User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
Intisar O. Hussien Faculty of Computer Studies Arab Open University
Advertisements

Fall IM 2000 Evfolution of Presence Based Networks Evolution of Presence Based Networks Jonathan Rosenberg Chief Scientist.
IM May 23-25, 2000 Evolution of IP Based Presence Services Evolution of IP-Based Presence Services Jonathan Rosenberg Chief.
Insert Tradeshow or Event Name -- Date Insert Presentation Title Trends in Instant Messaging and Telephony Jonathan Rosenberg Chief.
Norman Sadeh – Carnegie Mellon University – DAML PI Meeting- Feb. 13, 2002 DAML PI Meeting Status Briefing A Semantic Web Environment for Mobile Context-Aware.
Chapter 11 Designing the User Interface
Feature Interaction Handling in LESS Xiaotao Wu and Henning Schulzrinne Internet Real Time Laboratory.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
1 Authority on Demand Flexible Access Control Solution.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Integrating The Datacenter OpalisRobot MOM Operator.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
MXIE overview 5/4/ Update1. MXIE Media Exchange Interface for End Users 5/4/ Update2.
Location Based Social Networking For All Presenter: Danny Swisher.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Privacy and Sensor Andrew Jason Hong. Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale Questions –What data is collected?
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
Norman M. Sadeh ISR - School of Computer Science Carnegie Mellon University User-Controllable Security and Privacy.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
Four Two Rants on Mobile Computing Jason I. Hong Feb Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Investigator: Kyle Johnson Project Supervisors: Prof. Hannah Thinyane Mrs. Ingrid Siebörger.
© Aastra Aastra BluStar for PC High-Quality Audio and HD Video from Your Desktop.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Joy Hamerman Matsumoto.  St Jude Medical Cardiac Rhythm Management Division manufactures implantable cardiac devices ◦ Pacemakers ◦ Implanted defibrillators.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
Human-Computer Interaction Breakout Clare-Marie Karat, Charles Wiecha Wanda Dunn, Jason Hong, Bonnie John, Bob Kraut, Brad Myers, Norman Sadeh.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Mobile and Location-Based Services Jason I. Hong May
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Page 1 Login Security Usability Test Results | August 2014 Login Security Usability Test Results Conducted by Jayne Schurick Usability Consultant
Security Challenges for Customer Domain in the Smart Grid
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
SiTEL LMS Focus Group Executive Summary Prepared: January 25, 2012.
CS 4720 Usability and Accessibility CS 4720 – Web & Mobile Systems.
S556 SYSTEMS ANALYSIS & DESIGN Week 11. Creating a Vision (Solution) SLIS S556 2  Visioning:  Encourages you to think more systemically about your redesign.
Billy Odero Brian Omwenga Mokeira Masita-Mwangi Pauline Githinji Jonathan Ledlie Tangaza: Results from Kenya Pilot.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
TEAM Basic TotalElectrostatic ManagementAwareness&
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Context Awareness: From Dream to Reality Norman M. Sadeh School of Computer Science Carnegie Mellon University Research Sponsors: DARPA/DAML, IBM, Boeing,
Page 1 of ?? Wireless Industry Congress 2003 NCAC Workshop (Ottawa) © Ramiro Liscano 2005 Context-based Coalition Access Control for Spontaneous Networking.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Windows Role-Based Access Control Longhorn Update
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Team working in distributed environments M253 Communicating, Cooperating & Collaborating on Line Faculty of Computer Studies Arab Open University Kuwait.
Usable Privacy and Security and Mobile Social Services Jason Hong
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
IPS Infrastructure Technological Overview of Work Done.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Citrix MetaFrame Conferencing Manager 3.0 Codename – “Opal” Release Date – April 27, 2004.
Christa Marsh Southern Arkansas University Biology Professor.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
CALVERLEY PATIENT SURVEY FEEDBACK NOVEMBER ACCESSING YOUR APPOINTMENT Very quick and professional – One could say “Bedside Manner Excellent” On.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Online Safety: Rights and Responsibilities
Presentation transcript:

User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University

The Problem Mobile devices becoming integrated into everyday life –Mobile communication –Sharing location information with others –Remote access to home –Mobile e-commerce Managing security and privacy policies is hard –Preferences hard to articulate –Policies hard to specify –Limited input and output Leads to new sources of vulnerability and frustration

Difficult to Build Usable Interfaces (a)(c)

Our Goal Develop better UIs for managing privacy and security on mobile devices –Simple ways of specifying policies –Clear notifications and explanations of what happened –Better visualizations to summarize results –Machine learning for learning preferences –Start with small evaluations, continue with large-scale ones Large multi-disciplinary team and project –Six faculty, 1.5 postdocs, six students –Roughly 1 year into project

Application Domains Contextual Instant Messaging People Finder Access Control to resources Some Challenges –Not being burdensome or annoying –Finding right balance of expressiveness and simplicity –Helping users understand capabilities and limitations –Providing enough value so that people will use our apps! Security & privacy our main concern, but not to users

Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

Contextual Instant Messaging Facilitate coordination and communication by letting people request contextual information via IM –Interruptibility (via SUBTLE toolkit) –Location (via Place Lab wifi positioning) –Active window Developed a custom client and robot on top of AIM –Client (Trillian plugin) captures and sends context to robot –People can query imbuddy411 robot for info “howbusyis username” –Robot also contains privacy rules governing disclosure

Contextual Instant Messaging Privacy Mechanisms Web-based specification of privacy preferences –Users can create groups and put screennames into groups –Users can specify what each group can see

Contextual Instant Messaging Privacy Mechanisms Notifications of requests

Contextual Instant Messaging Privacy Mechanisms Social translucency

Contextual Instant Messaging Privacy Mechanisms Audit logs

Contextual Instant Messaging Evaluation Recruited ten people for two weeks –Selected people highly active in IM (ie undergrads ) –Each participant had ~90 buddies and 1300 incoming and outgoing messages per week Notified other parties of imbuddy411 service –Update AIM profile to advertise –Would notify other parties at start of conversation Any predictions of results?

