Arvind Narayanan

Last updated

Arvind Narayanan
Stanford's privacy guy - Arvind Narayana.jpg
Alma mater
Known for De-anonymization
AwardsPrivacy Enhancing Technology Award
Scientific career
Institutions
Thesis Data Privacy: the Non-interactive Setting  (2009)
Doctoral advisor C. Pandu Rangan
Website www.cs.princeton.edu/~arvindn

Arvind Narayanan is a computer scientist and a professor at Princeton University. [1] Narayanan is recognized for his research in the de-anonymization of data. [2] [3]

Contents

Biography

Narayanan received technical degrees from the Indian Institute of Technology Madras in 2004. [4] His advisor was C. Pandu Rangan. Narayanan received his PhD in computer science from the University of Texas at Austin in 2009 under Vitaly Shmatikov. He worked briefly as a post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in September 2012. He was promoted to associate professor in 2014, [5] and to professor in 2022.

Career

In 2006 Netflix began the Netflix Prize competition for better recommendation algorithms. In order to facilitate the competition, Netflix released "anonymized" viewership information. However, Narayanan and advisor Vitaly Shmatikov showed possibilities for de-anonymizing this information by linking this anonymized data to publicly available IMDb user accounts. [6] This research led to higher recognition of de-anonymization techniques[ according to whom? ] and the importance of more rigorous anonymization techniques.[ citation needed ] Later Narayanan de-anonymized graphs from social networking [7] and writings from blogs. [8]

In mid-2010, Narayanan and Jonathan Mayer argued in favor of Do Not Track in HTTP headers. [9] [10] They built prototypes of Do Not Track for clients and servers. [11] Working with Mozilla they wrote the influential Internet Engineering Task Force Internet Draft of Do Not Track. [12] [13]

Narayanan has written extensively about software cultures. He has argued for more substantial teaching of ethics in computer science education [14] and usable[ clarification needed ] cryptography. [15] [16]

Awards

Related Research Articles

Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

Emailtracking is a method for monitoring whether the email message is read by the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date when an email is received or opened, as well as the IP address of the recipient.

The Netflix Prize was an open competition for the best collaborative filtering algorithm to predict user ratings for films, based on previous ratings without any other information about the users or films, i.e. without the users being identified except by numbers assigned for the contest.

<span class="mw-page-title-main">Peter Swire</span> American academic

Peter P. Swire is the J.Z. Liang Chair in the School of Cybersecurity and Privacy in the College of Computing at the Georgia Institute of Technology. Swire is also Professor of Law and Ethics in the Scheller College of Business and has an appointment by courtesy with the School of Public Policy. He is an internationally recognized expert in privacy law. Swire is also a senior fellow at the Future of Privacy Forum and has served on the National Academies of Science and Engineering Forum on Cyber Resilience. During the Clinton administration, he became the first person to hold the position of Chief Counselor for Privacy in the Office of Management and Budget. In this role, he coordinated administration policy on privacy and data protection, including interfacing with privacy officials in foreign countries. He may be best known for shaping the Health Insurance Portability and Accountability Act Privacy Rule while serving as the Chief Counselor for Privacy. In November 2012 he was named as co-chair of the Tracking Protection Working Group of the World Wide Web Consortium (W3C), to attempt to mediate a global Do Not Track standard. In August 2013, President Obama named Swire as one of five members of the Director of National Intelligence Review Group on Intelligence and Communications Technologies.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide volunteer overlay network that consists of more than seven thousand relays.

<span class="mw-page-title-main">Cynthia Dwork</span> American computer scientist

Cynthia Dwork is an American computer scientist best known for her contributions to cryptography, distributed computing, and algorithmic fairness. She is one of the inventors of differential privacy and proof-of-work.

<span class="mw-page-title-main">Evercookie</span> JavaScript application programming interface

Evercookie is a JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. It was created by Samy Kamkar in 2010 to demonstrate the possible infiltration from the websites that use respawning. Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.

Khaled El Emam is a co-founder and Director at Replica Analytics. El Emam is also a senior scientist at the Children's Hospital of Eastern Ontario (CHEO) Research Institute and director of the multi-disciplinary Electronic Health Information Laboratory, conducting academic research on de-identification and re-identification risk. As of 2022, El-Emam has served as Editor-in-Chief of JMIR AI, a journal focused on research and applications for the health AI community.

Quasi-identifiers are pieces of information that are not of themselves unique identifiers, but are sufficiently well correlated with an entity that they can be combined with other quasi-identifiers to create a unique identifier.

