22
Privacy and pervasive computing With thanks to Bob Kummerfeld

Privacy and pervasive computing

  • Upload
    fausta

  • View
    53

  • Download
    2

Embed Size (px)

DESCRIPTION

With thanks to Bob Kummerfeld. Privacy and pervasive computing. Overview. Overview of privacy concepts Summary of principles and laws examples. Textbook: “ the right to control who knows certain aspects about you, your communications, and your activities ” - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy and pervasive computing

Privacy and pervasive computing

With thanks to Bob Kummerfeld

Page 2: Privacy and pervasive computing

2

Overview

Overview of privacy conceptsSummary of principles and lawsexamples

Page 3: Privacy and pervasive computing

What is Privacy?

Textbook: “the right to control who knows certain aspects about you, your communications, and your activities”

Privacy is not the same as confidentiality or secrecyPrivate information relates to a person or

entity

3

Page 4: Privacy and pervasive computing

What is Privacy?

Textbook: “the right to control who knows certain aspects about you, your communications, and your activities”

Privacy is not the same as confidentiality or secrecyPrivate information relates to a person or entity

Over to you:What is Privacy?

4

Page 5: Privacy and pervasive computing

What is Privacy?

The Office of the Australian Information Commissioner (Australian Federal Government) considers privacy of personal information, which may “include privacy issues associated with information about your location, your health and body and your communications with others.”

5

Page 6: Privacy and pervasive computing

6

What is Privacy?A piece of information that one person considers

private may not be private for another personDepends on the person and the informationEg A might consider their age to be private information,

while B may not.

Privacy is multi-faceted:Some information I may not want anyone to knowSome information I’m happy to tell immediate familySome information I don’t mind telling friendsContext is important

Trust is a key factorIf I release information to another individual and they

make it public my privacy has been breached

Page 7: Privacy and pervasive computing

7

What is Privacy?

As well as individuals, information can be private toGroupsOrganisationsCompaniesGovernments

In some cases information is private to prevent competitors getting an advantage (eg companies, governments)

Privacy is controlled disclosure: the subject chooses what personal data to give out and to whom

Page 8: Privacy and pervasive computing

Privacy is controlled disclosure: the subject chooses what personal data to give out and to whom

Page 9: Privacy and pervasive computing

Computers and Privacy

9

• Privacy was an issue long before we had computers• But, computers change the way we collect and use

information about people and entities.• Single data centres can now hold petabytes of

information (1015 or 1,000,000,000,000,000)• If we collect 1000 bytes of data about a person every

second, and do this for 100 years, it is ~3.1TBytes. This storage can be attached to an average PC today. In 100 years……

• We are rapidly approaching a time when we never delete data.

Page 10: Privacy and pervasive computing

Life Logging

We are close to a time when ALL our interaction with the world can be captured

This can have many good uses but is a major privacy riskHealth tracking

Alzheimer's treatment

http://www.kickstarter.com/projects/martinkallstrom/memoto-lifelogging-camera

10

Page 11: Privacy and pervasive computing

11

PermissionSome information is given knowingly and with

permission to use it elsewhere.However, a lot of data is now acquired about people

without their (informed) consent.People leave digital footprints wherever they go:

Phone callsSmart phone trackingPurchases with a credit cardATM useTransport card useInternet use (cookies etc)Sensors in buildings, on streetsSensors people carry (phones, Sensecam-like devices)

Page 12: Privacy and pervasive computing

12

Data OwnershipInformation collected about people by one

organisation is sometimes sold to another organisationEg your browsing habits might be sold

Information about you can now easily be passed from one organisation to another

Information about you now persists, potentially forever!

Facebook comments or photos you posted when you were a teenager may be found by a potential employer when you are 21

Video capture that is made publicOnce you release information into the “wild” it is

almost impossible to retract it.Weiser’s vision of Sal’s house and all the personal

data stored there

Page 13: Privacy and pervasive computing

13

Privacy PrinciplesData should be obtained lawfully and fairlyData should be relevant to the purpose, accurate, complete

and up-to-dateThe purpose for data collection should be identified

Data should be destroyed after useData should not be used for other purposes without permission

(eg medical uses: Henrietta Lacks)Security of data against loss, corruption, theft

Confidentiality, Integrity, AnonymityOpenness: users are able to access information about the

collection, storage and use of the data, as well as the data itself.

The data acquirer is accountable.Only necessary data is acquired

Page 14: Privacy and pervasive computing

14

Privacy LawsIn general, privacy laws have covered the privacy principles In some countries (eg USA) the privacy laws do not have complete

coverage: they only apply to some types of data or some user groups (eg children) or some industries

Europe has the most comprehensive privacy lawsExtra requirements for “sensitive” data (eg health)Controls on data transferIndependent oversightThe right to be “forgotten”

Laws in different countries overlap and may clashWhich law applies to an internet transaction?Example: Europe vs USA for airline passenger data

Laws are evolving as understanding of pervasive and ubiquitous computing and its implications develop

Page 15: Privacy and pervasive computing

Identity and Anonymity

15

Anonymity: without a name or namelessNot the same as false or multiple identitiesPseudonymity: how do we establish a long-term

relationship with another entity, without disclosing identity?

What is identity?information that uniquely designates a single personEg drivers licence, tax file number, social security

number in USA, ….A name may designate more than one person

Page 16: Privacy and pervasive computing

Identification and Authentication

Authentication = Verification of identityI claim I am John Smith and I can prove it since I know the

username and password linked to John Smith in the database

Pseudonymity: multiple identitiesEg multiple email addressesAuthenticate each identity with different credentials

Ubicomp identification and authenticationHow to do at tabletop?

16

Page 17: Privacy and pervasive computing

Identity Theft

17

If you know enough information about a person, including account numbers/names and passwords, then you can pretend to be them

Authenticating as someone else is identity theft

Assuming another person’s identity allows an attacker access to private information about the person

Page 18: Privacy and pervasive computing

Privacy Issues Background to surveillance in Australia

http://www.theage.com.au/technology/technology-news/be-careful-she-might-hear-you-20120924-26h6r.html

Proposal to store two years of internet log data for all users and allow access by many authoritieshttp://www.theage.com.au/technology/technology-news/turnbulls-doubts-on-storing-digital-data-20121008-279q4.html

Biometric scanners in pubs:http://www.theage.com.au/it-pro/security-it/id-scans-raise-privacy-fears-20120930-26tv3.html

Public transport cards:http://www.theage.com.au/it-pro/government-it/police-handed-data-on-myki-users-20120917-262v8.html

18

Page 19: Privacy and pervasive computing

19

Coming soon?The ultimate biometric is DNA

The easy capture and analysis of this has worrying implications for privacy:http://www.reuters.com/article/2012/10/11/us-usa-geneticprivacy-idUSBRE89A06H20121011

http://youtu.be/dGCA7FWF1pk

Page 20: Privacy and pervasive computing

20

Overview

Overview of privacy conceptsSummary of principles and lawsexamples

Page 21: Privacy and pervasive computing

21

Overview

Overview of privacy conceptsSummary of principles and lawsexamples

Page 22: Privacy and pervasive computing

22

Overview

Overview of privacy conceptsSummary of principles and lawsexamples