Arvind Narayanan

Last updated

Arvind Narayanan
Stanford's privacy guy - Arvind Narayana.jpg
Alma mater
Known for De-anonymization
AwardsPrivacy Enhancing Technology Award
Scientific career
Institutions
Thesis Data Privacy: the Non-interactive Setting  (2009)
Doctoral advisor C. Pandu Rangan
Website www.cs.princeton.edu/~arvindn

Arvind Narayanan is a computer scientist and a professor at Princeton University. [1] Narayanan is recognized for his research in the de-anonymization of data. [2] [3] He is currently the director of Princeton's Center for Information Technology Policy. [4]

Contents

Biography

Narayanan received technical degrees from the Indian Institute of Technology Madras in 2004. [5] His advisor was C. Pandu Rangan. Narayanan received his PhD in computer science from the University of Texas at Austin in 2009 under Vitaly Shmatikov. He worked briefly as a post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in September 2012. He was promoted to associate professor in 2014, [6] and to professor in 2022.

Career

In 2006 Netflix began the Netflix Prize competition for better recommendation algorithms. In order to facilitate the competition, Netflix released "anonymized" viewership information. However, Narayanan and advisor Vitaly Shmatikov showed possibilities for de-anonymizing this information by linking this anonymized data to publicly available IMDb user accounts. [7] This research led to higher recognition of de-anonymization techniques[ according to whom? ] and the importance of more rigorous anonymization techniques.[ citation needed ] Later Narayanan de-anonymized graphs from social networking [8] and writings from blogs. [9]

In mid-2010, Narayanan and Jonathan Mayer argued in favor of Do Not Track in HTTP headers. [10] [11] They built prototypes of Do Not Track for clients and servers. [12] Working with Mozilla they wrote the influential Internet Engineering Task Force Internet Draft of Do Not Track. [13] [14]

Narayanan has written extensively about software cultures. He has argued for more substantial teaching of ethics in computer science education [15] and usable[ clarification needed ] cryptography. [16] [17]

Awards

Related Research Articles

John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platforms. It is among the most frequently used password testing and breaking programs as it combines a number of password crackers into one package, automatically detects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix versions, Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL, and others.

<span class="mw-page-title-main">Edward Felten</span> American computer scientist (born 1963)

Edward William Felten is an American computer scientist. At Princeton University, he served as the Robert E. Kahn Professor of Computer Science and Public Affairs, as well as being director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019. In the Obama administration, he served as chief technologist of the Federal Trade Commission from 2011 to 2012 and as deputy chief technology officer of the United States from 2015 to 2017. Felten retired from Princeton University in July 2021.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

Email tracking or email tracker is a method for monitoring whether the email message is read by the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date when an email is received or opened, as well as the IP address of the recipient.

The Netflix Prize was an open competition for the best collaborative filtering algorithm to predict user ratings for films, based on previous ratings without any other information about the users or films, i.e. without the users being identified except by numbers assigned for the contest.

<span class="mw-page-title-main">Western School of Technology</span> Public school in Catonsville, Maryland, United States

Western School of Technology and Environmental Science (WSTES), also known as Western Tech, is a public magnet high school in Catonsville, Maryland, United States. The school's main focuses are its twelve magnet programs pertaining to specific careers. In December 2013, Western Tech was named one of six public Blue Ribbon Schools in Maryland for 2014. On September 30, 2014, Western earned its status as a National Blue Ribbon School, becoming the seventeenth school in Baltimore County since 1994 to receive this honor.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

<span class="mw-page-title-main">Cynthia Dwork</span> American computer scientist

Cynthia Dwork is an American computer scientist renowned for her contributions to cryptography, distributed computing, and algorithmic fairness. She is one of the inventors of differential privacy and proof-of-work.

<span class="mw-page-title-main">Evercookie</span> JavaScript application programming interface

Evercookie is an open-source JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. This behavior is known as a Zombie cookie. It was created by Samy Kamkar in 2010 to demonstrate the possible infiltration from the websites that use respawning. Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.

Quasi-identifiers are pieces of information that are not of themselves unique identifiers, but are sufficiently well correlated with an entity that they can be combined with other quasi-identifiers to create a unique identifier.

Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.

k-anonymity is a property possessed by certain anonymized data. The term k-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in a paper published in 1998, although the concept dates to a 1986 paper by Tore Dalenius.

