IDENTIFYING DATA 2016_17
Subject (*) PRIVACY PROTECTION Code 17665206
Study programme
Computer Engineering: Computer Security and Intelligent Systems (2013)
Cycle 2nd
Descriptors Credits Type Year Period
4.5 Optional 2Q
Language
Anglès
Department Computer Engineering and Mathematics
Coordinator
DOMINGO FERRER, JOSEP
E-mail josep.domingo@urv.cat
0
Lecturers
DOMINGO FERRER, JOSEP
SALAS PIÑÓN, JULIÁN
Web http://moodle.urv.cat
General description and relevant information This course introduces the right of individuals to protect their privacy. This right has been recognized by different government laws. These laws ensure that users' data collected by companies and governments will only be used for the purpose they were collected. However, there are cases where this information may be shared, e.g. population studies, the study of diseases, etc ... In these cases, there are techniques to guarantee the privacy of individuals and to allow the use of data. Finally, we describe several techniques to protect the users' privacy in online services.

Competences
Type A Code Competences Specific
 A1 Project, calculate and design products, processes and installations in all areas of computer engineering.
 A3 Perform mathematical modelling, calculation and simulation in company technology and engineering centres, particularly in tasks of research, development and innovation in all areas related to computer engineering.
 D1 Integrate the fundamental technology, applications, services and systems of computer engineering, in general, and in a broader, multidisciplinary context.
 T4 Design, develop, manage and evaluate mechanisms to certify and guarantee security in handling information and access to it in a local or distributed processing system.
 T5 Analyse the information needs considered in an environment and execute all stages of the construction process of an information system.
Type B Code Competences Transversal
 B2 Aplicar el pensament crític, lògic i creatiu, demostrant capacitat d’innovació.
 B3 Treballar de forma autònoma amb responsabilitat i iniciativa.
Type C Code Competences Nuclear
 C2 Be advanced users of the information and communication technologies
 C3 Be able to manage information and knowledge
 C5 Be committed to ethics and social responsibility as citizens and professionals

Learning outcomes
Type A Code Learning outcomes
 A1 Integrate theoretical knowledge into the realities to which it may apply.
 A3 Apply the techniques learned in a specific context.
 D1 Analyse the problems and their causes from a global focus in the medium and long term.
 T4 Design technology to guarantee privacy for scenarios of IT and telematics applications.
 T5 Identify the components of a decision-making problem and know how to decide the most suitable decision-making model.
Type B Code Learning outcomes
 B2 Identify things that need to be improved in complex situations and contexts.
Apply innovative techniques and obtain results.
 B3 Take correct decisions at key moments confidently, consistently and systematically.
Type C Code Learning outcomes
 C2 Understand the operating system as a hardware manager and the software as a working tool.
 C3 Locate and access information effectively and efficiently.
 C5 Respect fundamental rights and equality between men and women.

Contents
Topic Sub-topic
1. Introduction a. Basic concepts of privacy
b. Legal principles
c. Privacy by design
d. Design strategies for privacy

2. Data privacy techniques a. Authentication
b. Attribute-based Credentials.
c. Secure and private communications
d. Anonymity and pseudo-anonymity in communications.
e. Privacy in data storages
f. Privacy-preserving computations.
g. Techniques for improving transparency.

3. Privacy in data bases a. Owner's privacy del propietari (Privacy-preserving data mining).
b. User's privacy (private information retrieval).
c. Respondent's privacy (anonymization).
4. User's privacy a. Issues of private information retrieval (PIR).
b. Modifications to PIR based on single users.
c. Modifications to PIR based on p2p networks (P2P PIR).
d. Rational behaviour in P2P PIR.
5. Anonymization in data bases a. Basic concepts
b. Privacy models
c. Protection of tables
d. Protection of interactive data bases.
e. Protection of microdata
g. Evaluation of statistical disclosure control methods.
h. Anonymizing software


