+ All Categories
Home > Documents > Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

Date post: 18-Dec-2015
Category:
Upload: edwina-kristin-martin
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
57
Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009
Transcript
Page 1: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

Access Control

Michelle Mazurek

Usable Privacy and SecurityOctober 29, 2009

Page 2: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

2

Outline• How do people think about access control?

• What and when do they want to share?

• How do people use current standard access control mechanisms?

• Discussion: System design guidelines

Page 3: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

3

Thinking about sharing• Olson, Grudin, and Horvitz: A study of

preferences for sharing and privacy

• Ahern et al.: Privacy patterns and considerations in online photo sharing

• Recent study by home security team: Attitudes, needs and practices for home data sharing

Page 4: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

4

Mapping detailed preferences• Overview survey: “A situation in which you or

another person did not wish to share information.”

• Selected 19 types of people, 40 types of files • Detail survey: 30 participants filled out the

resulting grid• How comfortable sharing? 1 to 5 (or n/a)• Instantiate each type of person

Olson, Grudin, Horvitz, 2005

Page 5: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

5

Types of people• Best friend• Spouse• Parent• Sibling• Adult child• Young child• Extended family• Personal website• Salesperson

• Trusted colleague• Manager• Subordinate• Corporate lawyer• Competitor• Company newsletter• People you want to

impress• Other team

members

Page 6: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

6

Types of information• Current location• Current IM status• Buddy list• Calendar entries• Web history• Phone, e-mail• Age• Health status• Credit card number

• Work in progress• Finished work• Successes, failures• Performance review• Salary• E-mail content• Social Security #• Politics/religion• New job application

Page 7: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

7

Results – Sharing preferencesPeople: High to Low• Spouse, best friend,

parent• Extended family,

subordinate, team members

• Competitor, personal website, salesperson

Info: High to Low• Work e-mail, desk

phone, cell phone, age, marital status

• Health status, politics/religion, work in progress

• Transgression, e-mail content, credit card, SSN

Page 8: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

8

Results – Variation in variance• No variance:

• Always share: work e-mail address, phone # with spouse, co-workers

• Always share: home phone # with spouse, children• Never share: credit card number with the public

• Lots of variance:• Personal items with co-workers (age, health, etc.)• Credit card with parents, grandparents• Pregnancy status with siblings• Work documents with family members

Page 9: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

9

Variation among people• Unconcerned, pragmatists, fundamentalists• Overall, restrict more than share

Page 10: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

10

Clustering people and information• Manager, trusted

colleague• Best friend, family• Other co-workers• Spouse• General public

• E-mail content, credit card #, transgression

• Failures, salary, SSN• Home, cell number;

age; marital status; successes

• Health, religion, politics

• Work-related stuff• Work e-mail, phone #

Page 11: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

11

Mapping clustered preferences

Page 12: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

12

Discussion and guidelines• One size doesn’t fit all, but strong clustering

implies manageable categories• Recommend policy configuration at multiple

precision levels• Recommend statistical prediction (dynamic

cluster analysis)

Page 13: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

13

Privacy in online photo sharing• Collected and analyzed data from 5 months

of real use of Flickr with ZoneTag• 81 users, uploaded at least 40 photos each• 36,915 total photos

• Followed up by interviews with users about their access control decision-making• Recruited social groups of non-technical people• 15 participants, not previous Flickr users• Provided phone, data plan, Flickr Pro; used their

own SIM cards

Ahern et al., 2007

Page 14: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

14

Flickr and ZoneTagFlickr• Public vs. non-public (private, family, friends)• Public photos are searchable (text labels)

ZoneTag• Cameraphone app for upload to Flickr• By default, repeat most recent privacy setting

• User can modify as desired

• Add tags (suggestions, quick entry)• Location tags added automatically

Page 15: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

15

Does location predict privacy?• H1: Some locations are more public than

average; others are more private• Calculate ratio of public photos to total photos

• For all photos, then individually per location

• 50% of users: fewer than half “typical” photos• 19 users: more than half “very” photos

Typical PublicVery Private Very PublicPrivate

0.10.1 0.250.25

Page 16: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

16

Does location predict privacy?• H2: More frequent locations are more private• Calculate ratio as before; sort by frequency• Found significant correlation

Page 17: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

17

Does content predict privacy?• Hand-classified 1400 frequently-used tags

• Person, location, place, object, event, activity• Calculate public: non-public per category

• Person significantly more private than rest• Activity significantly less private than average

Page 18: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

18

Additional quantitative analysis• Access setting changed after upload: 7%

• Decisions are not often strongly regretted• May be related to misuse of default

• Location information suppressed: 2%• Perhaps no concern about zip-level location

sharing• Perhaps because users don’t know how to

suppress it

Page 19: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

19

Interview results• Conducted after 2 weeks of system use• Four major themes emerged:

Page 20: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

20

Results: Security• Location – near real-time whereabouts

• “If I did something to upset somebody somehow … and they knew exactly where I lived by looking at my Flickr photos, that would bother me.”

