Privacy, Security, and Ubiquitous Computing Jason I. Hong.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Abuse Testing Laboratory Management Laboratory Management.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Ellucian Mobile: Don’t text and drive, kids!
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Calendar Browser is a groupware used for booking all kinds of resources within an organization. Calendar Browser is installed on a file server and in a.
YOUR INFORMATION YOUR DECISIONS YOUR LIFE. The INDIVIDUAL is the BEST POINT of ORIGINATION and INTEGRATION for DATA RELATING TO THEMSELVES.
1 System Needs for Fast Location Aware Application Development Spatial Group Meeting 4/1/2004 shashi-group/
Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing Eric Chung Carnegie Mellon Jason Hong Carnegie Mellon Madhu Prabaker University.
Applications and Privacy Issues with Sensor Nets Jason Hong Carnegie Mellon University.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
Can We Achieve Secure Mobile Computing Anytime Soon? Jason I. Hong WMCSA2006 April
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
SOCIAL NETWORKING APP FACEBOOK. WHAT IS FACEBOOK Facebook was created in 2004 by Mark Zuckerburg and was first used on computers. It was one of the first.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Welcome to the Minnesota SharePoint User Group. Introductions / Overview Project Tracking / Management / Collaboration via SharePoint Multiple Audiences.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Technische Universität München Context-Aware Recommendations in Decentralized, Item-Based Collaborative Filtering on Mobile Devices Wolfgang Woerndl, Henrik.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
For more notes and topics visit:
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Web Based Applications
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Topiary: A Tool for Prototyping Location-Enhanced Applications Yang Li, Jason I. Hong, James A. Landay, Presented by Daniel Schulman.
IT security By Tilly Gerlack.
2007 Microsoft Office System Overview 2007 Microsoft Office System Overview Elizabeth Caley Senior Product Manager Microsoft Canada.
Intro to Context-Aware Computing Jason I. Hong. Context-Aware Computing Shift from explicit to implicit interaction Use this implicit input to adapt systems.
Google Confidential and Proprietary 1 Intro to Calendar Google Apps Apps.
Atomate It! End-user Context- Sensitive Automation using Heterogeneous Information Sources on the Web Max Van Kleek et el. MIT Presented by Sangkeun Lee,
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
Research Topics in Ubiquitous Computing Jason I. Hong jasonh at cs cmu edu f2004/readings.html
GEOREMINDERS ANDROID APPLICATION BY: ADRIENNE KECK.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
Getting the most out of ArcGIS Web Application Templates
Panel: Prototyping and Building Systems Four Rants on Privacy and Ubicomp Jason I. Hong jasonh at cs cmu edu Intel Usable Privacy Forum.
BIT 285: ( Web) Application Programming Lecture 15: Tuesday, February 24, 2015 Microsoft Azure Instructor: Craig Duckett.
Tools for Web Design and for Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
FACEBOOK Material adapted from
Usable Privacy and Security and Mobile Social Services Jason Hong
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Creating your online identity
Web 2.0 and Library 2.0 A Brief Overview
How To Set Up A Wireless Network
Microsoft Virtual Academy
Presentation transcript:

Privacy, Security, and Ubiquitous Computing Jason I. Hong

Overview Privacy and Security Today –Supporting Trust Decisions Privacy and Security Tomorrow –Privacy and Usability in Pervasive Environments –Location-enhanced Web –Whisper

Everyday Security Problems

Everyday Security is Important People increasingly asked to make trust decisions –Install this software? –Trust expired certificate? (“what the is a certificate?”) –Enter username and password? Consequence of wrong trust decision can be dramatic –Spyware –Malware (viruses, worms) –Identity theft

Project: Supporting Trust Decisions Computers can’t make all trust decisions for you Goal here is to help people make better decisions –Context here is anti-phishing –Multidisciplinary team Approach 1: Design Patterns –Extract UI design patterns that work well Approach 2: Embedded Training –Surreptitiously train people to be better at discriminating scams from the real thing Approach 3: Public Health System –Back-end system + UIs for marking scams

Overview Privacy and Security Today –Supporting Trust Decisions Privacy and Security Tomorrow –Privacy and Usability in Pervasive Environments –Location-enhanced Web –Whisper

Ubicomp Presents New Benefits Find FriendsIncident CommandRFID Advances in wireless networking, sensors, devices –Greater awareness of and interaction with physical world Ubicomp can help in efficiency, coordination, safety

Ubicomp Also Presents New Risks Some potential new risks: –Commit fraud –Draw embarrassing or inaccurate inferences –Discriminate against users Everyday RisksExtreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety Employers _________________________________ Over-monitoring Discrimination Reputation Friends, Family _________________________________ Over-protection Social obligations Embarrassment Government __________________________ Civil liberties

“[It] could tell when you were in the bathroom, when you left the unit, and how long and where you ate your lunch. EXACTLY what you are afraid of.” -allnurses.com Ubicomp Privacy is a Serious Concern

Project: Privacy and Usability in Pervasive Environments Group project split into two major parts: 1. Decentralized trust management infrastructure for enforcing policies –Project Grey, MyCampus, Pervasive Access Control 2. User interfaces for helping people elucidate their privacy preferences –When to get notifications? –When to share personal information?

