Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Information Systems in Business
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
A. Haeberlen Having your Cake and Eating it too: Routing Security with Privacy Protections 1 HotNets-X (November 15, 2011) Alexander Gurney * Andreas Haeberlen.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
CS 268: Future Internet Architectures Ion Stoica May 6, 2003.
School of Computer ScienceG53FSP Formal Specification1 Dr. Rong Qu Introduction to Formal Specification
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Abstraction and Control of Transport Networks (ACTN) BoF
Distributed Computer Architecture Benjamin Jordan, Kevin Cone, Jason Bradley.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Fundamentals of ISO.
GETTING WEB READY Introduction to Web Hosting. Table of Contents + Websites: The face of your business …………………………………………………………………………1 + Get your website.
Computer Science 340 Software Design & Testing Design By Contract.
Chapter 10 Architectural Design
Database Design - Lecture 1
DBS201: DBA/DBMS Lecture 13.
Tussel in Cyberspace Based on Slides by I. Stoica.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
- Raghavi Reddy.  With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
CSE 219 Computer Science III Program Design Principles.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Simulation is the process of studying the behavior of a real system by using a model that replicates the behavior of the system under different scenarios.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Foundations of Secure Networked Computing Participants: Chen-Nee Chuah Joan Feigenbaum Russell Impagliazzo Matti Kaariainen Karl Levitt Scott Shenker Salil.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
By Dinesh Bajracharya Nepal Components of Information system.
University of Windsor School of Computer Science Topics in Artificial Intelligence Fall 2008 Sept 11, 2008.
SIGCOMM 2012 (August 16, 2012) Private and Verifiable Interdomain Routing Decisions Mingchen Zhao * Wenchao Zhou * Alexander Gurney * Andreas Haeberlen.
ISO 9000:2000. Overview of the presentation Why so many companies adopt ISO? Why so many companies adopt ISO? What is ISO and ISO 9000:2000? What is ISO.
Marv Adams Chief Information Officer November 29, 2001.
Chapter 16 Control Evidence-Based Decision Making Copyright © 2016 Pearson Canada Inc.16-1.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
MultiMedia by Stephen M. Peters© 2001 South-Western Information Management Systems.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Introduction to Active Directory
1 Middleware and future telecom ’platform’ By Lill Kristiansen, ntnu.
Intelligent Agents Chapter 2. How do you design an intelligent agent? Definition: An intelligent agent perceives its environment via sensors and acts.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Human Resource Management Gaining a Competitive Advantage
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
KNOWLEDGE MANAGEMENT (KM) Session # 15. Knowledge management is a method to simplify and improve the processes of creating, capturing, sharing, distributing,
Any business is suitable to have a sales tracking software that will be utilized during operations. A deal tracking software is considered as a sales tracking.
Internal Control Principles
User-centred system design process
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Intelligent Agents Chapter 2.
Database Management System (DBMS)
Process Approach An introduction.
Database Systems Chapter 1
Chapter 2: Operating-System Structures
Process Approach An introduction.
Computer Science 340 Software Design & Testing
Chapter 2: Operating-System Structures
Presentation transcript:

Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC workshop 17 January, 2006

Networks and Information Flow Core design principles of the current Internet are focused on enabling fast and easy flow of data. Control of personal information is NOT a core principle of the current Internet. How do you enable better control of personal information while maintaining seamless flow of data? Designing a future Internet that does a better job of providing control of personal information will require a change in the way networked computation is done.

Some possible research agenda items Modeling and quantification: –of privacy, of utility, others? [Note that privacy means different things to different people!] –Are there reasonable definitions of privacy that would still allow businesses to collect and store personal information about their customers? Content-awareness of networking architecture. –This could enable better personal control of information but also could have efficiency advantages.

Understanding tradeoffs Tradeoffs: –Apparent tradeoffs may not actually be inherent. In some cases they may. –Armed with proper models, questions about existence of tradeoffs and understanding of their boundaries can be addressed. –Some examples: privacy vs. utility, privacy vs. security, security vs. usability, openness vs. control, end-to-end properties vs. ability to make decisions in the network.

Changing the network What kinds of control of information could be inherently provided by the network? Is it worth revisiting some old ideas to see if they are more deployable now? (e.g., Secure DNS, PKI, S-BGP) What new ideas can provide better control of personal information?

Specification vs. Enforcement Some work is needed to express and support privacy goals, policies, even if we assume all parties follow their instructions: –Languages, policy reconciliation, … –Example: a company has made various promises (via its privacy policy) to its customers, and now wants to know whether it can use some data product in a particular way. Another direction is architectures and protocols that ensure that these are still met even when some parties misbehave. –Lots of existing crypto and security work may be useful here, but some new work is also needed.

Example: Leveraging crypto theory Secure multiparty computation (SMC) results allow computation of any function of distributed inputs without revealing anything else about the inputs. But these definitions are both too strong and too weak: –Too strong: because they provide more privacy than many parties require in many settings, and the resulting cost to deploy them seems to be more than most are willing to pay. –Too weak: because they do not address what is revealed by the output itself, particularly over multiple runs of multiple computations with some or all of the same data.

Leveraging crypto theory, ctd. SMC has a dichotomy in its definition: it protects everything it does not explicitly compute. protected computed

Leveraging crypto theory, ctd. SMC has a dichotomy in its definition: it protects everything it does not explicitly compute. May be able to achieve enough privacy and better practicality via a trichotomy: a computation that explicitly computes some things (its provided utility), explicitly protects some things (its provided privacy), and doesn’t care about the rest:

Leveraging crypto theory, ctd. SMC has a dichotomy in its definition: it protects everything it does not explicitly compute. May be able to achieve enough privacy and better practicality via a trichotomy: a computation that explicitly computes some things (its provided utility), explicitly protects some things (its provided privacy), and doesn’t care about the rest: protected computed no guarantees

Summary Large scale networks create new problems for control of personal information. Some problems are more about applications of networks, while some are core-network related. Technical issues will have to interact with social and legal ones to determine appropriate design goals. Deployment of a next generation Internet gives an opportunity to build in better control from the start.