Download presentation
Presentation is loading. Please wait.
Published byAdrian Barrett Modified over 9 years ago
1
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005
2
I S T S Dartmouth College Digital Living 2005 User Home computer PDA Cell phone Internet Today’s user can barely keep their home computer secure from spam, spyware, viruses, phishing, … let alone properly protect personal data on the PC and increasingly pervasive devices.
3
I S T S Dartmouth College Digital Living 2010 User Home computer PDA telephone Tomorrow’s users will be surrounded by pervasive devices, embedded sensors and systems… all connected to the Internet. Entertainment systems Car Surveillance and security at home, work, or in public building automation Banking and commerce Photography Home appliances Games Inventory/sales tracking Health/medical Communications User
4
I S T S Dartmouth College DL2010: Challenges How will users cope in 2010? …manage security of their systems? …manage privacy of their information? …make informed trust decisions? How do we design usable pervasive systems that support users’ security and respect users’ privacy?
5
I S T S Dartmouth College Research Challenges Can normal users cope? –Easy configuration, management, and maintenance. –What trade-offs will they make? Convenience vs. privacy. –What interfaces allow them to control these trade-offs? Can you trust the system? –Secure sensing and aggregation of sensitive information. –To produce valid results, or indicate when results are uncertain? –Detect or resist attacks to discover secrets or disrupt service? Imagine malicious insider, with access to a trusted device? What role do organizations play? –Schools, employers, landlords, governments: differing interests. –Yet people work at home, and do personal things at work. Long-term embedded devices last a decade or more –System evolution with heterogeneous systems and old devices The ultimate in homeland security –DoS on your home infrastructure: no more heat? –Spyware exposes the most intimate details of your home life
6
I S T S Dartmouth College Interdisciplinary problem Computer Science Engineering Sociology Psychology Ethics and law Economics and business
7
I S T S Dartmouth College Thank you www.ists.dartmouth.edu Key message: how can we help the average person cope with the coming digitally mediated lifestyle, yet maintaining privacy of their information and making informed trust decisions?
8
I S T S Dartmouth College Pervasive systems are different Unprecedented coverage Invisible data collection Data is more intimate New motivations for data collection Unprecedented amount of data sharing Pervasive systems may –sense the physical world –communicate invisibly –interact autonomously –be managed by multiple administrators From Lahlou et al., “Privacy and trust issues with invisible computers”, CACM March 2005. From Kumar Ranganathan, “Trustworthy Pervasive Computing: The Hard Security Problems”, 2004.
9
I S T S Dartmouth College The ISTS PLACE project Privacy in Location-Aware Computing Environments Focus on sensor networks –Specifically, for sensing location Focus on location-aware applications –In the home and work environment Interdisciplinary approach –Computer Science –Sociology Funded by ISTS (Department of Justice)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.