• Especially with regard to children• Both content and location

• Fits with quantitative analysis• Person is more private (children)• Some locations (home?) are more private

Page 21: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

21

Results: Identity, Social DisclosureIdentity• Image content may

be unflattering to user, others

• May expose private interests• Conservative family,

pride parade photos

Social Disclosure• If someone wasn’t

invited• When friends are

“doing their, uh, ‘musician things’ … don’t need any incriminating evidence.”

Page 22: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

22

Results: Convenience• Using access controls requires friends, family

to sign up for Flickr accounts• Sometimes it’s easier just to make it public

• Sometimes users want to make certain photos available to friends of friends

Page 23: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

23

Results: Location privacy• Showed participants their aggregate location

data• Generally unconcerned at zip granularity

• Worries about advertisers

• Changes from pre-study interview• 17% said would never share• 50% would share under special circumstances• In reality, every person shared and no one

suppressed

Page 24: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

24

Results: Other factors• Making decisions at capture time

• Unsure how photos will look on the web• Unsure about subject’s preferences

• Limiting complexity• Often choose the default for minimal effort

• Dissatisfaction• Unhappy with all available options• Choose the best available but remain frustrated

Page 25: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

25

Discussion and guidelines• Desired privacy settings often correlate with

location and with content of tags• Suggestions:

• Use these patterns for prediction, recommendation, or warning of possible errors

• Make aggregate disclosure visible to users• Provide social comparison (similar decisions made

by friends) to reveal relevant norms• Show users how others will view the photos

Page 26: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

26

Further guidelines• Decouple visibility from discoverability

• Public settings so no need to register• Not searchable so disclosure may be limited

• Decouple photo and location visibility• Independent location disclosure settings

• Encourage a range of access control settings• Self-censoring limits usage• Maximizing public photos adds value to system

owner

Page 27: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 27

Exploring access control at home• Goal: Understand how people think about

access control• Wanted to examine several different facets

• Current practices: digital, paper• Different policy dimensions: person, location,

device, presence, time of day• Additional features: Logs, reactive policy creation

Michelle Mazurek © Oct 09

Mazurek et al., 2009

Page 28: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 28

Designing a user study• In-situ interviews

• Recruitment via Craigslist, flyers• Limited to non-programmer households• Interview family members at home: together, then

individually

• Semi-structured interviews• Elicit information about people, files• Ask specific questions as jumping-off points• Continue with free-form responses

Michelle Mazurek © Oct 09

Page 29: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 29

Question structure• For each dimension, start with a specific

scenario• Imagine that [a friend] is in your house when you

are not. What kinds of files would you (not) want them to be able to [view, change]?

• Would it be different if you were also in the [house, room]?

• Extend to discuss that dimension in general• Rate concern over specific policy violations:

• 1 = don’t care to 5 = devastating

Michelle Mazurek © Oct 09

Page 30: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 30

Data analysis• Initial rough analysis identified areas of

interest; fed back into later interviews• Iterative topic and analytic hand coding –

loosely based on Grounded Theory1

• Searchable database format

• Combine codes to develop broader theories; revisit data as needed

• Results are qualitative

Michelle Mazurek © Oct 09

1Razavi and Iverson, 2006

Page 31: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 31

Study demographics

Households People

Families 6 16

Couples 5 10

Roommates 4 11

Total 15 37

• Ages 8 to 59• Wide range of computer skills

Michelle Mazurek © Oct 09

Page 32: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 32

Household devices• Common devices: Laptop, desktop, DVR,

iPod, cell phone, digital camera• Minimum: 1 desktop, 1 mobile phone, 3 iPods

for a family of four• Maximum: 22 devices for 3 roommates

• 3 laptops, 2 desktops• 3 cell phones• Still and video cameras• Video game systems• USB sticks, memory cards, external hard drives

Michelle Mazurek © Oct 09

Page 33: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 33

Four key findings1. People have important data to protect, and

the methods they currently use don’t provide enough assurance

2. Policies are complicated

3. Permission and control are important

4. Current systems and mental models are misaligned

Michelle Mazurek © Oct 09

Page 34: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 34

F1: Current methods aren’t working• People worry about sensitive data

• Many potential breaches rated as “devastating”• Almost all worry about file security sometimes• Several have suffered actual breaches

• Mechanisms vary (often ad-hoc)• Encryption, user accounts (some people)• Hide sensitive files in the file system• Delete sensitive data so no one can see it

Michelle Mazurek © Oct 09

“If I didn’t want everyone to see them, I just had them for a little while and then I just deleted them.”

Page 35: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 35

F2: Policy needs are complex• Fine-grained divisions of people and files

• Public, private aren’t enough• More than friends, family, colleagues, strangers• One policy:

Michelle Mazurek © Oct 09

boyfriend

parents

friends

boss

teacher

strangers

music

photos

private docs

study abroad docs

schoolwork

work files

other docs

shared

mixed

restricted

Page 36: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 36

F2: Dimensions beyond person• Read vs. write remains important

• Read-only is needed but not sufficient

• Presence resonated for most• “If you have your mother in the room, you are not

going to do anything bad. But if your mom is outside the room you can sneak.”

