Jiexi Wang Master of Computer Science Program

Slides:



Advertisements
Similar presentations
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
Advertisements

Personnel Tracking for House Offices. Tracking of important staff information Customized for the House environment Generate forms to submit Generate reports.
Cohesion Café Focus: Security Team Three Matt Bailey Courtney Buttermore Xinran Gao Lisa Mueller Long Wang.
BI Web Intelligence 4.0. Business Challenges Incorrect decisions based on inadequate data Lack of Ad hoc reporting and analysis Delayed decisions.
Templates and Styles Excel Advanced. Templates are pre- designed and formatted spreadsheets –They provide consistency of layout/structure –They.
How is the IT-Driven Concept of “Permission Marketing” Changing the Way Companies Establish Customer Relationships Using “Old” Media as well as New? By.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Motor Vehicle Inspector. About Mobile vehicle Inspector is application for traffic check post officers to fine and maintain the records for the defaulting.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
Field Direct, A Field Inspection Application Designed to Improve Data Integrity and Accessibility for Management Oversight Kari Ward, PMP IT Project Manager.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Desktop Security: Data Protection. LaptopsMobile Devices Desktop Security: Data Protection USB DrivesCDs/DVDs Cameras Video CamerasPortable Hard Drives.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Melissa Armstrong – Sponsor Dr. Eck Doerry – Mentor Greg Andolshek Alex Koch Michael McCormick Department of Computer Science SolutionProblemDesign User.
Additional Security Tools Lesson 15. Skills Matrix.
ITGS Case Study Theatre Booking System Ayushi Pradhan.
4G-MOBILE COMMUNICATION D.MANOJ KUMAR III. B.Tech, E.C.E N.B.K.R.Institue of Science and technology P.PALLAVI II. B.Tech, E.C.E Kakatiya Institue of Technology.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Chapter 7 Electronic Media Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall 1Chapter 7 -
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
SEARCH OPTIMIZER By JAGANI RAJ 7 th /I.T. Guided By: Mrs. Darshana H. Patel.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Presentation to Area 2 Computer and Technology Group 15 May 2013.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Module 1 Introduction to SQL Server® 2008 R2 and its Toolset.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
HEALTH CHAPTER 12 By: Ky Price. Telemedicine Telemedicine systems which are sometimes called telemedicine, they allow medical consultations to take place.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Telemedicine Unit 5, Lesson 6 Explanation Presentation
1. 2 A scalable, feature-rich VMS solution, delivers enterprise- level performance along with freedom of choice, enabling system customization and compatibility.
Wireless Communication Project Ideas for Engineering Students.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
CMGT 411 Week 2 DQ 3 Why is identity management considered the central component of access management and security strategies? Should identity management.
CMGT 411 Week 2 DQ 4 Based on the Barr (2012) article, why is identity management considered the central component of access management and security strategies?
Information technology services Non-core – 2018 budget proposal
A scalable, feature-rich VMS solution, delivers enterprise-level performance along with freedom of choice, enabling system customization and compatibility.
The First Steps To A Knowledge Management Database
PhoneSheriff – Best Parental Control Software For Mobiles and Tablets
Wiretapping Christopher Simpson.
Taming SPSS: Large Scale and Secure Data Entry with LimeSurvey
Mobile Computing for Healthcare
GPS-IN MOBILE NETWORKS
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
Cloud Testing Shilpi Chugh.
Smart Security Camera System - Maui.
Best Security Camera System - Maui, Hi
HOW TO TRANSFER QUICKBOOKS FILES FROM ONE COMPUTER TO ANOTHER?
Data Interoperability and User USGS User Management
Jeffrey Lewis Director, Global Operations
Problem-Based Learning for South Carolina Teachers
Spotlight Locks on Dekko Secure Through Marketing
Wavestore Integrates… MAXXESS Access Control
ورود اطلاعات بصورت غيربرخط
“Location Privacy Protection for Smartphone Users”
Performance Indicator 4.08
A Policy-Based Security Mechanism for Distributed Health Networks
Maintaining order and safety in a city is no small task
Makes Life Easier for Business Owners by Using GPS Vehicle Tracking.
4IR and Gaming: Opportunities and Challenges
Presentation transcript:

Privacy and Data Security in Telepresence Robot System for Assisting Old Adults At Home Jiexi Wang Master of Computer Science Program Department of Computer Science and Engineering University of South Carolina

Jiexi Wang wang372@email.sc.edu Problems Data not secured when putting all the data in one database or during transmission Privacy not protected when the camera and GPS are recording Jiexi Wang wang372@email.sc.edu

Jiexi Wang wang372@email.sc.edu Importance of the Problems Other than functions, privacy is the other greatest concerns to old adults Old Adults will be very hesitated to use telepresence robot without a solution to privacy exposure Jiexi Wang wang372@email.sc.edu

Jiexi Wang wang372@email.sc.edu Three Most Challenging Aspects and Solutions Data security when saving data in one database, data transmission, access Multiple database, Encrypted, RBAC Camera recording and location limitations Video filter Online GPS tracking Radio Global Map or Offline Map Jiexi Wang wang372@email.sc.edu

Jiexi Wang wang372@email.sc.edu Conclusion Saving data on separate database, transmitting encrypted data, and using role based access control will help protect data security Installing multiple filters and enabling old adults to make options of filter under different scenarios will protect their privacy Using offline map instead of online GPS keeps old adult’s location from being exposed to the public Jiexi Wang wang372@email.sc.edu

Jiexi Wang wang372@email.sc.edu Future Work Testing variable filters or methods to manipulate the video by considering both function and privacy More research on Radio global map or offline map Market Needs: Survey to old adults about their opinions to new features Jiexi Wang wang372@email.sc.edu