You think you are in one context, actually overlapped in many others Without this understanding, cannot act appropriately Optionally, useful to specify when it’s okay to broadcast Project: Privacy and Usability in Pervasive Environments

Pessimistic, Optimistic, and Mixed-mode privacy –Pessimistic:setup prefs beforehand –Optimistic:detect problems and fix afterwards –Mixed:ask me Extend Privacy Bird Conversational Case Based Reasoning (CCBR) –Major component, help people use similar past situations Empirical user studies to compare these UIs –Correctness, desirability, predictability, time on task, …

Project: Location-Enhanced Web Three big problems with location-based services: 1. Need a high level of expertise to create location- enhanced content and services –Lots of programming and/or hardware expertise –Significantly stifles innovation 2. Difficult to deploy location-enhanced content and services –No location app works on multiple phones –Haphazard wireless connectivity 3. Location privacy

Web + Location = Location-Enhanced Web Evolve existing web infrastructure to support location-awareness –Minimal re-design and re-deployment –Leverage existing web browsers, web servers Co-opt existing location-enhanced content –Transparently make web sites that already have location- enhanced content part of the location-enhanced web –Ex. Restaurant guides, bus schedules, tour guides, etc –Anything with street address info Make it easy to create location-enhanced content –Authoring of web pages vs programming apps

Underlying Design Philosophy Capture, store, and process personal data on my computer as much as possible (laptops and PDAs) Provide greater control and feedback over sharing

How It Will Work Overview (1) Determine location locally on device –Listen to “beacons” to calculate location locally (2) Use local proxies to transparently add new features –Let users use existing web browsers (3) Local services –Geocoders, maps, etc (4) Occasionally-connected computing –Cache content like a madman, periodically update (5) Better user interfaces –Provide better UIs for sharing info (6) Provide authoring tools for new content and services

How It Will Work Usage Scenario (1/5) ABC –Works indoors and in urban canyons –Works with encrypted nodes –No special equipment –Privacy-sensitive –Rides the WiFi wave Alice does a one-click install for her laptop Place Lab WiFi positioning system calculates location –Unique WiFi MAC Address  Latitude, Longitude

How It Will Work Usage Scenario (2/5) Regular web browser starts auto-filling in web forms for location-unaware sites –Local geocoder service looks up address info –Uses publicly available data about countries, states, ZIP, etc

How It Will Work Usage Scenario (3/5) Alice can also go to a location-aware site that uses our extensions –Web-based tour guide of CMU Alice gets a Place Bar UI to control what level of location info she is willing to disclose –Selectively trade privacy for services

How It Will Work Usage Scenario (4/5) Local proxy transparently processes new location- enhanced features –Triggers to auto-load new content Ex. show this page when user enters this building –Context-sensitive links Ex. “Map” link shows indoor map when indoors, etc –Active map

How It Will Work Usage Scenario (5/5) Alice can also download content for use when not connected to network –Too expensive, roaming, poor coverage, etc Every morning, her laptop downloads location+ information about Pittsburgh –Community events like talks, concerts, book signings –Restaurant guides (download and geocode entire site) –Locally filter and examine Can also block-fetch info –Ex. Travel to Seattle, download all info for that week –Service knows you are in Seattle, that’s it –If linked with calendar, can do this when you’re in Pittsburgh

Authoring Tools

Advantages of this Approach This approach leverages: –Familiar user model (links, pages, web sites, submit button) –Lots of existing content –Lots of authoring and debugging tools –Lots of content creators Icing on the cake –Simple user model: everything private unless you choose –Software only extensions, no new hardware –Minimal changes to existing web browsers, proxies, servers –Don’t have to wait for widespread cheap wireless networking –Can do this today!

Can Address Key Research Problems Need a high level of expertise to create location- enhanced content and services –Shift problem from programming to authoring –Provide libraries and templates for advanced features Difficult to deploy location-enhanced content and services –Local proxy, local services, local storage –Occasionally connected computing Privacy –OCC (use data offline) –Better user interfaces for when and what to share

Lots of Research Issues OCC and block-fetching algorithms –How much to download? When to refresh? –Privacy metric: level of privacy vs cpu, bandwidth, disk, power –Pre-fetch: plausible deniability, potentially useful info Will work for laptops, what about phones and PDAs? –Start with local, push back into infrastructure as needed –Ex. Trusted proxies, a for-pay service that honors privacy User interfaces –Place Bar okay but hard to use in user evals –What is live vs cached?

