PRIVAD: PRACTICAL PRIVACY IN ONLINE ADVERTISING Offense: Arindam Paul.

Slides:



Advertisements
Similar presentations
Predictive Client-Side Profiles for Personalized Advertising Misha Bilenko and Matt Richardson.
Advertisements

Top Tips on Funding Bids Maximizing your organisation’s chances.
Equalities and Procurement Workshop 1 Identifying Need and Creating the Specification Buying Better Outcomes.
Itay Gonshorovitz Foundation of privacy Targeted Online Advertising.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
22 August 2012 Regulating for productive efficiency – an assessment of the regulatory framework faced by Eskom Presented at the South African Economic.
Disability Equality Policy and Practice Issues facing people with learning difficulties and ideas about how to make the situation better.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
The Evolution of Online Advertisement Casey Shannon CompSci 49S February 21, 2008.
The Big lottery Fund – an overview Tri-borough 19 th June 2014.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Lecture 21: Privacy and Online Advertising. References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis.
CLICK FRAUD Alexander Tuzhilin By Vinny Rey. Why was the study done? Google was getting sued by advertisers because of click fraud. Google agreed to have.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Introduction to Network Defense
How It Applies In A Virtual World
SOCIAL MEDIA OPTIMIZATION – GOOGLE ADSENSE, ANALYTICS, ADWORDS & MUCH MORE Ritesh Ambastha, iWillStudy.com.
CELTS Collection Exchange & Loan Tracking System Efficiency Tools, Inc. P.O. Box Carrollton, Texas Phone Let Efficiency.
CCT356: Online Advertising and Marketing Class 4: Affiliate Marketing.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Take-down Notice Workshop Take-down notice process in a nutshell  The take-down notice process is a mechanism for members of the public to notify an ISP.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Click Fraud Forensics Dean Qudah Pace University DPS 2010.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Ilkka Kiema Future Internet and Economics (FIEN) Workshop May 6, 2009 Some Economic Aspects of Future Internet.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Use data-driven app marketing to get your app to rank #1 in the App Store and increase ROI.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Principles on evaluating FIWARE relevance for Phase 3 proposals.
REAL WORLD RESEARCH THIRD EDITION Chapter 8: Designs for Particular Purposes: Evaluation, Action and Change 1©2011 John Wiley & Sons Ltd.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Bob Jones Technical Director CERN - August 2003 EGEE is proposed as a project to be funded by the European Union under contract IST
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Page 1 May 10, 2011 IT for the 12 GeV Era 2011 Review Review Closing Summary.
For Your Eyes Only Are there alternatives to the consensual exploitation on social media? Vincent Toubiana (Bell Labs France)
1 Use of aggregated SPPIs as a macro economic indicator of inflationary pressure: country views and possible future STESWP work Richard McKenzie & Seppo.
Alain Thomas Overview workshop Background to the Principles Definitions The National Principles for Public Engagement What.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Review of the Previous Lecture Business Fixed Investment –Stock Market and Tobin’s q –Financing Constraints Residential Investment.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
THE SOCIAL NATURE OF TECHNOLOGY: THE TELEPHONE (PART II) I203 Social and Organizational Issues of Information.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Political Economy and Facebook Privacy
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Turning Software into a Service – The Critique Paul Kopacz Brian Moore.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Video #1 What is Google AdSense and how can you make money with it?
Why Stakeholder Theorists Should Support Stakeholder Democracy Jeffrey Moriarty Bentley University February, 2011.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
3.6 Fundamentals of cyber security
The Internet Industry Week Two.
Social Media as Instruments of Control and Consensus Making
Andy Taylor Partner Program, RPost
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Online research.
BMV Leisure & Shaftesbury Luxury Lodges GDPR Statement
Internet Safety – Social Media
Dr. Panayiotis Agisilaou Trojan Economics & Open University of Cyprus
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

PRIVAD: PRACTICAL PRIVACY IN ONLINE ADVERTISING Offense: Arindam Paul

An “Utopian” Assumption  “Our design assumes that privacy advocates will be hard to win over, and therefore favors privacy concerns over business concerns”  We are talking about advertisement  This has got to do everything with business  Nothing which affects profitability of the big players is going to work in the real world  Why would the brokers (e.g. Google) even agree to be bound to such a model ?

