Skip to main content

Showing 1–4 of 4 results for author: Kellaris, G

.
  1. arXiv:1809.04103  [pdf, other

    cs.HC

    Usable Differential Privacy: A Case Study with PSI

    Authors: Jack Murtagh, Kathryn Taylor, George Kellaris, Salil Vadhan

    Abstract: Differential privacy is a promising framework for addressing the privacy concerns in sharing sensitive datasets for others to analyze. However differential privacy is a highly technical area and current deployments often require experts to write code, tune parameters, and optimize the trade-off between the privacy and accuracy of statistical releases. For differential privacy to achieve its potent… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 17 pages

  2. arXiv:1710.00714  [pdf, other

    cs.CR cs.DC

    Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy

    Authors: Ata Turk, Mayank Varia, Georgios Kellaris

    Abstract: Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public clou… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 6 pages, ICDM PAIS

  3. $\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy

    Authors: Dmytro Bogatov, Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill

    Abstract: As organizations struggle with processing vast amounts of information, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. A rich collection of attacks on such systems has emerged. Even with strong cryptography, just communication vol… ▽ More

    Submitted 27 September, 2021; v1 submitted 5 June, 2017; originally announced June 2017.

    Comments: Camera-ready version for ACM CCS 2021

    Journal ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21)

  4. arXiv:1504.03440  [pdf, other

    cs.DB

    Engineering Methods for Differentially Private Histograms: Efficiency Beyond Utility

    Authors: Georgios Kellaris, Stavros Papadopoulos, Dimitris Papadias

    Abstract: Publishing histograms with $ε$-differential privacy has been studied extensively in the literature. Existing schemes aim at maximizing the utility of the published data, while previous experimental evaluations analyze the privacy/utility trade-off. In this paper we provide the first experimental evaluation of differentially private methods that goes beyond utility, emphasizing also on another impo… ▽ More

    Submitted 20 April, 2017; v1 submitted 14 April, 2015; originally announced April 2015.