Lecture 27: Privacy CS 5430 5/7/2018.

Slides:



Advertisements
Similar presentations
Protection of privacy for all Students!
Advertisements

21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
Chapter 11 Privacy Policies and Behavioral Marketing.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
DNA Databases Ethical Issues and Legal Implications.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
April 13, 2010 Towards Publishing Recommendation Data With Predictive Anonymization Chih-Cheng Chang †, Brian Thompson †, Hui Wang ‡, Danfeng Yao † †‡
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Privacy as an International Information Issue MD823 October 18, 2004.
Preserving Privacy in Clickstreams Isabelle Stanton.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
Confidentiality and Public Information Act LISD Special Education Department Training SY
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
CONFIDENTIALITY Q & A’s for School Staff. What Laws Apply to Records of Students? ► 2 Federal Laws  Family Education Rights and Privacy Act (FERPA) 
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
The Right to Privacy. No where in the Constitution are the words “right to privacy”
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Anonymity and Privacy Issues --- re-identification
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Jim Loter Director of Information Technology
Facebook privacy policy
Privacy and the Law.
Identity on the Internet
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
Side-Channel Attack on Encrypted Traffic
Executive Director and Endowed Chair
Anonymous Communication
BA 625: Privacy Law and Policy
Executive Director and Endowed Chair
By (Group 17) Mahesha Yelluru Rao Surabhee Sinha Deep Vakharia
Unit 27 Web Server Scripting Extended Diploma in ICT
A Gift of Fire Third edition Sara Baase
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
SPECIAL EDUCATION REQUIRED TRAINING
Privacy=Secret CHIHUA WANG.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
A Gift of Fire Third edition Sara Baase
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
Anonymous Communication
Health Care: Privacy in a Digital Age
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
FERPA For New Faculty Lawrence F. Glick Sr. Associate General Counsel
FERPA Basics This video will cover the basics of FERPA.
Presented by : SaiVenkatanikhil Nimmagadda
TELE3119: Trusted Networks Week 4
The Freedom of Information and Data Protection Legislation An Overview
Anonymous Communication
Presentation transcript:

Lecture 27: Privacy CS 5430 5/7/2018

C I A Confidentiality Integrity Availability

Privacy Privacy concerns information about individuals (people, organizations, etc.) Often construed as legal right Privacy is not a synonym for confidentiality or for secrecy

What is Privacy? discuss Privacy as confidentiality Nissenbaum (contextual integrity)

What is a privacy violation? Police read papers stored in your home Police read papers you threw in the trash Police read your medical records Your parents read your medical records Gannett uses your medical records in a research study Police read your texts/Facebook messages Police read your emails Google employee reads your emails Google uses your emails to target personalized ads Someone tracks your location for months (using phone) Assume all actions occur without your consent and without a warrant

Privacy in American Law Louis Brandeis was an American lawyer and Supreme Court justice, also a leader of the progressive party With his law partner Samual Warren, influential early writer on privacy law, including "The Right to Privacy" [Harvard Law Review, 1890], which developed the idea of a right to be left alone, and a right to control private data. John Harlan (supreme court justice) outlined a two-prong test for a "reasonable expectation of privacy" in his concurrence to Katz v. United States (1967) to identify when laws or behaviors violated fourth amendment protections. Current cases to watch: Carpenter v. United States

Contextual Integrity defines privacy relative to appropriate context considers information type, time, location, purpose, principals involved (subject, sender, receiver) dependent on social norms norms can change over time

General Guidelines The FTC's Fair Information Practice Principals (FIPPs) are the most broadly recognized guidelines for handling private data in information systems Seek consent Minimize data use Limit storage Avoid linking

Deanonymization Zip Code Gender Date of Birth You Sweeney 97: identified Massachusetts governor from anonymized insurance dataset using voter records Massachusettes Group Insurance Commission “anonymized” health records for state employees + voter rolls. Sweeney 02: 87% of Americans uniquely identified by Zip Code, Gender, DOB

Deanonymization In 2006, AOL released 20 million "anonymized" search results from 650,000 users for research purposes.

Deanonymization In 2006, Netflix released a challenge. They released a data set of 100 million ratings by 480,000 anonymized users. The first group to best Netflix's in-house recommendation system by 10% would receive a reward of $1 million. Awarded to a group from AT&T labs in 2009.

k-Anonymity Name Gender Year Grade Alice F 2018 95 Bob M 80 Charlie David 60 Edward 2019 Flora 99 Georgia quasi-identifiers: (sets of) attributes that can be exploited for linking k-anonymity: each quasi-identifier must be ambiguously mapped to at least k different individuals Techniques: suppression and generalization Problems: identifying QIs, homogenity attack, background knowledge attack Refinement: \ell-diversity additionally requires \ell "well represented" values for each QI

Database Privacy Offline Privacy Online Privacy DB DB “Private” data

Data Perturbation -online or offline -problem: utility -problem: noise cancels out

Differential Privacy absolute privacy is impossible goal should be to limit how much information can be learned A query 𝑄 is 𝜖-differentially private if ∀𝐷,𝑟∈𝐷, Pr 𝑄 𝐷 =𝑥 ≤ 𝑒 𝜖 ⋅Pr⁡[𝑄 𝐷−𝑟 =𝑥]

Differential Privacy Key Idea: Changing a single user’s record does not significantly affect the result of any analysis or query

DP in action…

Internet Privacy

Internet Privacy

Notice & Consent

Browser Tracking

Browser Tracking -standard cookies, third party cookies

Browser Tracking

Beyond Cookies Zombie Cookies Browser Fingerprinting Zombie cookie mechanisms: browser history, encode as RGB values in cached image, local storage (e.g., flash cookie), HTML session/local storage (evercookie: javascript API that stores zombie cookie copies in all available forms) browser fingerprinting (canvas = GPU + driver +etc, clock skew, fonts, history, etc)

Fingerprinting Works Operating System Browser Settings Time Zone Language Canvas

The result…

Personalized Content

Targeted Advertising

Data Collection is Here to Stay…