Presentation is loading. Please wait.

Presentation is loading. Please wait.

User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University.

Similar presentations


Presentation on theme: "User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University."— Presentation transcript:

1 User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University

2 The Problem Mobile devices becoming integrated into everyday life –Mobile communication –Sharing location information with others –Remote access to home –Mobile e-commerce Managing security and privacy policies is hard –Preferences hard to articulate –Policies hard to specify –Limited input and output Leads to new sources of vulnerability and frustration

3 Difficult to Build Usable Interfaces (a)(c)

4 Our Goal Develop better UIs for managing privacy and security on mobile devices –Simple ways of specifying policies –Clear notifications and explanations of what happened –Better visualizations to summarize results –Machine learning for learning preferences –Start with small evaluations, continue with large-scale ones Large multi-disciplinary team and project –Six faculty, 1.5 postdocs, six students –Roughly 1 year into project

5 Application Domains Contextual Instant Messaging People Finder Access Control to resources Some Challenges –Not being burdensome or annoying –Finding right balance of expressiveness and simplicity –Helping users understand capabilities and limitations –Providing enough value so that people will use our apps! Security & privacy our main concern, but not to users

6 Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

7 Contextual Instant Messaging Facilitate coordination and communication by letting people request contextual information via IM –Interruptibility (via SUBTLE toolkit) –Location (via Place Lab wifi positioning) –Active window Developed a custom client and robot on top of AIM –Client (Trillian plugin) captures and sends context to robot –People can query imbuddy411 robot for info “howbusyis username” –Robot also contains privacy rules governing disclosure

8 Contextual Instant Messaging Privacy Mechanisms Web-based specification of privacy preferences –Users can create groups and put screennames into groups –Users can specify what each group can see

9 Contextual Instant Messaging Privacy Mechanisms Notifications of requests

10 Contextual Instant Messaging Privacy Mechanisms Social translucency

11 Contextual Instant Messaging Privacy Mechanisms Audit logs

12 Contextual Instant Messaging Evaluation Recruited ten people for two weeks –Selected people highly active in IM (ie undergrads ) –Each participant had ~90 buddies and 1300 incoming and outgoing messages per week Notified other parties of imbuddy411 service –Update AIM profile to advertise –Would notify other parties at start of conversation Any predictions of results?

13 Contextual Instant Messaging Results Total of 242 requests for contextual information –53 distinct screen names, 13 repeat users

14 Contextual Instant Messaging Results 43 privacy groups, ~4 per participant –Groups organized as class, major, clubs, gender, work, location, ethnicity, family –6 groups revealed no information –7 groups disclosed all information Only two instances of changes to rules –In both cases, friend asked participant to increase level of disclosure

15 Contextual Instant Messaging Results Likert scale survey at end –1 is strongly disagree, 5 is strongly agree –All participants agreed contextual information sensitive Interruptibility 3.6, location 4.1, window 4.9 –Participants were comfortable using our controls (4.1) –Easy to understand (4.4) and modify (4.2) –Good sense of who had seen what (3.9) Participants also suggested improvements –Notification of offline requests –Better notifications to reduce interruptions (abnormal use) –Better summaries (“User x asked for location 5 times today”)

16 Contextual Instant Messaging Current Status Preparing for another round of deployment –Larger group of people –A few more kinds of contextual information Developing privacy controls that scale better –More people, more kinds of information

17 Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

18 People Finder Location useful for micro-coordination –Meeting up –Okayness checking Developed phone-based client –GSM localization (Intel) Conducted studies to see how people specify rules (& how well) See how well machine learning can learn preferences

19 People Finder Machine Learning Using case-based reasoning (CBR) –“My colleagues can only see my location on weekdays and only between 8am and 6pm” –It’s now 6:15pm, so the CBR might allow, or interactively ask Chose CBR over other machine learning –Better dialogs with users (ie more understandable) –Can be done interactively (rather than accumulating large corpus and doing post-hoc)

20 People Finder Study on Preferences and Rules First conducted informal studies to understand factors important for location disclosures –Asked people to describe in natural language –Social relation, time, location –“My colleagues can only see my location on weekdays and only between 8am and 6pm”

21 People Finder Study on Preferences and Rules Another study to see how well people could specify rules, and if machine learning could do better –13 participants (+1 for pilot study) –Specify rules at beginning of study –Presented a series of thirty scenarios –Shown what their rules would do, asked if correct and utility –Given option to change rule if desired

22 People Finder Study on Rules

23 People Finder Results – User Burden Mean (sec) Std dev (sec) Rule Creation 321.53206.10 Rule Maintenance 101.15110.02 Total 422.69213.48

24 People Finder Results – Accuracy

25 People Finder Current Conclusions Roughly 5 rules per participant Users not good at specifying rules –Time consuming & low accuracy (61%) even when they can refine their rules over time (67%) –Interesting contrast with imbuddy411, where people were comfortable Possible our scenarios biased towards exceptions CBR seems better in terms of accuracy and burden Additional experiments still needed

26 People Finder Current Work Small-scale deployment of phone-based People Finder with a group of friends –Still needs more value, people finder by itself not sufficient –Trying to understand pain points on next iteration Need more accurate location –GSM localization accuracy haphazard Integration with imbuddy411 –Smart phones expensive, IM vastly increases user base

27 Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

28 Grey – Access Control to Resources Distributed smartphone-based access control system –physical resources like office doors, computers, and coke machines –electronic ones like computer accounts and electronic files –currently only physical doors Proofs assembled from credentials –No central access control list –End-users can create flexible policies

29 Grey Creating Policies Proactive policies –Manually create a policy beforehand –“Alice can always enter my office” Reactive policies –Create a policy based on a request –“Can I get into your office?” –Grey sees who is responsible for resource, and forwards Might select from multiple people (owner, secretary, etc) –Can add the user, add time limits too

30 Grey Deployment at CMU 25 participants (9 part of the Grey team) Floor plan with Grey-enabled Bluetooth doors

31 Grey Evaluation Monitored Grey usage over several months Interviews with each participant every 4-8 weeks Time on task in using a shared kitchen door

32 Grey Results of Time on Task of a Shared Kitchen Door

33

34

35

36 Grey Surprises Grey policies did not mirror physical keys –Grey more flexible and easier to change Lots of non-research obstacles –user perception that the system was slow –system failures causing users to get locked out –need network effects to study some interesting issues Security is about unauthorized users out, our users more concerned with how easy for them to get in –never mentioned security concerns when interviewed

37 Grey Current work Iterating on the user interfaces –More wizard-based UIs for less-used features Adding more resources to control Visualizations of accesses –Relates to abnormal situations noted in contextual IM

38 Grey Current work in Visualizations

39 Concluding Remarks User-controllable privacy and security for three apps –Contextual instant messaging –People Finder –Grey distributed access control system Common threads –Simpler ways of specifying policies –Better notifications and explanations –Better visualizations –Machine learning for learning preferences

40 Concluding Remarks Some early lessons –Many indirect issues need to be addressed to study usable privacy and security (value proposition, network effects) –People seem willing to use apps if good enough control and feedback for privacy and security –Lots of iterative design needed

41 Acknowledgements NSF Cyber Trust Grant CNS-0627513 ARO DAAD19-02-1-0389 ("Perpetually Available and Secure Information Systems") to CMU’s CyLab Source: http://www.rudezone.com/cartoon4/wireless.html

42 People Finder Results – Accuracy


Download ppt "User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University."

Similar presentations


Ads by Google