Anonymity - Background Prof. Newman, instructor CSE-E346 352-505-1579 (don’t leave message) Office Hours (tentative): 10-noon TR - subject:

Slides:



Advertisements
Similar presentations
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Advertisements

Mike Pluke1 Universal Communications Identifier (UCI) and the power of profiles Mike Pluke Castle Consulting Ltd. ETSI TC HF & STF265.
UTEPComputer Science Dept.1 University of Texas at El Paso Privacy in Statistical Databases Dr. Luc Longpré Computer Science Department Spring 2006.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Ethics in a Computing Culture
CS150 Introduction to Computer Science 1 Professor: Chadd Williams.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Computer Science Public Key Management Lecture 5.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
How To Prepare For Your First Online Class By Jeannie Tipton Let’s Begin!
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Slide 1 Tomorrow’s Technology and You Chapter 7 Databases and Privacy © 2006 Prentice-Hall, Inc.
Introduction Our Topic: Mobile Security Why is mobile security important?
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
The audio will be turned on just before our start time at 7:00 pm ET.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
CIS162AD: C#.Net Programming Level I Instructor: Gary R. Smith, MS.
COMP Introduction to Programming Yi Hong May 13, 2015.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
@Yuan Xue CS 285 Network Security Fall 2008.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Anonymity - Background Prof. Newman, instructor CSE-E (don’t leave message) Office Hours (tentative): 10-noon TR - subject:
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Welcome to BU-250 Business Mathematics Kaplan University Mike Sowa, MSc., CAIA Seminar 1.
B. Prabhakaran1 Multimedia Systems Textbook Any/Most Multimedia Related Books Reference Papers: Appropriate reference papers discussed in class from time.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
ICS 6B Boolean Algebra and Logic Winter 2015
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Lesson No:14 Surfing on Website, Searching, Send/Receive CHBT-01 Basic Micro process & Computer Operation.
CPS120: Introduction to Computer Science Winter 2002 Instructor: Paul J. Millis.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
Your Roadmap for Success Alice: “Would you tell me, please, which way I ought to go from here?" Cat: "That's depends a good deal on where you want to get.
BY: Vanessa, Daniela, Sheriff. Anonymity is when someone makes aggressive comments to you, but can disguise themselves. This means that it can be hard.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
1 Understanding Anonymity Al-Anon Family Groups’ World Service Conference Anonymity Task Force.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Anonymity - Background R. Newman. Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.)
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
Overview In this tutorial you will: identify different ways to access review your own skills identify rules to follow when using . There.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Administrative Preliminaries Computer Architecture.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Welcome to EP299! LaToya Blackshear. Agenda Welcome! Introduce Yourself! Course Overview Final Project - Portfolio Week 1 Assignments Week 1 Project Week.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Anonymity - Background Prof. Newman, instructor CSE-E (don’t leave message) Office Hours (tentative): 10-noon TR - subject:
CONSIDER Neelam Soundarajan Swaroop Joshi Jeremy Morris
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Anonymity - Background
Presentation transcript:

Anonymity - Background Prof. Newman, instructor CSE-E (don’t leave message) Office Hours (tentative): 10-noon TR - subject: Anon...

Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Reading Read Pfitzman & Waidner Read Chaum Mix paper Start discussion of these Friday Reading list (approximate) on web page

Outline Course Outline – what is this subject? Projects and papers Policies

Early (pre-computer) uses for social reasons (ability to act more freely, have work accepted without prejudice, etc.) Traffic analysis an issue prior to computers (e.g., Bodyguard of Lies) Computer TAP solvable with cryptography With public-key cryptography, theoretical possibility for anonymity and pseudonymity Anonymity - Beginnings

Exercise Take 2 minutes to think about anonymity. Answer these questions in writing: What is anonymity? How is it related to privacy? Give examples of need for anonymity (aiming at volume here) Get into groups of 2-3 and share your answers Try to arrive at a joint definition or agree to disagree Add to your list of examples Share your responses with the class

What is Anonymity Literally, lacking a name (a + onyma) Unidentifiability Inability to attribute artifact or actions Related to privacy - how?

Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Exercise Take a minute or two to define privacy Share with your neighbor(s) Share with the class

What is Privacy? Ability of an entity to control its own space Physical space Bodily space Data space Communication space What else?

Exercise What are examples of privacy in these spaces? Physical space Bodily space Data space Communication space What other spaces can you think of?

Privacy Spaces Physical space: invasion, paparazzi, location (GPS) Bodily space: medical consent, battery Data space: identity, activity, status, records Communication space: , Internet privacy, correspondents, phone #, address, stalking, harassment Overlap in spaces (e.g., location)

Topics Defining anonymity Defining privacy Need for anonymity Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

Need for Privacy/Anonymity Planning/execution in competition Fundamental right – voting, celebrities Philosophical necessity (free will) Restarting when past can cripple Statutory requirements (HIPAA, FISMA) Liability issues – data release Freedom/survival in repressive environments Increasing pressure from technologies

Privacy/Anonymity Threats Available surveillance technology Identification technology Increasing use of databases Data mining Identity theft Increasing requirements for I&A Increasing governmental desire for surveillance

Surveillance Facts 1.5 million CCTV cameras installed in UK post 911 – Londoner on camera ~300 times a day Face recognition software used in Tampa for Superbowl 5000 public surveillance cameras known in DC Home and work zipcodes give identity in 5% of cases in US

Homework Count number of video cameras you encounter all day for one day. Record locations, submit when Canvas up. Tally total, share total with class Friday.

Data Reidentification Even ”scrubbed” data can be re-identified Characteristics within the data (e.g., word usage in documents) Intersection attacks on k-anonymized database set releases Use of known outside data in combination with released data Data mining – higher dimensional space gives greater specificity!

Exercise What are legitmate limitations on anonymity? Write down 1-2 of these Share with neighbor Share with class

Limitations on Anonymity Accountability Legal/criminal issues Social expectations Competing need for trust Others?

Forms of Anonymity Traffic Analysis Prevention Sender, Recipient, Message Anonymity Voter Anonymity Pseudonymity Revokable anonymity Data anonymity

Anonymity Mechanisms Cryptography Steganography Traffic Analysis Prevention (TAP) Mixes, crowds Data sanitization/scrubbing k-anonymity