Arvind Narayanan - Profile on Academia.edu (original) (raw)

Papers by Arvind Narayanan

Research paper thumbnail of A Critical Look at Decentralized Personal Data Architectures

Abstract: While the Internet was conceived as a decentralized network, the most widely used web a... more Abstract: While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals.

Research paper thumbnail of Data Privacy: The Non-interactive Setting

The ease of large-scale data collection. Before the growth of the Internet, collection of data fr... more The ease of large-scale data collection. Before the growth of the Internet, collection of data from individuals on a national or global scale was feasible only for governments and very large corporations. The infrastructure required for collecting and aggregating data was either in the form of a door-to-door survey as in a census, or a pervasive physical presence, such as a large supermarket chain collecting data on people's shopping habits.

Research paper thumbnail of On the power of computational secret sharing

Secret sharing is a very important primitive in cryptography and distributed computing. In this w... more Secret sharing is a very important primitive in cryptography and distributed computing. In this work, we consider computational secret sharing (CSS) which provably allows a smaller share size (and hence greater efficiency) than its information-theoretic counterparts. Extant CSS schemes result in succinct share-size and are in a few cases, like threshold access structures, optimal.

Research paper thumbnail of On the Limits of Point Function Obfuscation

Abstract We study the problem of circuit obfuscation, ie, transforming the circuit in a way that ... more Abstract We study the problem of circuit obfuscation, ie, transforming the circuit in a way that hides everything except its input-output behavior. Barak et al. showed that a universal obfuscator that obfuscates every circuit class cannot exist, leaving open the possibility of special-purpose obfuscators.

Research paper thumbnail of On the feasibility of internet-scale author identification

Abstract We study techniques for identifying an anonymous author via linguistic stylometry, ie, c... more Abstract We study techniques for identifying an anonymous author via linguistic stylometry, ie, comparing the writing style against a corpus of texts of known authorship. We experimentally demonstrate the effectiveness of our techniques with as many as 100,000 candidate authors. Given the increasing availability of writing samples online, our result has serious implications for anonymity and free speech-an anonymous blogger or whistleblower may be unmasked unless they take steps to obfuscate their writing style.

Research paper thumbnail of Perfectly reliable message transmission

We consider the problem of reliable message transmission between two synchronous players connecte... more We consider the problem of reliable message transmission between two synchronous players connected by n wires, some t < n/2 of which may be faulty. We show how to get reliability "for free"-reliable transmission of b bits involves a total communication of only O(b) bits, when b is large enough. We also construct an efficient Perfectly Secure Message Transmission Protocol.

Research paper thumbnail of Practical pay TV schemes

We propose an efficient and robust Pay TV scheme for the case when there are a number of streams,... more We propose an efficient and robust Pay TV scheme for the case when there are a number of streams, as opposed to just one. In our model, the broadcast is divided into billing periods; during each billing period the entitlement of the users does not change. We achieve full flexibility with only a constant factor data redundancy. Our scheme has very little secure memory requirements and does not require the users' secure keys to be changed once they have been written into the secure memory.

Research paper thumbnail of Location privacy via private proximity testing

Abstract We study privacy-preserving tests for proximity: Alice can test if she is close to Bob w... more Abstract We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols that support private proximity testing at various levels of granularity. We study the use of “location tags” generated from the physical environment in order to strengthen the security of proximity testing. We implemented our system on the Android platform and report on its effectiveness.

Research paper thumbnail of Optimal perfectly secure message transmission

In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players ... more In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way communication); S has an ℓ-bit message that he wishes to send to R; after exchanging messages in phasesA phase is a send from S to R or from R\ bf R to S\ bf S or both simultaneously.

Research paper thumbnail of You Might Also Like: Privacy Risks of Collaborative Filtering

… and Privacy (SP), …, Jan 1, 2011

Many commercial websites use recommender systems to help customers locate products and content. M... more Many commercial websites use recommender systems to help customers locate products and content. Modern recommenders are based on collaborative filtering: they use patterns learned from users' behavior to make recommendations, usually in the form of related-items lists. The scale and complexity of these systems, along with the fact that their outputs reveal only relationships between items (as opposed to information about users), may suggest that they pose no meaningful privacy risk.

Research paper thumbnail of Myths and fallacies of “personally identifiable information”

Communications of the ACM, Jan 1, 2010

Research paper thumbnail of Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

Arxiv preprint arXiv:1102.4374, Jan 1, 2011

This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.c... more This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on realworld link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run.

Research paper thumbnail of Myths and fallacies of personally identifiable information

Communications of the ACM, Jan 1, 2010

Research paper thumbnail of Obfuscated databases and group privacy

… of the 12th ACM conference on …, Jan 1, 2005

We investigate whether it is possible to encrypt a database and then give it away in such a form ... more We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, we aim to restrict the set of queries that can be feasibly evaluated on the encrypted database.

Research paper thumbnail of Adnostic: Privacy preserving targeted advertising

17th Annual Network & …, Jan 1, 2010

Online behavioral advertising (OBA) refers to the practice of tracking users across web sites in ... more Online behavioral advertising (OBA) refers to the practice of tracking users across web sites in order to infer user interests and preferences. These interests and preferences are then used for selecting ads to present to the user. There is great concern that behavioral advertising in its present form infringes on user privacy. The resulting public debate -which includes consumer advocacy organizations, professional associations, and government agencies -is premised on the notion that OBA and privacy are inherently in conflict.

Research paper thumbnail of Fast dictionary attacks on passwords using time-space tradeoff

… of the 12th ACM conference on …, Jan 1, 2005

Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passw... more Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special characters. We demonstrate that as long as passwords remain human-memorable, they are vulnerable to "smart-dictionary" attacks even when the space of potential passwords is large.

Research paper thumbnail of De-anonymizing social networks

… 30th IEEE Symposium on Security and …, Jan 1, 2009

Operators of online social networks are increasingly sharing potentially sensitive information ab... more Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.

Research paper thumbnail of Robust de-anonymization of large sparse datasets

2008 IEEE Symposium on Security and …, Jan 1, 2008

We present a new class of statistical deanonymization attacks against high-dimensional micro-data... more We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge.

Research paper thumbnail of A Critical Look at Decentralized Personal Data Architectures

Abstract: While the Internet was conceived as a decentralized network, the most widely used web a... more Abstract: While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals.

Research paper thumbnail of Data Privacy: The Non-interactive Setting

The ease of large-scale data collection. Before the growth of the Internet, collection of data fr... more The ease of large-scale data collection. Before the growth of the Internet, collection of data from individuals on a national or global scale was feasible only for governments and very large corporations. The infrastructure required for collecting and aggregating data was either in the form of a door-to-door survey as in a census, or a pervasive physical presence, such as a large supermarket chain collecting data on people's shopping habits.

Research paper thumbnail of On the power of computational secret sharing

Secret sharing is a very important primitive in cryptography and distributed computing. In this w... more Secret sharing is a very important primitive in cryptography and distributed computing. In this work, we consider computational secret sharing (CSS) which provably allows a smaller share size (and hence greater efficiency) than its information-theoretic counterparts. Extant CSS schemes result in succinct share-size and are in a few cases, like threshold access structures, optimal.

Research paper thumbnail of On the Limits of Point Function Obfuscation

Abstract We study the problem of circuit obfuscation, ie, transforming the circuit in a way that ... more Abstract We study the problem of circuit obfuscation, ie, transforming the circuit in a way that hides everything except its input-output behavior. Barak et al. showed that a universal obfuscator that obfuscates every circuit class cannot exist, leaving open the possibility of special-purpose obfuscators.

Research paper thumbnail of On the feasibility of internet-scale author identification

Abstract We study techniques for identifying an anonymous author via linguistic stylometry, ie, c... more Abstract We study techniques for identifying an anonymous author via linguistic stylometry, ie, comparing the writing style against a corpus of texts of known authorship. We experimentally demonstrate the effectiveness of our techniques with as many as 100,000 candidate authors. Given the increasing availability of writing samples online, our result has serious implications for anonymity and free speech-an anonymous blogger or whistleblower may be unmasked unless they take steps to obfuscate their writing style.

Research paper thumbnail of Perfectly reliable message transmission

We consider the problem of reliable message transmission between two synchronous players connecte... more We consider the problem of reliable message transmission between two synchronous players connected by n wires, some t < n/2 of which may be faulty. We show how to get reliability "for free"-reliable transmission of b bits involves a total communication of only O(b) bits, when b is large enough. We also construct an efficient Perfectly Secure Message Transmission Protocol.

Research paper thumbnail of Practical pay TV schemes

We propose an efficient and robust Pay TV scheme for the case when there are a number of streams,... more We propose an efficient and robust Pay TV scheme for the case when there are a number of streams, as opposed to just one. In our model, the broadcast is divided into billing periods; during each billing period the entitlement of the users does not change. We achieve full flexibility with only a constant factor data redundancy. Our scheme has very little secure memory requirements and does not require the users' secure keys to be changed once they have been written into the secure memory.

Research paper thumbnail of Location privacy via private proximity testing

Abstract We study privacy-preserving tests for proximity: Alice can test if she is close to Bob w... more Abstract We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols that support private proximity testing at various levels of granularity. We study the use of “location tags” generated from the physical environment in order to strengthen the security of proximity testing. We implemented our system on the Android platform and report on its effectiveness.

Research paper thumbnail of Optimal perfectly secure message transmission

In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players ... more In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way communication); S has an ℓ-bit message that he wishes to send to R; after exchanging messages in phasesA phase is a send from S to R or from R\ bf R to S\ bf S or both simultaneously.

Research paper thumbnail of You Might Also Like: Privacy Risks of Collaborative Filtering

… and Privacy (SP), …, Jan 1, 2011

Many commercial websites use recommender systems to help customers locate products and content. M... more Many commercial websites use recommender systems to help customers locate products and content. Modern recommenders are based on collaborative filtering: they use patterns learned from users' behavior to make recommendations, usually in the form of related-items lists. The scale and complexity of these systems, along with the fact that their outputs reveal only relationships between items (as opposed to information about users), may suggest that they pose no meaningful privacy risk.

Research paper thumbnail of Myths and fallacies of “personally identifiable information”

Communications of the ACM, Jan 1, 2010

Research paper thumbnail of Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

Arxiv preprint arXiv:1102.4374, Jan 1, 2011

This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.c... more This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on realworld link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run.

Research paper thumbnail of Myths and fallacies of personally identifiable information

Communications of the ACM, Jan 1, 2010

Research paper thumbnail of Obfuscated databases and group privacy

… of the 12th ACM conference on …, Jan 1, 2005

We investigate whether it is possible to encrypt a database and then give it away in such a form ... more We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, we aim to restrict the set of queries that can be feasibly evaluated on the encrypted database.

Research paper thumbnail of Adnostic: Privacy preserving targeted advertising

17th Annual Network & …, Jan 1, 2010

Online behavioral advertising (OBA) refers to the practice of tracking users across web sites in ... more Online behavioral advertising (OBA) refers to the practice of tracking users across web sites in order to infer user interests and preferences. These interests and preferences are then used for selecting ads to present to the user. There is great concern that behavioral advertising in its present form infringes on user privacy. The resulting public debate -which includes consumer advocacy organizations, professional associations, and government agencies -is premised on the notion that OBA and privacy are inherently in conflict.

Research paper thumbnail of Fast dictionary attacks on passwords using time-space tradeoff

… of the 12th ACM conference on …, Jan 1, 2005

Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passw... more Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special characters. We demonstrate that as long as passwords remain human-memorable, they are vulnerable to "smart-dictionary" attacks even when the space of potential passwords is large.

Research paper thumbnail of De-anonymizing social networks

… 30th IEEE Symposium on Security and …, Jan 1, 2009

Operators of online social networks are increasingly sharing potentially sensitive information ab... more Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.

Research paper thumbnail of Robust de-anonymization of large sparse datasets

2008 IEEE Symposium on Security and …, Jan 1, 2008

We present a new class of statistical deanonymization attacks against high-dimensional micro-data... more We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge.