Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.

Slides:



Advertisements
Similar presentations
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Advertisements

CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing Eric Chung Carnegie Mellon Jason Hong Carnegie Mellon Madhu Prabaker University.
Deploy or Die: A choice for Application-Led Ubiquitous Computing Research Richard Sharp Intel Research, Cambridge.
Putting People in their Places An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications Karen P. Tang Pedram.
Security Awareness: Applying Practical Security in Your World
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
DIR-505 All-in-One Mobile Companion Greg Quinlan Technical Trainer.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
1 Wireless Location Privacy Protection Bill Schilit, Intel Research Jason Hong, University of Califonia, Berkeley Marco Gruteser, University of Colorado.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
Topiary: A Tool for Prototyping Location-Enhanced Applications Yang Li, Jason I. Hong, James A. Landay, Presented by Daniel Schulman.
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
Intro to Context-Aware Computing Jason I. Hong. Context-Aware Computing Shift from explicit to implicit interaction Use this implicit input to adapt systems.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
WiFi-Reports: Improving Wireless Network Selection Jeffrey Pang (CMU) with Ben Greenstein (IRS) Michael Kaminsky (IRP) Damon McCoy (U. Colorado) Srinivasan.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
PLUG IT IN SIX Protecting Your Information Assets.
Panel: Prototyping and Building Systems Four Rants on Privacy and Ubicomp Jason I. Hong jasonh at cs cmu edu Intel Usable Privacy Forum.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Alastair R. Beresford Frank Stajano University of Cambridge Presented by Arcadiy Kantor — CS4440 September 13, 2007.
#citrt #RefreshCache Networking Basics Foundational Concepts Elliott Wood - Solerant.
Getting to Know Your Computer Your File System Applications What’s running on your machine Its own devices Networking.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Network Components By Cameron Baker.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Usable Privacy and Security and Mobile Social Services Jason Hong
Privacy, Security, and Ubiquitous Computing Jason I. Hong.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Prof. James A. Landay Richard Davis Kate Everitt University of Washington Autumn 2004 UW Undergraduate HCI Projects A CSE 490jl Overview December 9, 2004.
Assignment # 3 Networking Components By: Jeff Long.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Tom Maloney. Overview What is ProDiscover What it can be used for A few quick tools A real example ProDiscover vs. ENCASE ProDiscover IR Applications.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
How to root Android Phone and Tablet for free and safe.
By: Tom Maloney. Overview What is ProDiscover What it can be used for A few quick tools A real example ProDiscover vs. ENCASE ProDiscover IR Applications.
CS101 Booting A Computer.
TECHNOLOGY GUIDE THREE
How To Set Up A Wireless Network
Section 15.1 Section 15.2 Identify Webmastering tasks
Online software and backups
Presentation transcript:

Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David McDonald Bill Schilit Doug Tygar

Oct PlaceLab Overview Location-enhanced computing major ubicomp focus for over a decade, but few real apps out there – Need low-cost and convenient location finding tech – Need critical mass of useful location-based services – Need techniques to address privacy Goal of PlaceLab – Provide open software base and community building – Catalyze adoption of location-based services

Oct Key Ideas in PlaceLab Can use WiFi to determine rough location – Can use overlapping hotspots for better estimation A B C ~few meters ~city block

Oct Key Ideas in PlaceLab Can use WiFi to determine rough location Can cache directories of hotspots locally on devices – Continuously updated directories of hotspot locations Access point MAC address -> Location – Local computation, local storage – Only you know where you are

Oct Key Ideas in PlaceLab Can use WiFi to determine rough location Can cache directories of hotspots locally on devices Can cache location-enhanced content as well – Occasionally connected computing – Ex. Zagat restaurant guide – Location-enhanced web content – Local computation, local storage

Oct Key Ideas in PlaceLab Can use WiFi to determine rough location Can cache directories of hotspots locally on devices Can cache location-enhanced content as well Can choose when to share location data with others

Oct Privacy of Stakeholders in PlaceLab End-Users – Network service providers, Web service providers – Anonymizers, mixes, pre-fetching, etc (see workshop paper) Access point owners – Co-opted for new purpose in PlaceLab – Turn off broadcasting of Access Point (opt out) – Encrypt cached directories Make location of AP visible only if person actually nearby

Oct Discussion PlaceBar is a kind of privacy widget, other kinds? PlaceLab is decentralized, starts with data at edge of network to drive adoption. Applicable elsewhere? Privacy cuts across HW, OS, networking, UI. What mechanisms and support are needed in these layers? – Ex. How to build plausible deniability into systems? What are actual privacy concerns for location? – Spatial Granularity, ex. City -> zip -> street – Temporal Granularity, ex. At Tahoe “last month” vs “July 1” – Freshness, ex. “You can have my location if over week old”

Oct Backup

Oct Privacy of Stakeholders in PlaceLab End-Users – Disconnected mode is relatively safe – Connected mode managed via PlaceBar – Spoofing of personal device’s MAC address – WiFi range ~150 meters, some plausible deniability

Oct Privacy of Stakeholders in PlaceLab End-Users Access point owners Network Service Providers and End-Users – Can use mixes to aggregate and redirect traffic – Access points tend to dynamically assign IP addresses – Overall, hard for network service provides to identify individuals

Oct Privacy of Stakeholders in PlaceLab End-Users Access point owners Network Service Providers and End-Users Web Service Providers and End-Users – Can correlate past IP addresses with locations Use anonymizers Web service provides might not be able to link to identifiable info – P3P extensions? – Pre-fetch chunks of data at a time