Targeted Advertising… and Privacy Too Ari Juels RSA Laboratories Buy me!

Slides:



Advertisements
Similar presentations
Ari Juels RSA Laboratories Executable Financial Instruments and MicroMint on the Cheap with Markus Jakobsson Bell Laboratories.
Advertisements

Mix and Match: A Simple Approach to General Secure Multiparty Computation + Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories.
Error-Tolerant Password Recovery Niklas Frykholm and Ari Juels RSA Laboratories.
Oblivious Branching Program Evaluation
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Back to Table of Contents
Internet Privacy Policies Presented by: Paul Frenken President, COLAIP.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Reusable Anonymous Return Channels
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Computer Science Public Key Management Lecture 5.
Public Key Encryption An example of how a bank might accomplish encryption.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Private Key Algorithms RSA SSL
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Recommendation system MOPSI project KAROL WAGA
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Sunilkumar S. Manvi and P. Venkataram Protocol Engineering and Technology Unit, ECE Dept. Indian Institute of Science Bangalore, , INDIA
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Private Keyword Search on Streaming Data Rafail Ostrovsky William Skeith UCLA (patent pending)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Cryptography Lecture 9 Stefan Dziembowski
John Age: 7 Birthday: November 13 Grade: My Family.
Additional analysis of poverty in Scotland 2013/14 Communities Analytical Services July 2015.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
Propaganda Techniques
Private key
A Brief Introduction to Mix Networks Ari Juels RSA Laboratories © 2001, RSA Security Inc.
CHAPTER 2 CONCEPT OF ELECTRONIC COMMERCE. Why Should Companies Use Electronic Marketing  What is the purpose for engaging online communication?  Why.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
My autobiography Due January 26, 2007
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Searchable Encryption in Cloud
Recipt-free Voting Through Distributed Blinding
Some slides borrowed from Philippe Golle, Markus Jacobson
Latest Updates on BlackHawk Mines Music : Privacy Policy
Basic Network Encryption
Private Key Algorithms Key Exchange Protocols SSL
Topic 1: Data, information, knowledge and processing
Unit 27 Web Server Scripting Extended Diploma in ICT
Secure Electronic Transaction (SET) University of Windsor
Certificates An increasingly popular form of authentication
Trust is a Two-Way Street Ebony Buckley
CONCEPT OF ELECTRONIC COMMERCE
Privacy preserving cloud computing
Basic Network Encryption
Oblivious Transfer.
Cryptography Lecture 26.
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Targeted Advertising… and Privacy Too Ari Juels RSA Laboratories Buy me!

Targeted advertising: One View Anti- dandruff Buy me! Anti-wrinkle Cream Buy me too!

An example Special Report: October 5th is America's October 5th is America's most popular birthday.

Anybirthday.com targeted gift recommendations Hiking/sports book Anti-aging cream

Targeted advertising: The benign view Advertiser Consumer What shall I read next? Anna Karenina Red Chamber Wild Things Bleak House Here are some novels you might enjoy

The other view: Consumer privacy Consumer Browser cookies

Our Goal Advertiser Consumer + Privacy Efficiency

Private Profile Physical characteristics: Age: 30 Weight: 120 Height: 5’ 4” …. Hobbies: Butterfly collecting Tai Chi Archery Favorite foods: Chocolate Sushi Broccoli Financial (from Quicken): $110,000 / year income House worth $300,000 $20,000 butterfly collection Web sites recently visited (from browser): aclu.org yahoo.com anybirthday.com

Negotiant Advertiser Profile Ad request

Negotiant Advertiser if annual income > $100,000 if likes funny clothes or CEO output “golf ad” else if female output “spa ad” else output “cigar ad” else output “Walmart ad” Alice “spa ad”

Private Information Retrieval (PIR) Alice’s computer Negotiant “spa ad” Ads Advertiser’s server Spa ad Problem: Expensive!

Scheme 1: Naïve PIR Alice’s computer Negotiant “spa ad” Ads Advertiser’s server Ads Spa ad Problems: Inefficient; no idea what ads were distributed

Scheme 2: Direct request Alice’s computer Negotiant “spa ad” Ads Advertiser’s server “spa ad” please Spa ad

Basic tool: Mix network plaintext 1 plaintext 2 plaintext 3 plaintext 4 Randomly permutes and encrypts inputs Mix network

Opposite direction Randomly permutes and decrypts inputs Mix network plaintext 1 plaintext 2 plaintext 3 plaintext 4

Scheme 3: Semi-private PIR Alice’s computer Ads Advertiser’s server Bob’s computer Carol’s computer Darius’s computer Mix network “Walmart ad” “golf ad” “spa ad” “golf ad” “Walmart ad”

Scheme 3: Semi-private PIR Alice’s computer Ads Advertiser’s server Bob’s computer Carol’s computer Darius’s computer Mix network Walmart ad golf ad spa ad Spa ad spa ad golf ad Walmart ad

Scheme 3: A little more detail Alice, ad request name, “spa ad”

name, “spa ad” Scheme 3: A little more detail name Spa ad, Alice, ad

Remarks u We assume advertiser may collude with some mix servers (if not, one-server mix will do) u Ads are long, so we need a hybrid mix network –New constructions: OA00,JJ01 u Other tools –Quorum controlled threshold proxy re- encryption u Aggregation and mixing can be offline

Malicious negotiant Negotiant Advertiser Profile “ad $110,000” please ad number = annual income

Spotting Malicious Negotiants u Open source negotiants u “Sandbox” approach u Third-party validation

Scheme 4: Threshold PIR u Full set of ads mixed u Full privacy u Plaintext Equality Testing (PET) primitive needed u High cost (still better than PIR)

What are the (hoped for) benefits? u More consumer trust –Higher “opt in” rate –Truth in (requested) advertising u Complementary with P3P u Mobility possible through encrypted profile on server

Questions?