What they themselves say?  “Entrenched players like Google have strong incentives, lobbying power and the capital needed to maintain the status quo”  “Powerful ISPs successfully resisted new regulations threatening their business model”  So, why now they would be ready now ?

Third Parties  None of the models which have suggested usage of a 3 rd party has worked in real life.  “For sale: Your Data, By: You” by Riederer et.al  This paper  How to arrange for trusted/untrusted 3 rd parties is an unsolved problem in the Internet community  Reasons cited: Greed (business sense), politics, etc.

Significant change from current model  Adding two extra redirections in an already complex model (Publisher, Broker, Advertiser)  Dealer  Monitor (at Client)

Dealer  Run by “untrusted third party organizations”  Paper states cost of dealer will be met by  “privacy advocates” ???  No such instance of funding found even in “more” privacy aware EU

Monitor at Client  No real incentive  For testing, MSR paid money for installing  Depended on “forgetfulness” of these paid users to collect data

BETTER & SIMPLER ALTERNATIVES

What Privacy Advocates say?  Softer requirements of “Privacy Advocates”  “Individuals be able to control their personal information”  “Hold accountable organizations responsible”  Much easily possible by simple browser extensions and “Opt Out” features

Ad Block Plus  Gives option of removing ads altogether  “Privad is not aimed for users that disable ads altogether”  Ad Block Plus also allows option of keeping of relevant ads  Present well before 2011

Do Not Track

Other Extensions  Some Internet and software development firms have created individual browser extensions that permit users to opt out of tracking cookies from a wide range of advertising networks.  Targeted Advertising Cookie Opt-Out (TACO) helps Internet users avoid and remove tracking cookies from 27 advertising networks.

SERIOUS LIMITATIONS

CLICK-FRAUD  Per User Thresholds  Blacklist  Honeyfarms  Historical Statistics  Premium Clicks  Bait Ads  “Overall these mechanisms have effect of more-or- less putting Privad back on an even footing with current ad networks as far as click-fraud”

CLICK FRAUD AND DEPLOYMENT  No mention of click-fraud detection success in the evaluation  If this is so successful, why not any measurement results ?

Ads at localhost  Does Google or well-known brokers not better at understanding user profiles and giving ads ?  Tries to mimic the broker algorithms ???  They suggest a “simple” broker model  Doubt Google would like or trust these “Ads”  Most of their money is driven by personalized/contextual ads

Malware  “Malware today can learn anything. The client is able to learn, and so not protecting against this threat does not qualitatively change anything.”  ???  Malware gets ready-made profiled data  No need to monitor over time to build data  Actually, this gives an incentive to un-trusted organizations to steal and then sell private data  Google or XYZ ? The assumption of “honest but curious” no longer holds for XYZ

Practicality and Novelty  “Privad scales to present-day needs”  No testing on mobile users ??? Battery usage  “During 12 months deployment, we have not received any negative feedback” 7 days contract ???  General lack of Novelty  Very similar to previous Hotnets Paper  No real addition  Still only pilot testing  No mention of any revenue model

“After the click happens”  “Privad gives unscrupulous advertisers more information than they get today”  Will the “privacy-advocates” not say anything now?  No clear mention of CPI, CPC and CPA  Almost every ad paper has these terms

What the research community say ?  First author in his next paper: “Need to adequately explore how to operate the auctions that are critical to current advertising systems. Without this component, these systems leave unanswered what revenue the broker (i.e. an ad network like Google) can earn, thereby reducing the likelihood that a non- tracking advertising system will be of commercial interest.”

What the research community say ?  “These proposals require a shift in the paradigm of online advertising, where the ad brokers relinquish the control of the way profiling and matching is performed and rely on a weaker client-side model of the user, which seems unlikely in the near-term.”- Korolova A., Journal of Privacy and Confidentiality  “Privad can not trust ad-networks and anonymizes every piece of information sent by the client. This anonymization impacts performance and makes click- fraud harder to detect.”-Toubiana et. Al (Adnostic)

THANK YOU