Privacy Enhancing Technologies

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

UNIT 20 The ex-hacker.
Privacy: Facebook, Twitter
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
GW Introduction to Google Drive Security and Smart Sharing Practices.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
The End of Anonymity Vitaly Shmatikov. Tastes and Purchases slide 2.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Ethics in a Computing Culture
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Do You Trust Your Recommender? An Exploration of Privacy and Trust in Recommender Systems Dan Frankowski, Dan Cosley, Shilad Sen, Tony Lam, Loren Terveen,
Privacy: Challenges and Opportunities Tadayoshi Kohno Department of Computer Science and Engineering University of Washington.
April 13, 2010 Towards Publishing Recommendation Data With Predictive Anonymization Chih-Cheng Chang †, Brian Thompson †, Hui Wang ‡, Danfeng Yao † †‡
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
What is it? Social networking is the grouping of individuals into specific groups, much like a neighborhood subdivision, if you will. Although social.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
+ Privacy in the Information Age Year 12, 2012 Lesson 3 January
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Protecting Your Personal Information November 15, 2013.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
CS5038 The Electronic Society Lecture: Social Networking Lecture Outline Social Networking Service Social Networking Sites –Bebo –Friendster –MySpace Social.
Anonymity and Privacy Issues --- re-identification
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Security Mindset Lesson Introduction Why is cyber security important?
30 Apps for Librarians Sana Moulder & Bryson Kopf.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Authorized But Anonymous: Taking Charge of Your Personal Data Anna Lysyanskaya Brown University.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Unlinking Private Data
Facebook privacy policy
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Legal and Ethical Issues
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Privacy and Information
Lecture 27: Privacy CS /7/2018.
Ethics Communication Channels
Unit# 5: Internet and Worldwide Web
Introduction to Health Privacy
Module 2 OBJECTIVE 14: Compare various security mechanisms.
CYBERSAFETY & Personal information
Presentation transcript:

Privacy Enhancing Technologies Lecture 1 Landscape Elaine Shi

Privacy Definitions and Landscape, Attacks against Privacy

What Is Privacy?

Non-Privacy

Non-Privacy Collecting information unbeknownst to users Sell/share users’ information to third-parties violating contracts/terms-of-use/expectations Fail to protect users’ information Security breach Insider attack

Class-action Law Suits (I)

Class-Action Law Suits (II) Canadian class action on Facebook and settlement Class action on Google Buzz, StreetView and settlement Netflix cancels its contest due to class action lawsuit On-going class action lawsuits Google android Apple Netflix viewing habits

Non-Privacy Sharing information unbeknownst to users: complete Sharing information unbeknownst to users: Facebook employee Jeff Bowen posted on Facebook’s blog: “We are now making a user’s address and mobile phone number accessible as part of the User Graph object.” But don’t worry, Bowen wrote, because “these permissions only provide access to a user’s address and mobile phone number, not their friend’s [sic] addresses or mobile phone numbers.” Feature has been suspended http://www.wired.com/epicenter/2011/01/no-facebook-you-may-not/

Non-Privacy Apr 26, 2011, Sony said it believes an unauthorized person obtained PSN user information, including members' names, addresses, birthdays, and login passwords. The company said there was no evidence that credit card information was stolen, but did not rule out that possibility. A class action lawsuit was filed against Sony a day after the company publicly admitted that personal information from PlayStation Network was compromised by a security breach.

Non-Privacy Insider misuse of information complete Insider misuse of information Google fires engineer who snooped on teenagers’ accounts

Making public information more public? MySpace recently started selling user data in bulk on Infochimps. As MySpace has pointed out, the data is already public, but privacy concerns have nevertheless been raised. Google Buzz’s auto-connect: it connected your public activity on Google Reader and other services and streamed it to your friends. Anecdote: When search engines indexed the Usenet's content… Arvind Narayanan http://33bits.org

What Is Privacy? Privacy is “the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively” -- Wikipedia

Individual or Group Individual Special-interest groups Enterprise Quote that Microsoft survey? Individual Special-interest groups Enterprise Government

Privacy-Sensitive Data Quote that Microsoft survey? Individual Medical info (HIPPA), financial info Special-interest groups Enterprise Financial information, proprietary information, trade secrets Government Classified information, top secrets

Do People Care About Privacy?

Opinions "People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people… that social norm is just something that has evolved over time." -- Mark Zuckerberg

Opinions “Users don’t care about their privacy, they willingly post their personal and location information on Facebook and Foursquare…” “Technological advances will put an end to privacy.” Think about social networks, smart grids… Users give away their personal information for small rewards

However… People tend to claim that they are very concerned about their privacy in surveys [Harris Interactive 2001]

Privacy Harm Employer Insurance companies Stalking or cyber-stalking Women care about location privacy more than men In a recent survey, about 50% of women indicated that they have been stalked… Teenagers: parents More reasons?

