An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.

Slides:



Advertisements
Similar presentations
Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Advertisements

© 2005 Avaya Inc. All rights reserved. A Client-Side Architecture for Supporting Pervasive Enterprise Communications Amogh Kavimandan, Reinhard Klemm,
TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
An Architecture for Privacy-Sensitive Ubiquitous Computing 1 Cindy Nguyen An Architecture for Privacy-Sensitive Ubiquitous Computing By: Cindy Nguyen University.
RPC Robert Grimm New York University Remote Procedure Calls.
Chapter 7 Advantages and Disadvantages of Web Services
OBJECT ORIENTED PROGRAMMING M Taimoor Khan
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Chapter 19: Network Management Business Data Communications, 4e.
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason Hong Carnegie Mellon Jennifer Ng Carnegie Mellon Scott Lederer University.
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
Douglas K. van Duyne James A. Landay Jason I. Hong Using Design Patterns to Create Customer-Centered Web Sites.
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
UbiComp ’03 – Context Awareness Session liquid context-aware distributed queries jeffrey heer alan newberger chris beckmann jason i. hong group.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
Course Instructor: Aisha Azeem
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Understanding and Managing WebSphere V5
UNIT-V The MVC architecture and Struts Framework.
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Towards a Unified Interaction Framework for Ubicomp User Interfaces Jason I. Hong Scott Lederer Mark W. Newman G r o u p f o r User Interface Research.
Privacy Sensitive Architecture for Psychiatric Behaviour Monitoring Service System Presenter: Rusyaizila Ramli (Ph.D student) Supervisors: Associate Professor.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
COMP 410 Update. The Problems Story Time! Describe the Hurricane Problem Do this with pictures, lots of people, a hurricane, trucks, medicine all disconnected.
Distributed Systems: Concepts and Design Chapter 1 Pages
Personal Activity Coordinator Shelley Zhuang Computer Science Division U.C. Berkeley Ericsson Workshop August 2000.
© 2005 Avaya Inc. All rights reserved. Using Context-Awareness and User Negotiation for Intelligent Dialing in Enterprise Communications Amogh Kavimandan.
Application code Registry 1 Alignment of R-GMA with developments in the Open Grid Services Architecture (OGSA) is advancing. The existing Servlets and.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
SECURE WEB APPLICATIONS VIA AUTOMATIC PARTITIONING S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, X. Zheng Cornell University.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
Tools for Web Design and for Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
Smart Campus System a Proposal for a Context-Aware Application Sangkeun Lee Sungchan Park IDS Lab, SNU 1.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
Reliable Web Service Execution and Deployment in Dynamic Environments * Markus Keidl, Stefan Seltzsam, and Alfons Kemper Universität Passau Passau,
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Engineering Secure Software. A Ubiquitous Concern  You can make a security mistake at every step of the development lifecycle  Requirements that allow.
A service Oriented Architecture & Web Service Technology.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
The Development Process of Web Applications
Cloud Testing Shilpi Chugh.
New Tools In Education Minjun Wang
Presentation transcript:

An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile systems, applications, and services Presented by Vignesh Saravanaperumal

Ubiquitous computing ? Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser Ubiquitous computing, or calm technology, is a paradigm shift where technology becomes virtually invisible in our lives. -- Marcia Riley XEROX PARC 1980

Risk Possessed?  everyday ones - Intrusions from overprotective parents and overzealous marketers  extreme ones - Threats to civil liberties by governments as well as dangers to one’s personal safety by stalkers, muggers, and domestic abusers Benefits  Helping patients with Alzheimer’s disease  Support for emergency responders  Real-time monitoring of soil conditions

Work done so Far Security based on  providing anonymity  Secrecy The missing one was  Personal Privacy

Objective of the paper The goal of this paper is to empower people with choice and informed consent, so that they can choose to share the right information, with the right people and services, in the right situations Confab Toolkit

So why was the delay? Problems  Difficulty in analyzing the privacy needs of end users  Difficulty faced in designing effective user interfaces for Privacy  Difficulty faced in implementing privacy-sensitive systems Con Fab A comprehensive set of end-user needs were gathered from a variety of sources. These include scenario-based interviews that they conducted to understand the range of privacy concerns with respect to Ubicomp applications. They described a set of pitfalls in designing user interfaces for Ubicomp privacy, derived from an analysis of over forty different applications for common mistakes still being made

