Keeping Ubiquitous Computing To Yourself: Privacy Protection in UbiComp Karim Adam Computing Research Centre The Open University.

Slides:



Advertisements
Similar presentations
Publishing Set-Valued Data via Differential Privacy Rui Chen, Concordia University Noman Mohammed, Concordia University Benjamin C. M. Fung, Concordia.
Advertisements

NIS in Poland current situation and recommendations for the future I. Kijenska Faculty of Materials Science and Engineering, Warsaw University of Technology/PRESAFE.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Context-based Detection of Privacy Violation Bharat Bhargava In collaboration with Mark Linderman (AFRL) and Chao Wang (UNCC) Purdue University
“Reform of the Child Care System: Taking Stock and Accelerating Action” South East Europe 3 – 6 July 2007, Sofia.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
 There are many different scenarios in life where the skills of a good event planner are needed. An event planner might be utilized for any number of.
Privacy Preserving in Ubiquitous Computing: Architecture Information Technology Journal 8 (6): , 2009 Tinghuai Ma, Sen Yang, Wei Tian, Wenjie Liu.
The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division.
Copyright © 2007 Pearson Education Canada5-1 WELCOME PMBA 502 TODAY TODAY (Oct. 27, 2008) : Chp. 5 Discussion Questions: P. 157, Q2 P. 196, 3a and 3b NOTE.
Numbers
ReQuest (Validating Semantic Searches) Norman Piedade de Noronha 16 th July, 2004.
Domain-Driven Design: Large-Scale Structure*
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Tax Compliance Report January 30 th, Major Themes of Study IRS and other states also have income tax compliance issues. Estimating the level of.
APPLYING EPSILON-DIFFERENTIAL PRIVATE QUERY LOG RELEASING SCHEME TO DOCUMENT RETRIEVAL Sicong Zhang, Hui Yang, Lisa Singh Georgetown University August.
AUSTRALIAN HEALTH CARE DELIVERY. ISSUES Complexity of financing health care delivery system Medicare concept and community understanding Public hospitals.
Health Care Cost Database Presented by the Office of the Commissioner of Securities and Insurance January 2011.
Week1 Architecture - Lecture outline & Assignments Dr. John Abraham UTPA.
computer
Protecting Sensitive Labels in Social Network Data Anonymization.
BUILDING ON COMMON GROUND: EXPLORING THE INTERSECTION OF ARCHIVES AND DATA CURATION Lizzy Rolando & Wendy Hagenmaier 6/3/2015IASSIST 2015.
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes George Yee and Larry Korba {George.Yee, PST 2005 October 12-14, 2005.
Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami National Institute of Informatics FAIS 2011.
Glenn Groulx, B Ed., MDE Introducing Edu- Blogging.
Introduction to eTwinning Date. Concept of eTwinning.
A Study of Smartphone User Privacy from the Advertiser's Perspective Yan Wang 1, Yingying Chen 1, Fan Ye 2, Jie Yang 3, Hongbo Liu 4 1 Department of Electrical.
Promoting safe and healthy ways of using the internet in the classroom Ms. Sherman.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Recruiting, Training, and Motivating Employees. Lesson Goals: Learn procedures for finding and selecting employees Create plan for securing and maintaining.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science.
Hoda Jannati School of Computer Science
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Community Innovation Survey ”Innovation Activity of Polish Enterprises in Service Sector ” Izabela Kijenska Ph.D. candidate.
WHAT IS THE POTENTIAL EFFECT ON YOU AS A TEACHER OF STUDENTS WHO LACK MOTIVATION?
Comments on P D25 August 24, Kaliski/1 (technical) D [B15] also describes a multi- server scheme that obtains a retrieved key using.
Recruiting, Training, and Motivating Employees. Getting the Best Employees Recruiting Training Maintaining Terminating Recruiting, Training, and Motivating.
Social Reading and Privacy Norms: The Aesthetic of Simplicity, Online Reading, and Interface Confusion J. Richard Stevens.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Sam Dawson Course Tutor 19/10/2015.  To start Unit 129- Introduction to the values and principles of Adult Social Care.  Recap on previous lesson. 
What is it? What can we do to help? Why it is important to help? By: Selines Padilla Public School 28 New York, New York.
10-1 人生与责任 淮安工业园区实验学校 连芳芳 “ 自我介绍 ” “ 自我介绍 ” 儿童时期的我.
B300B Policy Chapter 4 By: WASSIM ALWAN. culture, social norms and economics: some implication for policy.
This presentation has been IRM protected by policy.
Entrepreneurship Demo Centre “SPARKDemo” in Tartu
CSC350: Learning Management Systems
Interactive Teaching and Student Response System (SRS)
Yahoo Mail Customer Support Number
Most Effective Techniques to Park your Manual Transmission Car
How do Power Car Windows Ensure Occupants Safety
مراقبت خانواده محور در NICU
Ch 13 – Initiating the Sale
Corporate Privacy Lars Davies 10 November 2010.
عمل الطالبة : هايدى محمد عبد المنعم حسين
دانشگاه شهیدرجایی تهران
تعهدات مشتری در کنوانسیون بیع بین المللی
THANK YOU!.
بسمه تعالی کارگاه ارزشیابی پیشرفت تحصیلی
دومین کمیته مترجمین حاکمیت بالینی دانشگاه
ELECTRONIC PAYMENT SYSTEM.
Thank you.
Thank you.
Computer-Mediated Communication
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web Philipp Kärger and Wolf Siberski L3S Research Center, Hannover, Germany.
Centre for Technology Alternatives for Rural Areas, IIT Bombay
Week1 Architecture - Lecture outline & Assignments
Presentation transcript:

Keeping Ubiquitous Computing To Yourself: Privacy Protection in UbiComp Karim Adam Computing Research Centre The Open University

Outline of presentation  Motivation  Objectives  Approach

Why Privacy?  Privacy protection probably more crucial in UbiComp than other Computing paradigms Lack of feedback Lack of control Deviation from social norms

Objectives  To provide privacy protection  To manage privacy protection using privacy policies  To aid in the re-use of privacy policies

The way we do this is by……  A matching concept  Introducing noise – obfuscation, anonymity,…  A utility-based approach

Semi-automatic derivation of privacy policies [Yee & Korba, 2005] Based on:  Derivation from 3 rd Party surveys  Retrieval from community of peers

Utility Model [Acquisti(2002)] The Utility, of completing a certain transaction t is given by: Keeping information private Completing a transaction Cost of using technology

Thanks for your attention!!