An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.

Slides:



Advertisements
Similar presentations
Request Management Mirror-. A random three day sample of Incidents revealed that about 86% of the registered Incidents were legitimate Requests Many other.
Advertisements

LeadManager™- Internet Marketing Lead Management Solution May, 2009.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
An Architecture for Privacy-Sensitive Ubiquitous Computing 1 Cindy Nguyen An Architecture for Privacy-Sensitive Ubiquitous Computing By: Cindy Nguyen University.
Multi-Mode Survey Management An Approach to Addressing its Challenges
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason Hong Carnegie Mellon Jennifer Ng Carnegie Mellon Scott Lederer University.
1 System Needs for Fast Location Aware Application Development Spatial Group Meeting 4/1/2004 shashi-group/
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing Eric Chung Carnegie Mellon Jason Hong Carnegie Mellon Madhu Prabaker University.
Applications and Privacy Issues with Sensor Nets Jason Hong Carnegie Mellon University.
Privacy and Sensor Andrew Jason Hong. Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale Questions –What data is collected?
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
UbiComp ’03 – Context Awareness Session liquid context-aware distributed queries jeffrey heer alan newberger chris beckmann jason i. hong group.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
A Guide for Getting Started
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
EZID (easy-eye-dee) is a service that makes it simple for digital object producers (researchers and others) to obtain and manage long-term identifiers.
Norman SecureSurf Protect your users when surfing the Internet.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
A Network Marketer’s Template for Creating a Target Audience Profile [name] [demographic] [goals] [and more]
Topiary: A Tool for Prototyping Location-Enhanced Applications Yang Li, Jason I. Hong, James A. Landay, Presented by Daniel Schulman.
Visibility and promotion of your team inside Company How to sell results of your team?
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Tom Clarke VP, Research & Technology National Center for State Courts.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Georgia Institute of Technology LEE SEMUN.
Research Topics in Ubiquitous Computing Jason I. Hong jasonh at cs cmu edu f2004/readings.html
STEALTH TRACKER STEALTH TR STEALTH TRACKER Agenda: Review MyMajors Stealth Tracker Combined workflow Tracker results & stats Mobile App Questions MOBILE.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
1 Chapter 7 Designing for the Human Experience in Smart Environments.
Panel: Prototyping and Building Systems Four Rants on Privacy and Ubicomp Jason I. Hong jasonh at cs cmu edu Intel Usable Privacy Forum.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Using the Right Method to Collect Information IW233 Amanda Murphy.
Tools for Web Design and for Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
Using REDCap (Research Electronic Data Capture) as a tool to perform research studies Abstract ID no. IRIA-1076.
Usable Privacy and Security and Mobile Social Services Jason Hong
Privacy, Security, and Ubiquitous Computing Jason I. Hong.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Executive Summary - Human Factors Heuristic Evaluation 04/18/2014.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Papier-Mache: Toolkit Support for Tangible Input HCI Group University of California Scott R. Klemmer Jack Li James Lin DUB Group University of Washington.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
A Case Study in Building Layered DHT Applications
Full Page Watermarking
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Other Sources of Information
Scott Thorne & Chuck Shubert
ONLINE SECURE DATA SERVICE
Presentation transcript:

An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and Eng. University of Washington

Ubicomp Privacy is a Serious Concern From a nurse required to wear active badge “[It] could tell when you were in the bathroom, when you left the unit, and how long and where you ate your lunch. EXACTLY what you are afraid of.” -allnurses.com

Ubicomp Presents Range of Privacy Risks Everyday RisksExtreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety Employers _________________________________ Over-monitoring Discrimination Reputation Friends, Family _________________________________ Over-protection Social obligations Embarrassment Government __________________________ Civil liberties How to maximize real benefit of ubicomp while minimizing perceived and actual privacy risks?

Approach Confab Privacy Toolkit Informed by End-User Needs Hard to analyze privacy –Analysis of end-user needs for ubicomp privacy Interviews, surveys, postings on message boards Hard to implement privacy-sensitive systems –Confab toolkit for privacy-sensitive ubicomp apps Capture, processing and presentation of personal info Focus on location privacy –Evaluation thru building apps Location-enhanced messenger Location-enhanced web proxy

Outline  Motivation  End-user Privacy Needs  Confab Toolkit for Privacy-Sensitive Ubicomp  Applications Built

An HCI Perspective on Privacy “The problem, while often couched in terms of privacy, is really one of control. If the computational system is invisible as well as extensive, it becomes hard to know: – what is controlling what – what is connected to what – where information is flowing – how it is being used The Origins of Ubiquitous Computing Research at PARC in the Late 1980s Weiser, Gold, Brown Empower people so they can choose to share: the right information with the right people or services at the right time

Analysis of End-User Privacy Needs Lots of speculation about ubicomp privacy, little data Published Sources –Examined papers describing usage of ubicomp systems –Examined existing and proposed privacy protection laws Surveys and Interviews –Analyzed survey data of 130 people on ubicomp privacy prefs –Interviewed 20 people on location-based services Existing Systems –Analyzed postings on nurse message board on locator systems

Summary of End-User Privacy Needs Clear value proposition Simple and appropriate control and feedback Plausible deniability Limited retention of data Decentralized control Special exceptions for emergencies Alice’s Location Bob’s Location

Outline  Motivation  End-user Privacy Needs  Confab Toolkit for Privacy-Sensitive Ubicomp  Applications Built

Confab Toolkit for Privacy-Sensitive Ubicomp Confab for privacy-sensitive ubicomp apps –Cover end-user privacy needs –Provide solid technical foundation for privacy-sensitive ubicomp A toolkit needs to support all three of these layers –Must capture, store, process, & share in privacy-sensitive manner Physical / Sensor Infrastructure Presentation I might present choices well to users… …but not have control over how the info was acquired or processed …but not help developers process it safely or provide visibility to end-users I might acquire information privately…

Past Work Addresses at Most One Layer Today, building privacy-sensitive apps would have to be done in an ad hoc manner Physical / Sensor Infrastructure Presentation Cricket Location Beacons, Active Bats P3P, Privacy Mirrors ParcTab System, Context Toolkit

Confab High-Level Architecture Capture, store, and process personal data on my computer as much as possible (laptops and PDAs) Provide greater control and feedback over sharing InfoSpace Data Store InfoSpace Data Store LocName App On Operators Source Sources Out OperatorsIn Operators My Computer Logging Check Privacy Tag Invisible Mode Enforce Access User Interfaces Garbage Collect Periodic Reports

Example Built-in Confab Operator Flow Control Goal: Disclose different info to different requestors Conditions –Age of data– Data Format –Requestor Domain– Data Type –Requestor ID– Current Time –Requestor Location Actions –Lower Precision– Allow –Set (fake value)– Hide (data is removed) –Invisible(no out data)– Timeout (fake network load) –Interactive– Deny (forbidden)

Outline  Motivation  End-user Privacy Needs  Confab Toolkit for Privacy-Sensitive Ubicomp  Physical layer for acquiring location  Infrastructure layer  Presentation layer  Applications Built

Physical / Sensor Layer Intel’s Place Lab Location Source Determine location via local database of WiFi Access Points –Unique WiFi MAC Address -> Latitude, Longitude –Periodically update your local copy ABC –Works indoors and in urban canyons –Works with encrypted nodes –No special equipment –Privacy-sensitive –Rides the WiFi wave

PlaceLab Data at SF Bay Area SF Bay Area ~60000 Nodes (~4 Megs)

PlaceLab Data at UC Berkeley University of California Berkeley Berkeley Campus ~1000 Nodes

Outline  Motivation  End-user Privacy Needs  Confab Toolkit for Privacy-Sensitive Ubicomp  Physical layer for acquiring location  Infrastructure layer  Presentation layer  Applications Built

Infrastructure Layer Confab’s Built-in MiniGIS Operator People and apps need semantically useful names –“Meet me at , ” MiniGIS operator transforms location info locally –Using network-based services would be privacy hole Whittled down to 30 megs from public sources –Places hardest to get, 3 ugrads + me scouring Berkeley Country Name= United States Region Name= California City Name= Berkeley ZIP Code= Place Name= Soda Hall Latitude/Longitude= ,