Pitfalls in Designing for Privacy Obscuring Actual Flow Users should understand what is being disclosed to whom – Many Ubicomp systems are “invisible” by default – Systems should provide appropriate visibility Who is querying my location? How often? “Bob will see this request” “Alice has requested your location” 

Pitfalls in Designing for Privacy Configuration over Action Designs should not require excessive configuration – Configuration a typical “solution”, but hard to predict right settings – Manage privacy in the actual context of use  

Pitfalls in Designing for Privacy Fine-grained controls Did I set it right? How do I know? This is a lot of work…  

End-User Privacy Needs for Ubiquitous Computing  clear value proposition  simple and appropriate control and feedback  plausible deniability  limited retention of data  decentralized control  special exceptions for emergencies

End-User Privacy Needs for Ubiquitous Computing (work done so far)

Developer Privacy Needs for Ubiquitous Computing  Support for optimistic, pessimistic, and mixed-mode applications  Tagging of personal information  Mechanisms to control the access, flow, and retention of personal information  Mechanisms to control the precision of personal information disclosed  Logging

Confab Framework  The physical / sensor layer  The infrastructure layer  The presentation layer This approach gives end-users a greater amount of choice, control, and feedback than previous approaches over what personal information is disclosed to others A key design decision behind Confab is to place all three of these layers on the end-user’s computer rather than distributing them throughout the network infrastructure

Confab High-Level Architecture Capture, store, and process personal data on my computer as much as possible (laptops and PDAs) Provide greater control and feedback over sharing Personal Data Store Personal Data Store LocName App On Operators Source Sources Out OperatorsIn Operators My Computer Logging Check Privacy Tag Invisible Mode Enforce Access User Interface Garbage Collect Periodic Reports

Confab Architecture InfoSpace Data Store InfoSpace Data Store LocName PlaceLab Source Tourguide Location Messenger Request My Computer Out Operators Flow Control MiniGIS

Infrastructure Layer Confab’s Info Space Data Store Info Space like a diary that stores your personal info – Static info (ex. name and phone#) – Dynamic info (ex. current location and activity) Runs on your personal device or on a trusted service – Can choose to expose different parts to people & services

A closer Look Infrastructure Layer operators - Description Notify operators: Invisible mode operator: Interactive operator: Garbage Collector operator: are used to send short messages to give end-users feedback about who is requesting information and when can be used to block all outgoing tuples and return the value of “UNKNOWN” to all queries can be used to give end-users control over disclosures. is run periodically to delete any context tuple that has a privacy tag specifying that it should be deleted

A closer Look Infrastructure Layer operators - Description Privacy Tag: Time To Live Max Number of Sightings Notify Garbage Collect

A closer Look Infrastructure Layer Confab’s Built-in MiniGIS Operator People and apps need semantically useful names - “Meet me at , ” Country Name= United States Region Name= California City Name= Berkeley ZIP Code= Place Name= Soda Hall Latitude/Longitude= , MiniGIS operator transforms location info locally Using network-based services would be privacy hole

Confab’s Data Model

Implementation  Confab is implemented in Java 2 v1.5  Total Number of Classes = 550 classes  55,000 physical lines of code  Confab uses HTTP for network communication and is built on top of the Tomcat web server, making extensive use of Java servlets  Query Language: Xpath

Lemming Location-Enhanced Instant Messenger

Future work  Continued Development and Evaluation of Ubicomp Applications  source code freely available Deploying real applications to see how people use them in realistic situations  Better Integration of Access Notifications with Instant Messengers

Related work  The PARCTab system  Cooltown  The Context Toolkit  Contextors, Limbo  Sentient Computing  Stick-E notes  MUSE  SpeakEasy  Solar  XWeb  GAIA  one.world  iRoom

Conclusion  Clear value proposition  Simple and appropriate control and feedback Access notifications.  Plausible deniability Default is “unknown”, can’t tell why  Limited retention of data Privacy tags, automatic deletion of data  Decentralized control PlaceLab source for capturing location info MiniGis service for processing location info  Special exceptions for emergencies “Use technology correctly to enhance life. It is important that people have a choice in how much information can be disclosed. Then the technology is useful.”