Apps to Build Towards (1/2) Web page autofill Virtual post-it notes (geonotes) Location-enhanced tourguide Map-It –Map from current location to address on page

Apps to Build Towards (2/2) Location dashboard –Subscribe to Starbucks coffee, crime database, and geonotes server –As you move around, you can see: Nearest Starbucks Crime “thermometer” Previews of notes your friends have posted –Like an RSS feed for the real world! Whisper Community Event Service –Crawl web for community events –Use location, social networks, and keywords to filter –“Notify me when Yo-Yo Ma will play a concert in Pittsburgh”

Project Whisper Community event service –Foster sociability within community –Get people away from TV First iteration done –(Before location-enhanced web though) User evaluations –Useful but… –I want to know who else is going –Too many events shown! Make it easier for people to coordinate –Lightweight, minimal social obligations Make it easy to see what’s going on

Project Whisper Use location information, preferences, and social networking to filter –Location: “Shadyside art festival” –Preferences: “Yo-Yo Ma” –Social Networking: “I’m going to this concert, anyone else?” Hypothesis: instigators –N% of population who really like to organize outings –Subscribe to events these people are interested in Provide personalized events as lightweight RSS feed –RSS a simple way of subscribing to things

Project Whisper Wed (Today): Talk on privacy (3:30PM) Fri Churchbrew (Lorrie, 6:30PM) Weekend Shadyside art festival (all day) Garage sale Squirrel Hill Future Yo-Yo Ma (Oct 28)

Project Whisper Wed (Today): Talk on privacy (3:30PM) Fri Churchbrew (Lorrie, 6:30PM) Weekend Shadyside art festival (all day) Garage sale Squirrel Hill Future Yo-Yo Ma (Oct 28) I get this because of simple keyword matching on “privacy”

Project Whisper Wed (Today): Talk on privacy (3:30PM) Fri Churchbrew (Lorrie, 6:30PM) Weekend Shadyside art festival (all day) Garage sale Squirrel Hill Future Yo-Yo Ma (Oct 28) I get this because I subscribe to Lorrie’s personal RSS feed

Project Whisper Wed (Today): Talk on privacy (3:30PM) Fri Churchbrew (Lorrie, 6:30PM) Weekend Shadyside art festival (all day) Garage sale Squirrel Hill Future Yo-Yo Ma (Oct 28) I get these two because I live in Shadyside Rather than current location, leverage where we spend a lot of our time (ie, home, work, etc)

Project Whisper Wed (Today): Talk on privacy (3:30PM) Fri Churchbrew (Lorrie, 6:30PM) Weekend Shadyside art festival (all day) Garage sale Squirrel Hill Future Yo-Yo Ma (Oct 28) I get this because of keyword “Yo Yo Ma”. I can also publish this as part of my personal RSS feed, so my friends can also see this event. Whisper can then help with who’s going, carpools, etc.

Summary of Projects Privacy, security, and ubiquitous computing Supporting Trust Decisions –Design patterns, Embedded Training, Public Health Privacy and Usability in Pervasive Environments –Design, implement, and eval multiple UIs Location-enhanced web –Systems and UI issues for combining location and web Whisper Community Event Service –Make it easier for people to find interesting events and coordinate who’s going

Future of Ubiquitous Computing? Jason I. Hong NSH 2504D

Perspective on Privacy “The problem, while often couched in terms of privacy, is really one of control. If the computational system is invisible as well as extensive, it becomes hard to know: – what is controlling what – what is connected to what – where information is flowing – how it is being used The Origins of Ubiquitous Computing Research at PARC in the Late 1980s Weiser, Gold, Brown Empower people so they can choose to share: the right information with the right people or services at the right time

Computers Are Becoming Ubiquitous…

… and Integrated with Real World

Client- Centered Architectures Basic idea: –Local sensing, local storage, local processing –Provide better control and feedback over sharing Examples: –Anonymous Broadcast Satellites (GPS, Sirius or XM), Radio (AM / FM), WiFi AP –Sensing: GPS, Cricket, Place Lab –Storage: Occasionally Connected Computing Sync up lots of potentially useful info beforehand –Services Geocoding, maps, etc These services would also be OCC services

Weaknesses of Client-Centered Approach Only useful for certain kinds of apps –Default is not to share info, some apps hard to build –Personal mobile apps vs Place-oriented apps (cameras) –Best for read-only data Requires really high-end devices –Invoke Moore’s Law –Fundamental tradeoff Centralized / decentralized tradeoff –Like hotmail vs cmu IMAP vs own IMAP –Decentralized probably scales better –But users are own sysadmins, viruses, spyware –Again, fundamental tradeoff