Confab Architecture InfoSpace Data Store InfoSpace Data Store LocName PlaceLab Source Tourguide Location Messenger How to make users aware of and be able to control the flow of personal info? My Computer Out Operators Flow Control MiniGIS

Outline  Motivation  End-user Privacy Needs  Pitfalls in User Interfaces for Privacy  Confab Toolkit for Privacy-Sensitive Ubicomp  Physical layer for acquiring location  Infrastructure layer  Presentation layer  Applications Built

Notification UI when others request your location (pull) –Default is always “unknown” (plausible deniability) Presentation Layer Notifications

Presentation Layer PlaceBar PlaceBar UI used when you send to others (push) –If you give me “city” location, I can offer “events, museum lines”

Confab Architecture InfoSpace Data Store InfoSpace Data Store LocName PlaceLab Source Location Messenger How to control personal info once it leaves your computer? My Computer Tourguide

Privacy Tags Digital Rights Management for Privacy –Like adding note to , “Please don’t forward” –Notify address- –Time to live- 5 days –Max number of sightings- last 5 sightings of my location Provide libraries for making it easy for app developers Requires non-technical solutions for deployment –Market support thru TrustE, Consumer Reports –Legal support thru data retention laws

Outline  Motivation  Analysis of End-user Privacy Needs  Confab Toolkit for Privacy-Sensitive Ubicomp  Applications Built

Putting it Together #1 Location-Enhanced Messenger

Putting it Together #2 Location-Enhanced Web Proxy Auto-fills location information on existing web sites Starbucks MapQuest PageModification URL= txtCity=CityName txtState=RegionCode txtZip=ZIPCode

Location-aware web sites –Different content based on your current location Putting it Together #2 Location-Enhanced Web Proxy

Application Details Location-enhanced Instant Messenger –Uses Hamsam library for cross-platform IM –~2500 LOCs across 23 classes, about 5 weeks (mostly GUI) –Acquiring location, InfoSpace store (and prefs), location queries, automatic updates, access notifications, MiniGIS + dataset Location-enhanced web proxy –Added ~800 LOCs to existing 800 LOCs, about 1 week –Location queries, automatic updates, MiniGIS + dataset, PlaceBar Other apps –Emergency Response app, distributed querying app Confab reduces what would be a lot of duplicated work

Other Parts of this Work Common risks to design for in privacy-sensitive systems? Hong, Ng, Lederer, Landay [DIS2004] Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Common mistakes to avoid in the user interface? Lederer, Hong, Dey, Landay [PUC 2004] Personal Privacy through Understanding and Action: Five Pitfalls for Designers Design rationale at presentation layer User evaluations of the apps

Conclusions Confab toolkit for facilitating construction of privacy- sensitive ubicomp applications –Privacy at physical, infrastructure, and presentation layers –Push architecture towards local capture, processing, storage –Couple w/ better UIs for greater choice, control, and feedback “Use technology correctly to enhance life. It is important that people have a choice in how much information can be disclosed. Then the technology is useful.”

Thanks to: DARPA Expeditions NSF ITR Intel Fellowship Siebel Systems Fellowship PARC Intel Research John Canny Anind Dey Scott Lederer Jennifer Ng Bill Schilit Doug Tygar Many, many others… Jason I. Hong Acknowledgements

Hypothesis: The Privacy Hump Pessimistic Many legitimate concerns Many alarmist rants “Right” way to deploy? Value proposition? Rules on fair use? Optimistic Things have settled down Few fears materialized Market, Social, Legal, Tech We get tangible value time fears

Missing Pieces of the Privacy Puzzle How do privacy perceptions change over time? –Ecommerce studies suggest experience important, privacy hump How do privacy perceptions vary across cultures? –Western cultures tend to be more individualistic Metrics for privacy? –Specific data types (location) or problems (price discrimination) Economic incentives for companies to do “the right thing”? Other kinds of protection at the physical layer? How perfect do we want our ubicomp systems to be? –Accurate and reliable -> harder to lie