CS573 Data Privacy and Security Introduction Li Xiong Department of Mathematics and Computer Science Emory University.

Slides:



Advertisements
Similar presentations
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Chapter 10 Privacy and Security McGraw-Hill
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Ethics and Responsibility
Privacy: Challenges and Opportunities Tadayoshi Kohno Department of Computer Science and Engineering University of Washington.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
C4- Social, Legal, and Ethical Issues in the Digital Firm
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Anonymity, Security, Privacy and Civil Liberties
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Staying Safe Online Keep your Information Secure.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
@Yuan Xue CS 285 Network Security Fall 2008.
Evidence from Behavior INST 734 Doug Oard Module 7.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Regulation of Personal Information Sally Brierley & Emma Harvey.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
CHAPTER 5 ETHICS & PRIVACY.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Personal data protection in research projects
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Protection of Personal Information Act An Analysis on the impact.
Understanding Privacy An Overview of our Responsibilities.
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
Understanding Privacy An Overview of our Responsibilities.
Information Security and Privacy in HRIS
HCI problems in computer security Mark Ryan. Electronic voting.
Privacy and the Law.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
CS573 Data Privacy and Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Chapter 10: Privacy, Security, and Ethics
18734: Foundations of Privacy
IT and Society Week 2: Privacy.
Presentation transcript:

CS573 Data Privacy and Security Introduction Li Xiong Department of Mathematics and Computer Science Emory University

Introduction on Privacy Definitions and aspects of privacy Models of privacy protection Current lack of privacy protection and privacy breach incidents What we can do Data protection techniques Relevant security concepts/topics

Definitions of Privacy Right to be left alone (1890s, Brandeis, future US Supreme Court Justice) a: The quality or state of being apart from company or observation; b: freedom from unauthorized intrusion (Merrian-Webster) The right of individual to be protected against intrusion into his personal life or affairs, or those of his family, by direct physical or by publication of information (Calcutt committee, UK)

Aspects of Privacy Information privacy Bodily privacy Privacy of communications Territorial privacy

Privacy of the Person Also referred to as 'bodily privacy', is concerned with the integrity of the individual's body Examples: imposed treatments such as lobotomy and sterilization, blood transfusion without consent, requirements for submission to biometric measurement.

Privacy of Personal Behavior sometimes referred to as 'media privacy' sensitive matters, such as sexual preferences and habits, political activities religious practices

Privacy of Personal Communications Individuals desire the freedom to communicate among themselves Issues include use of directional microphones and 'bugs' with or without recording apparatus, telephonic interception and recording, and third-party access to -messages.

Privacy of Personal Data Referred to as 'data privacy' and 'information privacy‘. Establishment of rules governing the collection and handling of personal data Data about individuals should not be automatically available to other individuals and organizations The individual must be able to exercise a substantial degree of control over that data and its use.

Models of privacy protection Comprehensive laws Adopted by European Union, Canada, Australia Sectoral laws Adopted by US Financial privacy, protected health information Lack of legal protections for individual’s privacy on the Internet Self-regulation Companies and industry bodies establish codes of practice Privacy enhancing technologies

State of data privacy The last five decades have seen the application of information technologies to a vast array of abuses of data privacy

A race to the bottom: privacy ranking of Internet service companies A study done by Privacy International into the privacy practices of key Internet based companies Amazon, AOL, Apple, BBC, eBay, Facebook, Friendster, Google, LinkedIn, LiveJournal, Microsoft, MySpace, Skype, Wikipedia, LiveSpace, Yahoo!, YouTube

A Race to the Bottom: Methodologies Corporate administrative details Data collection and processing Data retention Openness and transparency Customer and user control Privacy enhancing innovations and privacy invasive innovations

A race to the bottom: interim results revealed

Why Google Retains a large quantity of information about users, often for an unstated or indefinite length of time, without clear limitation on subsequent use or disclosure Maintains records of all search strings with associated IP and time stamps for at least months Additional personal information from user profiles in Orkut Use advanced profiling system for ads

Remember, they are always watching … what can we do? Who cares? I have nothing to hide.

