An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 ICS-FORTH Dimitris Plexousakis, Pisa, February 2001 The CYCLADES Mediator Service Dimitris Plexousakis Computer Science Department, University.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
An Architecture for Privacy-Sensitive Ubiquitous Computing 1 Cindy Nguyen An Architecture for Privacy-Sensitive Ubiquitous Computing By: Cindy Nguyen University.
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
International Conference on Cloud and Green Computing (CGC2011, SCA2011, DASC2011, PICom2011, EmbeddedCom2011) University.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing Eric Chung Carnegie Mellon Jason Hong Carnegie Mellon Madhu Prabaker University.
Reference: [1] TeamSpace paper
SERC Security Systems Engineering Initiative Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University.
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
UbiComp ’03 – Context Awareness Session liquid context-aware distributed queries jeffrey heer alan newberger chris beckmann jason i. hong group.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.
Pattern Group A – Ubiquitous Computing Genres Upfront Value Proposition (A1) Personal Ubiquitous Computing (A2) Ubiquitous Computing for Groups (A3) Ubiquitous.
Cloud Usability Framework
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
The Design Discipline.
2005/05/25 Unified Modeling Lanauage 1 Introduction to Unified Modeling Language (UML) – Part One Ku-Yaw Chang Assistant Professor.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
2131 Structured System Analysis and Design By Germaine Cheung Hong Kong Computer Institute Lecture 2 (Chapter 2) Information System Building Blocks.
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Georgia Institute of Technology LEE SEMUN.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
Lecture 9: Chapter 9 Architectural Design
Asa MacWilliams Lehrstuhl für Angewandte Softwaretechnik Institut für Informatik Technische Universität München June 27, 2005 A Decentralized.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Near East University Department of Computer Engineering E-COMMERCE FOR LAPTOPS SELLING COMPANY Abdul Halim Abu Kuwaik
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Tools for Web Design and for Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
History of Context-Aware Computing 1991 the term ‘pervasive’ introduced by Weiser 1992 Active Badge Location System (one of the first context- aware systems)
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Slide 1 What the business needs  How to build it Functional requirements  + Nonfunctional requirements Performance System environment issues Problem.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing December 9, 2009 Project Presentation.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.
NeOn Components for Ontology Sharing and Reuse Mathieu d’Aquin (and the NeOn Consortium) KMi, the Open Univeristy, UK
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
The WEB Expert learn & Krisztián Ohr Webmark Europe Kft.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Papier-Mache: Toolkit Support for Tangible Input HCI Group University of California Scott R. Klemmer Jack Li James Lin DUB Group University of Washington.
Chapter 9 Architectural Design. Why Architecture? The architecture is not the operational software. Rather, it is a representation that enables a software.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Dr. Ir. Yeffry Handoko Putra
Overview of MDM Site Hub
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Chapter 9 Architectural Design.
3rd Studierstube Workshop TU Wien
Network Architecture By Dr. Shadi Masadeh 1.
Presentation transcript:

An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California at Berkeley James A. Landay DUB Group Computer Science and Engineering University of Washington MobiSys'04, Boston “the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” Chen, Wei-Chia

What are the previous solutions? An Architecture for Privacy-Sensitive Ubiquitous Computing

What are the previous solutions? Anonymity or secret; strangers Sharing information with others who know one’s identity Weiser: Control (Facebook) An Architecture for Privacy-Sensitive Ubiquitous Computing

Does privacy need an architecture? An Architecture for Privacy-Sensitive Ubiquitous Computing

Problem For end-user: concerned about systems that centralize data For developers: acquiring context data from a variety of sources, refining and storing that context data, and retrieving and using context data. Ad hoc and multilayer-communication An Architecture for Privacy-Sensitive Ubiquitous Computing

Previous Work Addresses at most one layer An Architecture for Privacy-Sensitive Ubiquitous Computing PresenceP3P, Privacy Mirror InfrastructureParcTab System, Context Toolkit Physical/SensorsCricket Location Beacons, Active Bats

Confab: System Requirements A decentralized architecture, local devices owned by that end-user A range of mechanisms for control and feedback by end-users Deniability Emergencies An Architecture for Privacy-Sensitive Ubiquitous Computing Alice’s Location Bob’s Location

Architecture Highlight: Focusing more on location than on other forms of contextual information An Architecture for Privacy-Sensitive Ubiquitous Computing

Architecture elements Personal InfoSpace Personal InfoSpace LocName App Source Sensors My Computer Tuple: the basic unit of infoSpace InfoSpace: network-addressable logical storage units that store context data about those entities

Confab’s Data Model An Architecture for Privacy-Sensitive Ubiquitous Computing 2 1 Decentralized Control mechanism Deniability Emergencies Context data types

Data Model An Architecture for Privacy-Sensitive Ubiquitous Computing Decentralized Control mechanism Deniability Emergencies

Programming Model An Architecture for Privacy-Sensitive Ubiquitous Computing

Personal InfoSpace Personal InfoSpace LocName App On Operators Source Sources Out OperatorsIn Operators My Computer Check access policies Check privacy tag Notify on incoming data Check access policies Check privacy tags Notify on outgoing data Invisible mode Add privacy tag Interactive Garbage Collect Periodic Reports Coalesce Decentralized Control mechanism Deniability Emergencies

Evaluation: BEARS Emergency Response Servic An Architecture for Privacy-Sensitive Ubiquitous Computing Decentralized Control mechanism Deniability Emergencies Making continuous location queries, as well as making updates to both the trusted third-party and to the building server

Confab provides application developers with a framework and a suite of mechanisms for building privacy-sensitive applications. Operators : within an end-user’s infospace to help control the flow of personal information, and can be customized. Service descriptions : used by applications to describe at what granularity and at what rate the data is needed. An Architecture for Privacy-Sensitive Ubiquitous Computing Summary of data model and programming model

Confab toolkit for facilitating construction of privacy-sensitive ubicomp applications “Use technology correctly to enhance life. It is important that people have a choice in how much information can be disclosed than the technology is useful.” An Architecture for Privacy-Sensitive Ubiquitous Computing Conclusion + Privacy at physical, infrastructure, and presentation layers + Push architecture towards local capture, processing, storage + Couple w/ better UIs for greater choice, control, and feedback