack. Additionally, Information Theory and Statistics offers a dimension of tools which is complementary to the existing ones, while still capturing the fundamentals of the security and privacy threats in the digital age.en_US
dc.description.statementofresponsibilityby Salman Salamatian.en_US
dc.format.extent153 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleStatistical privacy and securityen_US
dc.typeThesisen_US
dc.description.degreePh. D.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.oclc1227740720en_US
dc.description.collectionPh.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienceen_US
dspace.imported2021-01-06T20:17:33Zen_US
mit.thesis.degreeDoctoralen_US
mit.thesis.departmentEECSen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record