• Also can provide a chance to explain

• Location• People in my home are trusted• Higher level of “lockdown” when elsewhere

• Device, time of day not as popular

Michelle Mazurek © Oct 09

Page 37: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 37

F2: Variation across participants• Finding reasonable defaults is difficult• What is most/least private?• Sharing-oriented vs. restriction-oriented

• “Basically, it’s my stuff; if I want you to have it, I’ll give it to you.”

• “I don’t really have private files.... There’s nothing that I am hiding from anybody.”

• Most have one “most trusted” person• Definition of “most trusted” varies widely

Michelle Mazurek © Oct 09

Page 38: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 38

F3: Permission and control• People like to be asked permission

• Positive response to reactive policy creation• “I’m very willing to be open with people, I think I’d

just like the courtesy of someone asking me.”

• Setting policy ahead of doesn’t convey control like being present and/or explicitly granting permission• If I’m present, “I can say, ‘These are the things that

you could see’.”• “I can’t be giving you permission while I sleep

because I am sleeping.”

Michelle Mazurek © Oct 09

Page 39: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 39

F3: A-priori policy isn’t enough• Last-minute decisions• Review logs and fine-tune:

• “If someone has been looking at something a lot, I am going to be a little suspicious. In general, I would [then] restrict access to that specific file.”

• People want to know why as well as who• “I might be worried about who else was watching.”• “From my devices they would be able to view it but

not save it.”

Michelle Mazurek © Oct 09

Page 40: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 40

F4: Mental models ≠ systems

• Desktop search finds “hidden” files• Being present isn’t enough

• Violations can happen too fast to prevent• Can’t necessarily monitor across the room

• Files can be shared across devices; files within a device can be restricted

• “In my house” maybe not a good trust proxy• Seems natural but fails after more thought

Michelle Mazurek © Oct 09

“If anything were to happen, ... I’m right there to say, ‘OK, what just happened?’ So I’m not as worried.”

Page 41: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 41

Resulting design guidelines• Allow fine-grained control

• Specification at multiple levels of granularity to support varying needs

• Plan for lending devices• Limited-access, discreet guest profiles1

• Include reactive policy creation• “Sounds like the best possible scenario.”• “It would be easy access for them while still

allowing me to control what they see.”

Michelle Mazurek © Oct 09

1Karlson et al., 2009

Page 42: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 42

More design guidelines• Reduce or eliminate up-front complexity

• “If I had to sit down and sort everything into what people can view and cannot view, I think that would annoy me. I wouldn’t do that.”

• Reactive policy creation can help with this

• Support iterative policy specification• Interfaces designed to help users view/change

effective policy, not just rules• Include human-readable logs

Michelle Mazurek © Oct 09

Page 43: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

http://www.pdl.cmu.edu/ 43

Even more guidelines• Acknowledge social conventions

• Requesting permission (reactive creation again)• Plausible deniability: “I don’t want people to feel

that I am hiding things from them.”

• Account for users’ mental models• A lot of mismatches come from incorrect analogies

to physical systems• Either fit into existing models or explicitly guide

users to new mental models

Michelle Mazurek © Oct 09

Page 44: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

44

Access control in practice• Smetters and Good: How Users Use Access

Control• Collect usage history data from 200-

employee corporation• Examine Windows and Unix user groups• Examine e-mail lists

• Majority of document sharing is by e-mail

• Examine DocuShare usage• File permissions• Snapshots a year apart

Smetters and Good, 2009

Page 45: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

45

Analyzing groups• Group name• List of members (users and groups)• Owner, create time, modify time• Who can update membership?

Page 46: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

46

• Most groups have fewer than 20 members• Users participate in more groups when groups

are user-defined (not administrators)• Membership changes on order of months, years

System Avg. Users/Group

Avg. Groups/User

Max Groups/User

Windows 6.3 3.7 35

Unix/NFS 7.0 4.2 16

DocuShare 11.9 7.8 30

Mailing lists 14.2 9.3 411

Results – group membership

Page 47: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

47

Results – Group construction• Users more often add members;

administrators more often “clean up”• User-defined groups are more often

disorganized, duplicate• Windows groups with clear structure, naming

convention• DocuShare groups with overlapping and

misleading names

• Unix “emergency” groups with misspelled usernames

Page 48: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

48

DocuShare settings• List of ACLs to users or groups• Positive rules only (no deny rules)• Files have single owners with full rights• Policy inheritance: folder policy automatically

applies to documents added to that folder• Inheritance prompt when folder settings change

Page 49: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

49

DocuShare data • Collected files and folders visible to 8 users• 49,672 unique objects (documents or folders)• Consider how many users can see each item

Type Percent

File 72.7

Folder 14.3

URL 6.7

Event 5.7

Calendar 0.2

Bulletin board 0.1

# Users # Items

1 3375

2 762

3 250

4 57

5 1742

6 40

7 877

8 42569

Page 50: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

50

Results – Setting permissions• 5.2% of objects had permissions different

from their parent• 3.5% of all documents; 15% of all folders

• Among changed items:• 52% different list of principals• 30% different permissions for a given principal• 17% both

• