Scienze informatiche e dell'informazioneIngleseHugo

Abhishek Tiwari

Abhishek Tiwari
Diary of a Tech Savant and Servant Leader - All things technology, product, and engineering leadership.
Pagina inizialeAtom Foraggio
language
NewsArchivingOpen-accessScienze informatiche e dell'informazioneInglese
Pubblicato

Since 2009, I have published over 125 articles on this blog, creating a space where my work intersects with the rigor of academic research and the applied challenges of industry. This platform has grown beyond a personal archive. It has become a resource for researchers, industry practitioners, and students alike. It currently attracts more than 18k monthly visitor from across the globe.

ResearchPrivacy-engineeringPetsPptsScienze informatiche e dell'informazioneInglese
Pubblicato

Privacy in data systems has traditionally focused on protecting sensitive information as it enters a system - what we call input privacy. However, as systems become more complex and capable of inferring sensitive information from seemingly harmless data, the importance of output privacy has gained significant attention. Let’s explore these two crucial aspects of privacy protection and understand how different techniques address them.

ResearchPrivacy-engineeringPrivacy-attacksPetsScienze informatiche e dell'informazioneInglese
Pubblicato

Secure multi-party computation (SMPC) enables organisations to collaborate on sensitive data analysis without directly sharing raw information. However, seemingly harmless aggregate outputs, particularly private set intersection (PSI), can leak individual-level information when analysed strategically over time.

ResearchPrivacy-engineeringDifferential-privacyAttributionPrivacy-preserving-measurementScienze informatiche e dell'informazioneInglese
Pubblicato

Multi-touch attribution is considered as holy grail in advertising industry. As advertisers are targeting users with multiple advertisements across different platforms and publishers, understanding how each of these touch points contributes to conversion is crucial—but this understanding has traditionally come at the cost of user privacy.

ResearchPrivacy-engineeringDifferential-privacyScienze informatiche e dell'informazioneInglese
Pubblicato

Safeguarding individual privacy inherently means data minimisation i.e. limiting the collection and disposal of data. This principle has been a cornerstone of privacy advocacy and is even enshrined in regulations like the EU’s General Data Protection Regulation (GDPR). However, a research published by Ponte et. al (see here) is challenging this fundamental assumption, introducing what they call the “Where’s Waldo effect.

ResearchCryptographyPptsPetsScienze informatiche e dell'informazioneInglese
Pubblicato

Homomorphic encryption is a powerful cryptographic technique that allows computations to be performed on encrypted data without decrypting it first. This blog post will introduce the concept of homomorphic encryption and demonstrate implementations using Python. What is Homomorphic Encryption? Homomorphic encryption is a form of encryption that allows specific types of computations to be carried out on ciphertext.

ResearchPrivacy-engineeringScienze informatiche e dell'informazioneInglese
Pubblicato

Tech companies and large consumer businesses are grappling with how best to protect end-user data while maintaining pace of innovation and competitive edge. Two distinct approaches have emerged: top-down and bottom-up privacy. Understanding these approaches is essential for anyone involved in privacy engineering, product development, or driving tech policy decisions.

ResearchPrivacy-engineeringPrivacy-preserving-measurementPptsPetsScienze informatiche e dell'informazioneInglese
Pubblicato

In last post we covered, Privacy Preserving Measurement (PPM) and discussed how Distributed Aggregation Protocol (DAP) works (see here). Today, we’ll explore how to implement a simplified version of the DAP using Python with Prio3 as our Verifiable Distributed Aggregation Function (VDAF). This implementation will support multiple clients, demonstrating how DAP can aggregate data from multiple sources while maintaining privacy.

ResearchPrivacy-engineeringPrivacy-preserving-measurementPetsPptsScienze informatiche e dell'informazioneInglese
Pubblicato

In 1982, Andrew Yao proposed the Millionaire Problem which discusses how two millionaires can learn who is richest one without disclosing their actual wealth. They solve this problem by comparing their wealth using secure two party computation to ensure that they learn only the richest one and nothing else is revealed. The problem was later generalised for  secure multiparty computation by Goldreich et al in 1987.

ResearchPrivacy-engineeringDifferential-privacyScienze informatiche e dell'informazioneInglese
Pubblicato

The promise of differential privacy is compelling. It offers a rigorous, provable guarantee of individual privacy, even in the face of arbitrary background knowledge. Rather than relying on anonymization techniques that can often be defeated, differential privacy works by injecting carefully calibrated noise into computations.

ResearchPrivacy-engineeringDifferential-privacyPetsPptsScienze informatiche e dell'informazioneInglese
Pubblicato

Differential Privacy (DP) is a mathematical framework that protects individual privacy in data analysis while allowing useful insights to be extracted. It works by adding carefully calibrated noise to data or query results, ensuring that including or excluding any single individual’s data doesn’t significantly change the analysis outcomes.