Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Aspire Vertical Markets Law Office. Law Office Solutions.
Frank Stajano Presented by Patrick Davis 1.  Ubiquitous Computing ◦ Exact concept inception date is unknown ◦ Basically background computing in life.
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Chp 1 – Introduction to Computers
Outcomes By the end of this session, participants will be able to:
SMART HOMES The way we nest now Suhasini K Vamsi Priya V Sushmitha K.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
ICT Curriculum Evening – an introduction to Wizkid.
1 Ubiquitous Computing CS376 Reading Summary Taemie Kim.
Ubiquitous Computing Computers everywhere. Agenda Amy: 3D Interaction Project Presentation New concept video
Marko Schuba UMTS Services September 7, UMTS Services Marko Schuba Ericsson Research, Corporate Unit.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Ubiquitous Computing Computers everywhere. Thursday: presentations UCook Team NoName Save the Best for Last Food Networking.
Ubiquitous Computing Computers everywhere.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
Pervasive Computing Review Joshua R. Smith, Class of 2006 Interdisciplinary Engineering and Management Mentor: Dr. Sunil Kumar July 31, 2003.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
Jan 11, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Class participation is very important. You will be graded on your involvement in class discussions.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
REPORTSTAR Health Monitoring Software Overview. WHAT IS REPORTSTAR?
Value-Centered Design Issues in Ubiquitous Computing Steve Shafer r.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Chapter 1 Defining Information Technology. Learning Objectives The “big idea” of computing inventions Explain why it’s important to know the right word.
Project and programme NHS It is a research and development system, is also used to find achievable milestones or to find risks, it will also manage documentation.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
P ERVASIVE C OMPUTING Ian Christe 1. K EY D EFINITIONS Pervasive - Spreading widely throughout an area or a group of people. Ubiquitous - Present, appearing,
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 9.
ISNE 101 Week 8 Dr. Ken Cosh. Next Assignment!  Choose a Movie (Futuristic)  First Come, First Served – different movies – get my approval first! 
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
203A Intro to Ubicomp Prof. Cristina Lopes
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
Ubiquitous Computing Software Systems.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Uichin Lee KAIST KSE KSE801: Mobile and Pervasive Computing for Knowledge Services.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Beyond The Desktop The Future of the Interface. The co-evolution of hardware, interface and users Punched cards Character displays and keyboards Graphical.
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
The Augmented Window Danielle Frasier, Kaitlyn Lo, Alicia Kapjian-Pitt.
Winning Wireless Applications Corina Moore PrinterOn Corporation
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Ubiquitous Computing Computers everywhere. Wednesday: presentations Ideal Concepts T.H.E. Team Infused Industries CommuniCORP Part 3 DUE!
Ambient Intelligence: Everyday Living Aid System for Elders
Ubiquitous, Domestic and Tangible Computing A new way of thinking Saul Greenberg University of Calgary CPSC
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Ubiquitous means ‘everywhere’
Ubiquitous and Pervasive Computing. MY DEFINTION OF PERVASIVE COMPUTING Pervasive computing describes the trend that connected computational devices become.
Internet of Things – Getting Started
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
1 Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
5G is coming Zoltán Turányi 5G Expert, Ericsson Research
Technology in Your Life
The Cost of Free Lesson 4-4.
RFID Based Student Tracking
Ubiquitous Computing and Augmented Realities
Computer Hardware-Meeting the machine
Networking Applications
Ubiquitous Computing Computers everywhere.
Pervasive Computing Ubiquitous computing resources
Ubiquitous Computing By: Patrick Yienger.
Internet of Things (IoT)
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Security and Privacy in Ubiquitous Computing

Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security discussion Privacy and security discussion David Nguyen – guest student David Nguyen – guest student More discussion More discussion Course surveys Course surveys

Ubiquitous Computing (Ubicomp) Move beyond desktop machine Move beyond desktop machine Computing is embedded everywhere in the environment Computing is embedded everywhere in the environment Known by many things… Known by many things… –“off the desktop”, “out of the box”, pervasive, invisible, wearable, calm, anytime/anywhere/any place, …

Marc Weiser: The father of ubicomp Chief Technologist Xerox PARC Chief Technologist Xerox PARC Began Ubiquitous Computing Project in 1988 Began Ubiquitous Computing Project in Scientific American article got the ball rolling 1991 Scientific American article got the ball rolling