Contextual Instant Messaging Results Total of 242 requests for contextual information –53 distinct screen names, 13 repeat users

Contextual Instant Messaging Results 43 privacy groups, ~4 per participant –Groups organized as class, major, clubs, gender, work, location, ethnicity, family –6 groups revealed no information –7 groups disclosed all information Only two instances of changes to rules –In both cases, friend asked participant to increase level of disclosure

Contextual Instant Messaging Results Likert scale survey at end –1 is strongly disagree, 5 is strongly agree –All participants agreed contextual information sensitive Interruptibility 3.6, location 4.1, window 4.9 –Participants were comfortable using our controls (4.1) –Easy to understand (4.4) and modify (4.2) –Good sense of who had seen what (3.9) Participants also suggested improvements –Notification of offline requests –Better notifications to reduce interruptions (abnormal use) –Better summaries (“User x asked for location 5 times today”)

Contextual Instant Messaging Current Status Preparing for another round of deployment –Larger group of people –A few more kinds of contextual information Developing privacy controls that scale better –More people, more kinds of information

Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

People Finder Location useful for micro-coordination –Meeting up –Okayness checking Developed phone-based client –GSM localization (Intel) Conducted studies to see how people specify rules (& how well) See how well machine learning can learn preferences

People Finder Machine Learning Using case-based reasoning (CBR) –“My colleagues can only see my location on weekdays and only between 8am and 6pm” –It’s now 6:15pm, so the CBR might allow, or interactively ask Chose CBR over other machine learning –Better dialogs with users (ie more understandable) –Can be done interactively (rather than accumulating large corpus and doing post-hoc)

People Finder Study on Preferences and Rules First conducted informal studies to understand factors important for location disclosures –Asked people to describe in natural language –Social relation, time, location –“My colleagues can only see my location on weekdays and only between 8am and 6pm”

People Finder Study on Preferences and Rules Another study to see how well people could specify rules, and if machine learning could do better –13 participants (+1 for pilot study) –Specify rules at beginning of study –Presented a series of thirty scenarios –Shown what their rules would do, asked if correct and utility –Given option to change rule if desired

People Finder Study on Rules

People Finder Results – User Burden Mean (sec) Std dev (sec) Rule Creation Rule Maintenance Total

People Finder Results – Accuracy

People Finder Current Conclusions Roughly 5 rules per participant Users not good at specifying rules –Time consuming & low accuracy (61%) even when they can refine their rules over time (67%) –Interesting contrast with imbuddy411, where people were comfortable Possible our scenarios biased towards exceptions CBR seems better in terms of accuracy and burden Additional experiments still needed

People Finder Current Work Small-scale deployment of phone-based People Finder with a group of friends –Still needs more value, people finder by itself not sufficient –Trying to understand pain points on next iteration Need more accurate location –GSM localization accuracy haphazard Integration with imbuddy411 –Smart phones expensive, IM vastly increases user base

Outline Motivation Contextual Instant Messaging People Finder Access Control to Resources

Grey – Access Control to Resources Distributed smartphone-based access control system –physical resources like office doors, computers, and coke machines –electronic ones like computer accounts and electronic files –currently only physical doors Proofs assembled from credentials –No central access control list –End-users can create flexible policies

Grey Creating Policies Proactive policies –Manually create a policy beforehand –“Alice can always enter my office” Reactive policies –Create a policy based on a request –“Can I get into your office?” –Grey sees who is responsible for resource, and forwards Might select from multiple people (owner, secretary, etc) –Can add the user, add time limits too

Grey Deployment at CMU 25 participants (9 part of the Grey team) Floor plan with Grey-enabled Bluetooth doors

Grey Evaluation Monitored Grey usage over several months Interviews with each participant every 4-8 weeks Time on task in using a shared kitchen door

Grey Results of Time on Task of a Shared Kitchen Door

Grey Surprises Grey policies did not mirror physical keys –Grey more flexible and easier to change Lots of non-research obstacles –user perception that the system was slow –system failures causing users to get locked out –need network effects to study some interesting issues Security is about unauthorized users out, our users more concerned with how easy for them to get in –never mentioned security concerns when interviewed

Grey Current work Iterating on the user interfaces –More wizard-based UIs for less-used features Adding more resources to control Visualizations of accesses –Relates to abnormal situations noted in contextual IM

Grey Current work in Visualizations

Concluding Remarks User-controllable privacy and security for three apps –Contextual instant messaging –People Finder –Grey distributed access control system Common threads –Simpler ways of specifying policies –Better notifications and explanations –Better visualizations –Machine learning for learning preferences

Concluding Remarks Some early lessons –Many indirect issues need to be addressed to study usable privacy and security (value proposition, network effects) –People seem willing to use apps if good enough control and feedback for privacy and security –Lots of iterative design needed

Acknowledgements NSF Cyber Trust Grant CNS ARO DAAD ("Perpetually Available and Secure Information Systems") to CMU’s CyLab Source:

People Finder Results – Accuracy