If you do care … Use cash when you can. Do not give your phone number, social-security number or address, unless you absolutely have to. Do not fill in questionnaires or respond to telemarketers. Demand that credit and data-marketing firms produce all information they have on you, correct errors and remove you from marketing lists. Check your medical records often. Block caller ID on your phone, and keep your number unlisted. Never leave your mobile phone on, your movements can be traced. Do not user store credit or discount cards If you must use the Internet, encrypt your , reject all “cookies” and never give your real name when registering at websites Better still, use somebody else’s computer

Information need vs. privacy The volume of data recorded about people will continue to expand Medical records, finance records, … Corporate surveillance of customers The data are of great value for both the individuals and our society. However, they also pose a significant threat to individuals’ privacy.

Privacy Protection A process of finding appropriate balances between privacy and multiple competing interests: the privacy interests of one person may conflict with some other interest of their own (e.g. privacy against access to credit, or quality of health care); the privacy interest of one person may conflict with the privacy interests of another person (e.g. health care information that is relevant to multiple members of a family); the privacy interest of one person or category of people may conflict with other interests of another person, category of people, organization, or society as a whole (e.g. creditors, an insurer, and protection of the public against serious diseases).

Data privacy - main topics Models and algorithms for privacy protection while allowing society to collect and share person-specific data for worthy purposes. Topics Anonymization techniques for privacy preserving data publishing Data perturbation techniques for privacy preserving data mining Statistical databases Cryptographic techniques for multi-party computation Privacy issues in different domains: healthcare, social networks …

Privacy preserving data publishing Also referred to as data anonymization, data de-identification Involves methods for de-identifying data such that the results can be shared with assurances of anonymity while the data remain practically useful for worthy purposes. Data anonymity is a compromise position.

A Face is exposed for AOL searcher No Naïve anonymization may not be sufficient 20 million Web search queries by AOL User “numb fingers”, “60 single men” “dog that urinates on everything” “landscapers in Lilburn, Ga” Several people names with last name Arnold “homes sold in shadow lake subdivision gwinnett county georgia” Thelma Arnold, a 62-year-old widow who lives in Lilburn, Ga., frequently researches her friends’ medical ailments and loves her dogs

22 Privacy-preserving data mining Data Perturbation – random noise, geometric rotation Models/patterns of data not affected Data Perturbation Private Data Perturbed Data Data Mining Data Perturbation Private Data Data Perturbation Private Data

23 Cryptographic techniques for distributed data sharing Multi-party secure computation Cryptographic protocols Absolute security/privacy vs. approximation xn x1 x3 x2 f(x1,x2,…, xn)

Access control Multi-level secure databases Hippocratic databases Statistical databases Policies Data Access Private Data Private Data Private Data Private Data Private Data Statistical Queries

Broader topics of information security Information security - protecting information and information systems from unauthorized access and use. Core principles (CIA triad) Confidentiality – preventing disclosure of information to unauthorized individuals or systems Integrity Availability Mechanisms Access control Cryptography

Other computer security topics Network security. Firewalls, intrusion detection systems (IDS), DoS attacks and defense … OS (Unix/Windows) security. Access control, administration … Software security. Memory management, buffer overruns, race conditions, analysis of code for security errors, safe languages, and sandboxing techniques … Malware analysis and defense. Worms, spyware …

References Privacy International – overview of privacy Privacy International - A Race to the Bottom: Privacy Ranking of Internet Service Companies Economist – the end of privacy Computer Security, 2 nd edition, Deiter Gollman

Further Readings - Privacy Protection Laws A good international survey: USA status: Children's Online Privacy Protection Act: Health Insurance Portability and Accountability Act: Gramm-Leach-Bliley Act: