Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Social Networking facebook, bebo, MySpace and others.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Cloud Computing Concept&nature Cloud computing refers to the applications delivered as services over the Internet and the hardware, and systems software.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Cyber Crimes.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Chapter 8 Cookies And Security JavaScript, Third Edition.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Protecting Students on the School Computer Network Enfield High School.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
FriendFinder Location-aware social networking on mobile phones.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Sarah Manuel Final Presentation MCO435-Social Media.
Android and IOS Permissions Why are they here and what do they want from me?
Stuff to memorise… "A method tells an object to perform an action. A property allows us to read or change the settings of the object."
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
WELCOME Mobile Applications Testing
Facebook privacy policy
WHY VIDEO SURVELLIANCE
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Information Security.
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
E-Commerce and Social Networks
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
WHY VIDEO SURVELLIANCE
Internet Safety – Social Media
Digital Citizen.
Presentation transcript:

Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov

Context of this talk… Do we sacrifice privacy by using various network services (Internet, online social networks, mobile phones)? How does the structure/topology of a network affect its privacy properties? Techniques for enhancing privacy? Privacy is hard!

What do we mean by privacy? Louis Brandeis (1890) – “right to be left alone” – protection from institutional threat: government, press Alan Westin (1967) – “right to control, edit, manage, and delete information about themselves and decide when, how, and to what extent information is communicated to others”

Privacy vs. security Security helps enforce privacy policies Can be at odds with each other – e.g., invasive screening to make us more “secure” against terrorism Privacy: what information goes where? Security: protection against unauthorized access

Privacy-sensitive information Identity – name, address, SSN Location Activity – web history, contact history, online purchases Health records …and more

Tracking on the web IP address – Number identifying your computer on the Internet – Visible to site you are visiting – Not always permanent Cookies – Text stored on your computer by site – Sent back to site by your browser – Used to save prefs, shopping cart, etc. – Can track you even if IP changes Internet

OSNs: State-of-the-Art Fun Popular Platform

“Facebook Wants You To Be Less Private”

Attack of the Zombie Photos

OSNs mishandle data Facebook Beacon Facebook employees abuse personal data

Threat: collusion among services

Online social networks Pros – Simplifies data analysis – High availability Cons – Single point of attack – No longer control access to own data Centralized structure

Personal data

Alternatives? Anonymization – Do not use real names Encryption – NOYB, flyByNight Decentralization – Tighter control over data

Anonymization Hide identity, remove identifying info Proxy server: connect through a third party to hide IP Health data released for research purposes: remove name, address, etc

Threat: deanonymization Netflix Prize dataset, released ,000,000 (private) ratings from 500,000 users Competition to improve recommendations – i.e., if user X likes movies A,B,C, will also like D Anonymized: user name replaced by a number

Threat: deanonymization Problem: can combine “private” ratings from Netflix with public reviews from IMDB to identify users in dataset May expose embarrassing info about members…

Threat: deanonymization UserMovieRating 1234Rocky II3/5 1234The Wizard4/5 1234The Dark Knight5/5 … 1234Girls Gone Wild5/5 UserMovieRating dukefanThe Wizard8/10 dukefanThe Dark Knight10/10 dukefanRocky II6/10 … User 1234 is dukefan!

Threat: deanonymization Lesson: cannot always anonymize data simply by removing identifiers Vulnerable to aggregating data from multiple sources/networks Humans are predictable – E.g., try Rock-paper-scissors vs AI

Personal data P2P Architecture

Decentralization: pros and cons True ownership of data Maintenance burden Cost Business model User experience

Location privacy Mobile phones: – Always in your pocket – Always connected – Always knows where it is: GPS Location-based services Location-based ads What are we giving up?

Mobile phones

Why, when and what to disclose? It is not a simple question! Tradeoff between functionality Also important whom to disclose it to? – Relatives – Co-workers – Friends There have been studies about this – Not easy to classify – People want to disclose only what is useful

How is your data used by apps? Many “free” apps supported by ads Analytics: profiling users Our research: found it common for popular free apps to send location+device ID to advertising and analytics servers What can we do? – More visibility into what app does with data once it reads it

AppScope Monitors app behavior to determine when privacy sensitive information leaves the phone

Application Study 30 popular Android applications that access Internet, camera, location or microphone Of 105 flagged connections, only 37 were legitimate

Findings - Location 15 of the 30 applications shared physical location with an ad server Most of this information was sent in the clear In no case was sharing obvious to user – Or written in the EULA – In some cases it occurred without app use!

Findings – Phone identifiers 7 applications sent device unique identifiers (IMEI) and 2 apps sent phone info (e.g. phone number) to a remote location without warning – One app’s EULA indicated the IMEI was sent Appeared to be sent to app developers “There has been cases in the past on other mobile platforms where well- intentioned developers are simply over-zealous in their data gathering, without having malicious intent.” -- Lookout

Takeaways Decentralized network structure can enhance privacy Difficult to achieve true anonymity Fine-grained control over data can help – Tension with usability

Resources Duke “Office Hours” on Privacy in Social Media – “Someone Is Watching Us” on WUNC –

Acknowledgments Thanks to Peter Gilbert, who prepared a significant amount of this material for us.