C. Bettini, X.S. Wang, S. Jajodia Secure Data Management (SDM 2005), pp. 185-199, 2005. DOI: 10.1007/11552338_13. David MacDonald.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Location Based Social Networking For All Presenter: Danny Swisher.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is difficult.
WINGNUT TECHNOLOGIES CUSTOM ENGINEERING SOLUTIONS.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Health: › PepsiCo’s advertisement campaigns take advantages of teenagers and encourage them to buy and consume products that are harmful to their health.
 What are some of the important benefits that Mountain View Community Hospital should seek in using databases? As much as possible, relate your response.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Embedding ethnic equality in commissioning practice Name, date, contact 1.
On-demand Mobile CRM. Key Features You can have your own CRM application instantly Subscription based – no investment on hardware, software or hosting.
Social impacts of the use of it By: Mohamed Abdalla.
Wireless and Security CSCI 5857: Encoding and Encryption.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Social Networking Face Book. Why we like face book Talk to your friends Keeping in touch with friends all around the world Making plans to meet your friends.
Solutions to Security and Privacy Issues in Mobile Social Networking
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Standard Operating Procedures Joe Wherton Queen Mary University of London
TF-DI Meeting 13-Aug Agenda Discovery presentation from William Miller Review of discussions at F2F Sunnyvale Interaction patterns of tech landscape.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Tivoli Software © 2009 IBM Corporation Maximo Mobile Suite David Havican Lead Product Designer & Architect.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Reputation Based Trust The using of reputation to accomplish trust between users on the Internet M.Vološin, R.Gore, Ibe2roč. PF UPJŠ, Košice, Slovakia.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Protecting Yourself on Social Media – Friend Requests And Messages.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Amicus Point of Sale and Business Management System Amicus Hospitality.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Location Measurements Martin Thomson, IETF-77 draft-thomson-geopriv-held-measurements Location Generator Location Server Device Target Location Recipient.
ICASAS305A Provide Advice to Clients This unit describes the performance outcomes, skills and knowledge required to provide IT advice and support to clients,
10 Tips for Creating Winning Mobile App Marketing Campaigns.
Health Information Delivery Services and Solutions Peter Tippett, MD, PhD, Chairman Information Risk & Security in Healthcare Data Breach Investigation.
Information Systems Design and Development Security Risks Computing Science.
What are Background Checking Applications? By: Intelifi Screening Technology.
Electronic Challan System for Traffic Police
DHCP Privacy Considerations Tomek Mrugalski IETF90, Toronto IETF-90 DHC WG1.
By: Intelifi Screening Technology The Most Dependable Background Check Company to Trust: Intelifi.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
What Employers Need to Know About Background Check.
CAPWAP Threat Analysis
SSL Certificates for Secure Websites
IEEE CyberTrust workshop
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Module 4 Remote Login.
Introducing ‘Snap Maps’
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Effective Methods for Temporarily Disable Norton Antivirus.
Mobile Phone Tracking system by CustomSoft.  This application tracks the mobile location in every 5 seconds in connection with the.
Starter What is identity theft?
Auditing Etsy The Security of Etsy
Reactive Android Development
Reactive Android Development
Blockchain Technology and IoT Security Andy Wang March 21, 2018
KERBEROS.
The MobileIron® Threat Detection difference:
Introducing ‘Snap Maps’
The Dark Side of the Internet
Presentation transcript:

C. Bettini, X.S. Wang, S. Jajodia Secure Data Management (SDM 2005), pp , DOI: / _13. David MacDonald

Summary As mobile devices enable location specific details (such as the nearest hospital), we need methods to maintain the privacy of individuals: we do not want a service provider to identify us when we make a request!

A user contacts the service provider but the user does not want the service provider to know their identity.

An Adjustable System A service provider will find that k individuals appear ‘the same’ – an attacker cannot identify any individual within this group. Since k is arbitrary the user can customise the privacy level to suit their needs (or paranoia!). And this is based on potential senders – the trusted server don’t need to find k individuals that actually send a request.

What Does This Mean For a User? Mentions low/medium/high levels of security for users in practice – but fails to describe this any further in the paper. What are the applications?

What Does This Mean For a User? What does a low/medium/high level of security mean? Does this mean we vary the k value to include more or fewer individuals? Does this mean the location history identifier (such as our daily patterns)?

What Does This Mean For a User? Who decides on what each of the levels of security should be? The trusted server? The mobile device manager? The Consumer? And the further difficulty is that a low level of privacy in one culture might mean a high level of privacy in another. One size does not fit all!

Question: Do users really care about their privacy? How much are we willing to pay for our privacy?