Planning
Methodologies  ::  Tests
  Competences (*) Class hours
Hours outside the classroom
(**) Total hours
Introductory activities
2 0.5 2.5
Lecture
B2
C3
C5
24 36 60
Practicals using information and communication technologies (ICTs) in computer rooms
A1
D1
T4
T5
B3
C2
C3
C5
14 21 35
Personal tuition
1 0 1
 
Extended-answer tests
A1
A3
T4
T5
B2
B3
C5
2 5 7
Objective short-answer tests
A1
A3
T4
T5
B2
B3
C5
2 5 7
 
(*) On e-learning, hours of virtual attendance of the teacher.
(**) The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies
  Description
Introductory activities The first session introduces the course, describing the objectives, schedule, and how the course will be assessed.
Lecture The teacher explains the units of the course.
Practicals using information and communication technologies (ICTs) in computer rooms There are four class works. All class works have several objectives to accomplish, by means of a set of exercises that students must complete.

The results obtained are discussed by the students at the end of each class.
Personal tuition Practicals using information and communication technologies (ICTs) in computer rooms:

The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle.

Lecture:

The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle.

Personalized attention
Description
Practicals using information and communication technologies (ICTs) in computer rooms: The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle. Lecture: The students can ask questions related with the subject to the teacher. They can do their questions in class, to his office in office hours, through email, or Moodle. The students can be attended out of office hours if they previously agree a meeting with the teacher.

Assessment
Methodologies Competences Description Weight        
Practicals using information and communication technologies (ICTs) in computer rooms
A1
D1
T4
T5
B3
C2
C3
C5
There are four class works. All class works have several objectives to accomplish by means of a set of exercises that students must complete.

The results obtained are discussed by the students at the end of each class.

The class work can be performed individually or in a group of two students.
25
Objective short-answer tests
A1
A3
T4
T5
B2
B3
C5
The students have to conduct a written test of the unit 5.

Passing this test is required to pass the course.
37.5
Extended-answer tests
A1
A3
T4
T5
B2
B3
C5
The students have to conduct a written test of the units 1, 2, 3 and 4.

Passing this test is required to pass the course.
37.5
Others  
 
Other comments and second exam session

Students who do not pass the subject in the continuous assessment have to carry out a examination on the second call, and deliver all class works. The exam will consist of two parts, corresponding to the two parts of the course (first part: units 1, 2, 3 and 4 - second part: unit 5). Each part is scored out of 10 points. The students have to obtain at least 4 in each of the parts to pass the examination, and the sum of the two parts must be greater than 10 points. The class-work must have a minimum of five to pass the course. Otherwise, the students can no pass the course.

Students may not bring any electronic devices on the written tests.


Sources of information

Basic

o   G. D’Acquisto, J. Domingo-Ferrer, P. Kikiras, V. Torra, Y.-A. De Montjoye i A. Bourka (2015) Privacy by Design in Big Data – An overview of privacy enhancing technologies in the era of big data analytics, European Union Agency for Network and Information Security-ENISA.

o   G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le Métayer, R. Tirtea i S. Schiffner (2015) Privacy and Data Protection by Design: From Policy to Engineering, European Union Agency for Network and Information Security-ENISA.

o   J. Domingo-Ferrer, D. Sánchez i J. Soria-Comas (2016) Database Anonymization: Privacy Models, Data Utility and Microaggregation-Based Inter-Model Connections, Morgan & Claypool.

o   A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, E. Schulte-Nordholt, K. Spicer i P.-P. de Wolf (2012) Statistical Disclosure Control, Wiley.

Complementary

Recommendations

Subjects that continue the syllabus
MULTIMEDIA SECURITY/17665211


Subjects that it is recommended to have taken before
CRYPTOLOGY AND INFORMATION SECURITY/17665108
 
Other comments
We recommend to have passed the subjects of "Cryptology and Information Security", and "Multimedia Security".
(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation.