Privacy Enhancing Technologies(PET)

Slides:



Advertisements
Similar presentations
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
Advertisements

Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Digital Cash Present By Kevin, Hiren, Amit, Kai. What is Digital Cash?  A payment message bearing a digital signature which functions as a medium of.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Electronic Transaction Security (E-Commerce)
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Microsoft Passport Waldemar Swiercz.
1 3. Privacy Enhancing Technologies (PET) Bobby Vellanki Computer Science Dept. Yale University Oct
Web-tracking and Adware Hannah Muihrienne Julie Chris.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Just Because… Chat / Instant Messenging Application Multiple conversations Convenient (Away, Mobile Page, Etc.) Enhance collaboration efforts Simple –
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Computer Concepts 2014 Chapter 7 The Web and .
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Computer Security Keeping you and your computer safe in the digital world.
The Apple Privacy Policy zakiya mitchell
Managing Windows Security
Walter Fletcher, Jeff Noles, Tiffany Russell, Shalonda Witcher
Hotspot Shield Protect Your Online Identity
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Yannis Mallios February 27, 2008
Information Security Session October 24, 2005
Computer Security.
Personal Privacy and the Public Internet
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Privacy Enhancing Technologies(PET) Bobby Vellanki Computer Science Dept. Yale University

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

PET PET – Technology that enhances user control and removes personal identifiers Users want free Privacy Hundreds of new technologies developed www.Epic.org

PET Classified into 4 Categories: Encryption Tools (SSL) Policy Tools (P3P, TRUSTe) Filtering Tools (Cookie Cutters, Spyware) Anonymous Tools (Anonymizer, iPrivacy)

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

Encryption Tools Examples: SSL, PGP, Encryptionizer Thought of as a security tool to prevent unauthorized access to communications, files, and computers. Users don’t see the need Necessary for privacy protection but not sufficient by themselves.

Encryption Tools Pros: Cons: Inexpensive (free) Easily Accessible Encryption Software isn’t used unless it is built-in to the software. Both parties need to use the same software

Encryption Tools Conclusions: Easy access All parties need to use the same tool Good start but not sufficient enough

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

Policy Tools P3P (Platform for Privacy Preferences) TRUSTe BBBonline Developed by World Wide Web Consortium TRUSTe non-profit organization which ensures websites are following their privacy policy Promotes fair information practices BBBonline

Policy Tools(Cont.) P3P Users declare their privacy policy on their browsers Websites register their policy with Security agencies. The website policy is compared with user policy and the browser makes automated decisions.

Policy Tools(Cont.) P3P Cont. Might help uncover privacy gaps for websites Can block cookies or prevent access to some sites. Consumer awareness Built into IE 6.0 and Netscape 7 as of July 2002

Policy Tools(Cont.) Conclusions: Users are unaware of Privacy Policies Not all websites have Policy tools Need automated checks to see if websites are following their privacy policy

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

Filtering Tools Some Types SPAM filtering Cookie Cutters Spyware killers

Filtering Tools (Cont.) SPAM Filters: Problems: Spammers use new technologies to defeat filters Legitimate E-mailers send SPAM resembling E-mail

Filtering Tools(Cont.) SPAM Filters (cont.) Possible Solution: E-Mail postage scheme Infeasible solution Tough to impose worldwide Need homogenous technology for all parties Policy responsibility is unclear (Who will police it?)

Cookie Cutters Programs that prevent browsers from exchanging cookies Can block: Cookies Pop-ups http headers that reveal sensitive info Banner ads Animated graphics

Cookie Cutters(cont.) Spyware killers: Programs that gather info and send it to websites Downloaded without user knowledge

Filtering Tools (cont.) Conclusions: New technologies are created everyday Tough to distinguish SPAM Need for a universal organization People are ignorant about the use of cookies

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

Anonymous Tools Enable users to communicate anonymously Masks the IP address and personal info Some use 3rd party proxy servers Strips off user info and sends it to websites Not helpful for online transactions Expensive

Anonymous Tools(Cont.) Types of Anonymizer Technologies: Autonomy Enhancing (Anonymizer) Seclusion Enhancing (iPrivacy) Property Managing (.NET Passport)

Anonymous Tools(Cont.) Autonomy Enhancing Technology: Examples: Anonymizer, Freedom by Zero Knowledge No user Information is stored User has complete control

Anonymous Tools(cont.)

Anonymous Tools (Cont.) Anonymizer: Originally a student project from CMU One of the first PETs Not concerned with transaction security Provides anonymity by: Routing through a proxy server Software to manage security at the PC level (cookies, spyware, …)

Anonymous Tools(Cont.) Anonymizer (Cont.) Can be purchased for $30-$70 Can’t lose password Services: Customize privacy for each site Erases cookies and log files, pop-up blocker, Spyware killer, unlisted IP Reports ISP service

Anonymous Tools (Cont.) Seclusion Enhancing Technologies: Examples: iPrivacy, Incogno SafeZone Target Transaction processing companies Trusted third party who promises not to contact the customer Consumer remains the decision maker

Anonymous Tools (cont.)

Anonymous Tools(Cont.) Seclusion Enhancing Technologies: Keeps limited data (dispute resolution) Transaction by transaction basis Customers can choose to not give any data to merchants

Anonymous Tools (Cont.) iPrivacy Intermediary for users and companies Doesn’t have the ability to look at all user data Cannot map transactions to user info. Each transaction needs to have personal info filled out.

Anonymous Tools(Cont.) iPrivacy(cont.) Customer Downloads software (client-side software for shipping and Credit Card companies) Licensed to Credit Card and Shipping Companies

Anonymous Tools(Cont.) iPrivacy (cont.) Avoids replay attacks for CC companies Allows users to end associations with merchants

Anonymous Tools (Cont.) iPrivacy (cont.) Privacy Policy: Never sees the consumer’s name or address Ensures only CC and shipping companies see data iPrivacy works as a one-way mirror PII filter satisfies HIPAA requirements

Anonymous Tools (cont.) Property Managing Technology Example: .NET Passport All user data is kept by the provider Consumer doesn’t directly communicate with the merchant

Anonymous Tools (cont.)

Anonymous Tools (cont.) Property Managing Technology (cont.) Consumer’s control rights are surrendered for service Potential for misuse of data User gives agency rights to the provider(no direct contact with merchant)

Anonymous Tools (cont.) .NET Passport Single login service Customer’s personal info is contained in the Passport profile. Name, E-mail, state, country, zip, gender, b-day, occupation, telephone # Controls and logs all transactions

Anonymous Tools (cont.) .NET Passport Participating sites can provide personalized services Merchants only get a Unique ID. Participants: Ebay, MSN, Expedia, NASDAQ, Ubid.com

Anonymous Tools (cont.) .NET Passport Privacy Policy: member of TRUSTe privacy program Will not sell or rent data Some sites may require additional info Doesn’t monitor the privacy policies of .NET participants Data is stored in controlled facilities

Anonymous Tools(cont.) .NET Passport Uses “industry-standard” security technologies to encrypt data Uses cookies (Can’t use .NET if you decline) Microsoft has the right to store or process your data in the US or in another country. Abides by the Safe Harbor framework (collection of data from the EU)

Anonymous Tools (cont.) Conclusions: identity is secured through proxy servers Give up privacy for convenience (.NET) Fairly cheap (some free)

PETs Intro Encryption Tools Policy Tools Filtering Tools Anonymous Tools Conclusion

Conclusion Trade-off: Privacy vs. Convenience People want free privacy None of these tools are good enough by themselves Technology that ensures the website is following its policy Need for an universal organization