Sean Peisert

ACM Distinguished Member

Home Page

Publications

Research Projects

Software

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

News

Bio

Links


Upcoming activities:

IEEE Security & Privacy (ongoing)

NSA SoS Best Paper Competition (annually, deadlines in April)

IEEE Cybersecurity Award for Practice (annually, deadlines in July)

IEEE S&P (Oakland) 2024 (May 20–23, 2024)

CSET 2024 (Aug. 2024)

NSPW 2024 Sept. 16–18, 2024)

NSF Cybersecurity Summit (Oct. 7–10 2024)

 
 

Research


I3P Data Sanitization

This seed project looked at defining means for understanding what data can be sanitized, and how. Traditionally, techniques for sanitizing or anonymizing data have included masking, adding noise, or enforcing regularity. They typically also assume a "closed world." However, these techniques often either make data unusable for research or operational purposes or fail to completely sanitize the data. Thus, our data sanitization work builds on past techniques by also using an "open world" assumption. We also ask, what are the relationships between data fields that would need to be made (e.g., by making associations from external datasets) in order to reveal certain information? Alternatively, what associations need to be protected in order to conceal certain information? Finally, given policy constraints by the different stakeholders (e.g., the person who the data that describes, operational personnel, and research personnel), can dataset X be sanitized in a way that satisfies the policies of all of those people, or would certain compromises to one or more policies need to be made? If so, what?

Researchers involved:

Faculty: Students:
  • Justin Cummins (UC Davis, M.S. 2011 → Square)
  • Anhad Singh (UC Davis)
Collaborators:

Sponsor: Institute for Information Infrastructure Protection (I3P)

Publications resulting from this project:

An Iterative Approach to Examining the Effectiveness of Data Sanitization
Anhad Singh,
Ph.D. Dissertation, Dept. of Computer Science, University of California, Davis, March 2015.

"Relationships in Data Sanitization: A Study in Scarlet"
Matt Bishop, Justin Cummins, Sean Peisert, Bhume Bhumitarana, Anhad Singh, Deborah Agarwal, Deborah Frincke, and Michael Hogarth,
Proceedings of the 2010 New Security Paradigms Workshop (NSPW), pp. 151–164
Concord, MA, September 21–23, 2010.

Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


Last modified: Sunday, 30-Sep-2018 10:15:30 PDT