Modeling Privacy Control in Context- Aware Systems Jiang et. Al University of California, Berkeley Ubicomp class reading 2005.6.7 Presented by BURT.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Presentation by Priyanka Sawarkar
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state October.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
System Security & Patient Confidentiality General Lesson 1.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
OASIS Reference Model for Service Oriented Architecture 1.0
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Ubiquitous Computing Computers everywhere.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Anthony D. Wood, John A. Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru University of Virginia.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Towards Ad-hoc Situation Determination Graham Thomson, Paddy Nixon and Sotirios Terzis.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Cryptography, Authentication and Digital Signatures
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Illinois Security Lab Privacy Sensitive Location Information Systems in Smart Buildings Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Midwest Security Workshop,
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
Chapter 10. The Explorer System in Cognitive Systems, Christensen et al. Course: Robots Learning from Humans On, Kyoung-Woon Biointelligence Laboratory.
Academic Year 2014 Spring Academic Year 2014 Spring.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
1 Enterprise Requirement Planning For Manufacturing.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Ubiquitous Computing Computers everywhere. Wednesday: presentations Ideal Concepts T.H.E. Team Infused Industries CommuniCORP Part 3 DUE!
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Information Security. Your responsibilities as a Government of Canada employee.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Semantic Web Technologies Readings discussion Research presentations Projects & Papers discussions.
A Context Framework for Ambient Intelligence
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Security and Privacy in the Intelligent Room
Scalable Policy-awarE Linked Data arChitecture for prIvacy, trAnsparency and compLiance H2020-ICT Big Data PPP: privacy-preserving Big Data technologies.
UNIX System Protection
3rd Studierstube Workshop TU Wien
Presentation transcript:

Modeling Privacy Control in Context- Aware Systems Jiang et. Al University of California, Berkeley Ubicomp class reading Presented by BURT

The Problem Significant complexity issues challenge designers of context-aware systems with privacy control

Introduction Ubiquitous Sensing -- and the invisible form factor of embedded computing devices have made it easier than ever to collect and use information about individuals without their knowledge. -- Sensitive private information might live indefinitely and appear anywhere at anytime -- the ability of context-aware systems to infer revealing information

Introduction Risk -- even a few privacy violations could lead to user distrust and abandonment of context-aware systems and to lost opportunities for great enhancements.

Previous Work Based on OM-AM model, we use information spaces to construct a model for privacy control that supports our socially based privacy objectives.

Article Objectives Information space Decentralization. Unified Privacy Tagging

An Example Bob, a sales representative from company A, visits Carol, company B’s senior manager, at B’s headquarters Bob brings his own laptop, on which a trusted privacy runtime system has been preinstalled. On entering the building, Bob was given a visitor badge and an ID tag for his laptop, both enabled by radio frequency technologies, so that RF readers in the building constantly track his laptop’s location.

Carol sends Bob’s laptop some internal documents to review and specifies that these documents should only persist for the period of their meeting. Such tags define an information space that Carol owns. Bob almost forgets to take his laptop when a voice alert sounds a reminder before he leaves Carol’s office. The alert is triggered because the privacy runtime system detects a possible unwanted boundary crossing.

Bob’s machine is left unattended in a physical space that Carol owns. Everyone present at the meeting can download the slides on individual machines during Carol’s talk. Privacy tags assigned to these slides specify that regular employees can store these slides in thumbnails Bob, as a visitor, cannot print the slides in any form to any printer. Neither could he them to anyone outside Carols company

The meeting room’s automated audiovisual capture system records the entire session. The privacy runtime system assigns privacy tags to this record to indicate joint control by both Carol and Bob. When Bob finishes work, RF scanners in the building automatically detect him leaving. As the physical boundary crossing occurs, the privacy system on Bob’s laptop garbage- collects all data owned by Carol that reside on the laptop.

Information Space Model A semantic construct around which you can formulate a privacy control policy.

Principals and objects In context-aware systems, an information space consists of basic objects and is owned by and released to principals: users and user agents. And Object refers to any entity to which you can apply authorization The user is a person or group of people interacting with a context-aware system. The user agent is a software system that serves and protects the user.

The Model can specify access control for a wide range of information, resources, and services. -- projector in the office

The accuracy of p’s identity as: ID(p) = {x | p ∈ x ∧ x ⊆ PN} T = {p} /* T denotes the most accurate element */ ⊥ = {PN} /* ⊥ denotes the least accurate element */ x ≤ y ⇔ y ⊆ x glb(x, y) = x ∪ y /* great lower bound */ lub(x, y) = x ∩ y /* least upper bound */

Repretational Accuracy -- intentional ambiguity Confidence -- often a property of a particular sensor

Object Sensitivity ( confidence + accuracy ) -- object o, corresponds to a discrete size of n and its confidence is p

Information Space an information space provides a way to organize information, resources, and services A boundary—physical, social, or activity- based—delimits an information space. Our formulation of boundaries of information spaces also coincides with what MIT professor Gary. T. Marx calls border crossings when he discusses the social effects of surveillance. -- natural, social, spatial, temporal boarder

An information space is a 5-tuple (O, P,B, Op, Perm) -- O is a set of objects representing information or resources -- P is a set of principals who own the space, -- B is a boundary predicate such that all objects in O (and only the objects in O) satisfy B. -- Op is a set of allowable operations on objects, -- Perm is a set of permissions that define principals allowed to perform individual operation in Op.

three operations that you can apply to objects in an information space: -- Read and write -- Promotion and demotion -- Aggregation

Privacy control From a privacy-control standpoint, you can consider an information space boundary as a contextual trigger to enforce permissions that owners of that space define. a context-aware medical alert system for seniors

Unified privacy tagging many context-aware systems favor a decentralized architecture for scalability and robustness.

Background Unified privacy tagging uses a form of metadata to identify which information spaces an object belongs to and what permissions it’s been assigned. In this way, you can distribute both data and privacy controls in an information space in a context-aware system.

in digital rights management systems IBM Enterprise Privacy Architecture (sticky policy paradigm) Andrew Myers’ decentralized label model for a secured programming language called JFlow

Unified privacy tagging model A privacy tag consists of three parts -- A space handle -- A privacy policy -- A privacy property exmaple P = {o1: r1, r2; o2: r2, r3}, where o1, o2, r1, r2, r3 denote owners (o1,o2) and allowed readers (r1, r2, r3).

Complete Tag A complete privacy tag of an object that belongs to information space 1 is captured with 80 percent confidence, transferred at the first level of accuracy, and allowed to live for five hours might look like: T = {space1,{o1: r1, r2; o2: r2, r3}, {5hrs, level 1, 80%}}

Electronic/Physical Transfer Our privacy-tagging model is unified in that you can use it to tag both physical and data objects.

The trusted computing base problem This trust assumption can be problematic for large scale decentralized systems. -- software/metadata trustworthy? unified privacy tagging is part of a theoretical model that you can realize in many different ways.

Conclusion In this article, we focused primarily on models for privacy control to support achieving these socially compatible privacy objectives.

Future Work Currently, we are developing a suite of new privacy mechanisms based on the information space model. We will integrate these mechanisms into a new architecture for privacy and security in pervasive computing.

The End

Many existing context-aware technologies can help identify the boundaries of information places by -- Demarking physical boundaries through location awareness -- Demarking social and activity-based boundaries through identity and activity awareness