Moses Samson Charikar is an Indian computer scientist who works as a professor at Stanford University. He was previously a professor at Princeton University. The topics of his research include approximation algorithms, streaming algorithms, and metric embeddings. He is known for the creation of the SimHash algorithm used by Google for near duplicate detection.

Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.

k-anonymity is a property possessed by certain anonymized data. The term k-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in a paper published in 1998, although the concept dates to a 1986 paper by Tore Dalenius.

<span class="mw-page-title-main">Jonathan Mayer</span> American computer scientist and lawyer

Jonathan Mayer is an American computer scientist and lawyer. He is an Assistant Professor of Computer Science and Public Affairs at Princeton University affiliated with the Center for Information Technology Policy, and was previously a PhD student in computer science at Stanford University and a fellow at the Center for Internet and Society and the Center for International Security and Cooperation. During his graduate studies he was a consultant at the California Department of Justice.

Canvas fingerprinting is one of a number of browser fingerprinting techniques for tracking online users that allow websites to identify and track visitors using the HTML5 canvas element instead of browser cookies or other similar means. The technique received wide media coverage in 2014 after researchers from Princeton University and KU Leuven University described it in their paper The Web never forgets.

Data re-identification or de-anonymization is the practice of matching anonymous data with publicly available information, or auxiliary data, in order to discover the person the data belong to. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process.

<span class="mw-page-title-main">Machine Identification Code</span> Digital watermark which certain printers leave

A Machine Identification Code (MIC), also known as printer steganography, yellow dots, tracking dots or secret dots, is a digital watermark which certain color laser printers and copiers leave on every printed page, allowing identification of the device which was used to print a document and giving clues to the originator. Developed by Xerox and Canon in the mid-1980s, its existence became public only in 2004. In 2018, scientists developed privacy software to anonymize prints in order to support whistleblowers publishing their work.

Stuart Haber is an American cryptographer and computer scientist, known for his contributions in cryptography and privacy-preserving technologies and widely recognized as the co-inventor of the blockchain. His 1991 paper "How to Time-Stamp a Digital Document”, co-authored with W. Scott Stornetta, won the 1992 Discover Award for Computer Software and is considered to be one of the most important papers in the development of cryptocurrencies.

Vitaly Shmatikov is a professor in computer security at Cornell Tech.

References

  1. "Board approves 12 faculty promotions" . Retrieved 19 October 2022.
  2. Dan Grech, Archived 28 March 2014 at the Wayback Machine , Princeton Alumni Weekly, 8/1/14
  3. Kim Zetter, Archived 22 February 2014 at the Wayback Machine , Wired, 18/6/12
  4. "Arvind Narayanan @ Theory Group, CSE, IITM". Archived from the original on 7 April 2014. Retrieved 28 March 2014.
  5. "Board approves seven faculty appointments". Archived from the original on 7 April 2014. Retrieved 28 March 2014.
  6. Bruce Schneier, "Why 'Anonymous' Data Sometimes Isn't". Archived from the original on 30 March 2014. Retrieved 28 March 2014., 13/12/07
  7. "Social sites dent privacy efforts". 27 March 2009. Archived from the original on 31 March 2014. Retrieved 28 March 2014.
  8. On The Media, Archived 31 March 2014 at the Wayback Machine , 2/3/12
  9. ""Do Not Track" Explained « 33 Bits of Entropy". Archived from the original on 24 September 2010. Retrieved 28 March 2014.
  10. "Archived copy" (PDF). Archived (PDF) from the original on 11 September 2012. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  11. "Do Not Track - Universal Web Tracking Opt Out". Archived from the original on 13 February 2014. Retrieved 28 March 2014.
  12. "Draft-mayer-do-not-track-00". Archived from the original on 7 January 2016. Retrieved 28 March 2014.
  13. "Summary of W3C DNT Workshop Submissions". Archived from the original on 28 March 2014. Retrieved 28 March 2014.
  14. "Why Software Engineering Courses Should Include Ethics Coverage". Archived from the original on 31 March 2014. Retrieved 28 March 2014.
  15. "Archived copy" (PDF). Archived (PDF) from the original on 29 October 2019. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  16. "Archived copy" (PDF). Archived (PDF) from the original on 24 July 2014. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  17. "President Donald J. Trump Announces Recipients of the Presidential Early Career Award for Scientists and Engineers". whitehouse.gov . 2 July 2019. Archived from the original on 21 March 2021. Retrieved 3 August 2019 via National Archives.
  18. "PET Award".