<span class="mw-page-title-main">Jonathan Mayer</span> American computer scientist and lawyer

Jonathan Mayer is an American computer scientist and lawyer. He is an Associate Professor of Computer Science and Public Affairs at Princeton University affiliated with the Center for Information Technology Policy, and was previously a PhD student in computer science at Stanford University and a fellow at the Center for Internet and Society and the Center for International Security and Cooperation. During his graduate studies he was a consultant at the California Department of Justice.

Canvas fingerprinting is one of a number of browser fingerprinting techniques for tracking online users that allow websites to identify and track visitors using the HTML5 canvas element instead of browser cookies or other similar means. The technique received wide media coverage in 2014 after researchers from Princeton University and KU Leuven University described it in their paper The Web never forgets.

Data re-identification or de-anonymization is the practice of matching anonymous data with publicly available information, or auxiliary data, in order to discover the person to whom the data belongs. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process.

<span class="mw-page-title-main">Printer tracking dots</span> Digital watermark tracking code produced by many printers

Printer tracking dots, also known as printer steganography, DocuColor tracking dots, yellow dots, secret dots, or a machine identification code (MIC), is a digital watermark which many color laser printers and photocopiers produce on every printed page that identifies the specific device that was used to print the document. Developed by Xerox and Canon in the mid-1980s, the existence of these tracking codes became public only in 2004.

Wakefield Scott Stornetta is an American physicist and scientific researcher. His 1991 paper "How to Time-Stamp a Digital Document”, co-authored with Stuart Haber, won the 1992 Discover Award for Computer Software and is considered to be one of the most important papers in the development of cryptocurrencies.

Stuart Haber is an American cryptographer and computer scientist, known for his contributions in cryptography and privacy-preserving technologies and widely recognized as the co-inventor of the blockchain. His 1991 paper "How to Time-Stamp a Digital Document”, co-authored with W. Scott Stornetta, won the 1992 Discover Award for Computer Software and is considered to be one of the most important papers in the development of cryptocurrencies.

Vitaly Shmatikov is a professor in computer security at Cornell Tech.

References

  1. "Board approves 12 faculty promotions" . Retrieved 19 October 2022.
  2. Dan Grech, Archived 28 March 2014 at the Wayback Machine , Princeton Alumni Weekly, 8/1/14
  3. Kim Zetter, Archived 22 February 2014 at the Wayback Machine , Wired, 18/6/12
  4. "Arvind Narayanan". Center for Information Technology Policy. Retrieved 30 November 2024.
  5. "Arvind Narayanan @ Theory Group, CSE, IITM". Archived from the original on 7 April 2014. Retrieved 28 March 2014.
  6. "Board approves seven faculty appointments". Archived from the original on 7 April 2014. Retrieved 28 March 2014.
  7. Bruce Schneier, "Why 'Anonymous' Data Sometimes Isn't". Archived from the original on 30 March 2014. Retrieved 28 March 2014., 13/12/07
  8. "Social sites dent privacy efforts". 27 March 2009. Archived from the original on 31 March 2014. Retrieved 28 March 2014.
  9. On The Media, Archived 31 March 2014 at the Wayback Machine , 2/3/12
  10. ""Do Not Track" Explained « 33 Bits of Entropy". Archived from the original on 24 September 2010. Retrieved 28 March 2014.{{cite web}}: CS1 maint: unfit URL (link)
  11. "Archived copy" (PDF). Archived (PDF) from the original on 11 September 2012. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  12. "Do Not Track - Universal Web Tracking Opt Out". Archived from the original on 13 February 2014. Retrieved 28 March 2014.
  13. Mayer, Jonathan; Narayanan, Arvind; Stamm, Sid (7 March 2011). "Draft-mayer-do-not-track-00". Archived from the original on 7 January 2016. Retrieved 28 March 2014.
  14. "Summary of W3C DNT Workshop Submissions". 5 May 2011. Archived from the original on 28 March 2014. Retrieved 28 March 2014.
  15. "Why Software Engineering Courses Should Include Ethics Coverage". March 2014. Archived from the original on 31 March 2014. Retrieved 28 March 2014.
  16. "Archived copy" (PDF). Archived (PDF) from the original on 29 October 2019. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  17. "Archived copy" (PDF). Archived (PDF) from the original on 24 July 2014. Retrieved 28 March 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  18. "President Donald J. Trump Announces Recipients of the Presidential Early Career Award for Scientists and Engineers". whitehouse.gov . 2 July 2019. Archived from the original on 21 March 2021. Retrieved 3 August 2019 via National Archives.
  19. "PET Award".