Privacy Harm [Calo 2010] Subjective: “Unwanted perception of observation” Anxiety, embarrassment, fear E.g., landlord listening on tenant, government surveillance Objective: “Unanticipated or coerced use of information concerning a person against that person” E.g., identity theft, leaking of classified information that reveals an undercover agent

Please rob me! Continuing on Jessica’s questions --- We share – is it a curse or blessing

Who to rob?

What to rob?

Where to rob?

Experiment: Which would you choose? $10 anonymous $12 identified

What is privacy worth? [Acquisti et. al. 2009] Difficult to evaluate: Inconsistent decisions: Willingness to pay for privacy Willingness to give up privacy for small rewards Psychological factors: Endowment effect Order effect

Do Companies Care About Privacy?

(Non-) Incentives Increased operational, maintenance cost? Can a medical site offer meaningful services Increased operational, maintenance cost? Decreased utility? Can a medical site offer value-added services if records are encrypted? Data anonymization, sanitization, perturbation hurt the accuracy and resolution of data sets. New Facebook features: default setting skewed towards sharing information rather than restricting it

Privacy Is an Interdisciplinary Field Privacy and Law US: 4th Amendment: unreasonable search & seizure EU: fundamental right, includes “right to be forgotten” Privacy and Economics Markets and regulation Fundamentalists and pragmatists Philosophy of Privacy What are privacy norms and where do they come from? Why do certain patterns of information flow provoke public outcry in the name of privacy, and not others? Privacy and Sociology To what extent is privacy a cultural construct? Are norms generational and experiential?

The concept of privacy is most often associated with Western culture, English and North American in particular. According to some researchers, the concept of privacy sets Anglo-American culture apart even from other Western European cultures such as French or Italian. The concept is not universal and remained virtually unknown in some cultures until recent times. The word "privacy" is sometimes regarded as untranslatable by linguists. Many languages lack a specific word for "privacy". Wikipedia

Privacy-related Research in CS Privacy-enhancing Cryptography E.g., Zero-knowledge proof, anonymous credential, anonymous cash Anonymous communications E.g., MIX Nets, TOR Data protection Data privacy, inferential privacy breaches

Theoretic Formulations of Privacy Confidentiality: Encryption: Indistinguishability under Chosen-Ciphertext-Attack Secure Multi-party Computation Pseudonymity = Anonymity + Linking Anonymity unidentified, unlinkable E.g., group signatures, anonymous credentials K-anonymity Differential privacy

Why is Privacy Hard?

Non-technical factors Economics and deployment incentives Users: What is privacy worth? How much are people willing to pay for privacy? Service providers: How much does it cost to provide privacy? Psychology Legislation Mention Privacy v.s. utility somewhere…

Attacks: Inferential Privacy Breaches Imagine if your search queries were released and identified, would you feel embarassed about any queries that you made? How about the side channel attack, by measuring packet length of auto suggestion, guess search query Re-identification is matching a user in two datasets by using some linking information (e.g., name and address, or movie mentions) Unintended information leaks Difficult to balance utility and privacy Examples AOL Netflix Social network de-anonymization Side-channel attacks in web applications

Linkage: Quasi Identifiers Latanya Sweeney

Home/Work location pairs Location pair (block level) is uniquely identifying for majority Even at tract level (roughly ZIP codes): 5% are unique

Linkage: Fuzzy Attributes Frankowski et al.: “Privacy Risks of Public Mentions” “MovieLens” database AOL “Anonymized” search logs twenty million search keywords, 650,000 users, 3-month period People searching for their own name, diseases, “how to kill your wife”, etc. Easily de-anonymized Class action lawsuit CTO resignation

Other Examples Netflix data set: curse of high-dimensionality Linkage: graph structure Narayanan & Shmatikov 09: De-anonymizing social networks Using only topology info, de-anonymize twitter & flickr graphs 1/3 users on both twitter & flickr can be re-identified on twitter with 12% error rate Genetic studies Homer et al., Wang et al. Identify individuals from aggregate information Recommender systems Calandrino et al.: “You Might Also Like:” Privacy Risks of Collaborative Filtering Inferring individual users’ transactions from the aggregate outputs of collaborative filtering

Traffic Analysis Language identification of encrypted VoIP traffic Uncovering spoken phrases in encrypted VoIP Keyboard Acoustic Emanations Timing analysis of keystrokes and timing attacks on SSH  Statistical identification of encrypted web browsing traffic Inferring the source of encrypted HTTP connections Discovering search queries in encrypted HTTP traffic

i.e., what should privacy technology offer? What Can We Do? i.e., what should privacy technology offer?

Satisfy the interests of all parties Users: Usability, functionality Service providers: Efficiency Low maintenance and operational cost Utility of data, value-added services Compatibility with legacy applications, and ease of deployment Developers: Make it easy to develop privacy-preserving applications

Homework Give an example where privacy requirement and efficiency/utility conflict. Give some more real life examples of attacks against privacy.

Reading list [Acquisti et. al. 2009] What is privacy worth? [Rui et. al. 09] Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study