Key quotes: “The most profound technologies are those that disappear” “The most profound technologies are those that disappear” “embodied virtuality" “embodied virtuality"

Ubicomp Notions Computing capabilities, any time, any place Computing capabilities, any time, any place “Invisible” resources “Invisible” resources Machines sense users’ presence and act accordingly Machines sense users’ presence and act accordingly

Ubicomp is... Related to: Related to: –mobile computing –wearable computing –augmented reality In contrast with: In contrast with: –virtual reality

Some scenarios – the office Smart meeting room Smart meeting room –Automatically adjusts room conditions –automatically links the devices everyone is using to each other and the display so people can easily push and pull information –Shares needed info with remote participants –Automatically creates a meeting record for everyone there, stores it properly, etc…

Some scenarios – the home Rooms adjust to people and activities – turn on lights, don’t bother family during dinner, etc... Rooms adjust to people and activities – turn on lights, don’t bother family during dinner, etc... Reminds or alerts people of activities (soccer game at 7), problems (heater malfunctioning), needs (out of milk) Reminds or alerts people of activities (soccer game at 7), problems (heater malfunctioning), needs (out of milk) Records family memories – first steps, Christmas… Records family memories – first steps, Christmas… Helps communicate and connect with outside family members – shared audio / video / photos / message boards, etc. Helps communicate and connect with outside family members – shared audio / video / photos / message boards, etc. Locates your keys, favorite sweater, that important document Locates your keys, favorite sweater, that important document Monitors your health and alerts to problems Monitors your health and alerts to problems

Some scenarios – in the world Easily find your way around and to desired places, stores and tourist sites Easily find your way around and to desired places, stores and tourist sites Get information relevant to where you are and what you are doing Get information relevant to where you are and what you are doing Access your personal information, check , check on your house, from your mobile device no matter where you are Access your personal information, check , check on your house, from your mobile device no matter where you are Let friends and family check on you and know what’s going on and where you are Let friends and family check on you and know what’s going on and where you are Meet and socialize with new people and old friends Meet and socialize with new people and old friends Play games in the environment Play games in the environment

Technology Many scenarios require knowing a subset of the following: Many scenarios require knowing a subset of the following: –who the user is –where the user is located –where various objects are located –the conditions in the environment –Infer what people are doing and want to do Using a variety of sensors, networking infrastructures, middleware, distributed software systems Using a variety of sensors, networking infrastructures, middleware, distributed software systems And a variety of input and output devices And a variety of input and output devices

General questions What are security implications for Ubicomp? How does this differ from what we’ve talked about so far? What are security implications for Ubicomp? How does this differ from what we’ve talked about so far? What are privacy implications and how does this differ? What are privacy implications and how does this differ? What should we be doing now to prepare for Ubicomp apps? What should we be doing now to prepare for Ubicomp apps?

Tradeoffs Are we better with or without lots of privacy in this new world? (benefits outweigh negatives) Are we better with or without lots of privacy in this new world? (benefits outweigh negatives) Examples: Examples: –Your car monitors how safely you drive, insurance companies adjust rates accordingly. What if the end effect is lowering accident rates? –You have several applications that help persuade you to get more exercise and be healthier, monitored by your doctor. Your insurance rates are lowered if you are successful. –Your home can easily record and organize hard-to-get moments, like your child’s first steps and first words. But your spouse can also use this to replay your exact words in that argument last night.

Privacy by design Notice: How invisible should protections be? Notice: How invisible should protections be? Consent: How can explicit consent be achieved? What requires it? Consent: How can explicit consent be achieved? What requires it? Anonymity: can we achieve anonymity? When should we still remain anonymous? From whom? Anonymity: can we achieve anonymity? When should we still remain anonymous? From whom? Proximity: how can this be used for security and privacy? Proximity: how can this be used for security and privacy?

Big Stick What is the Big Stick principle? What is the Big Stick principle? Why is this relevant to Ubicomp? Why is this relevant to Ubicomp? In what scenarios is this sufficient? In what scenarios is this sufficient? In what scenarios is this not sufficient? In what scenarios is this not sufficient?

Case study: RFID Radio Frequency Identification Radio Frequency Identification –Tags on objects with unique ID, readers provide power, work from some distance away Where is it being used now? Where is it being used now? What are the security issues? What are the security issues? What are the privacy issues? What are the privacy issues? What are potential solutions? What are potential solutions?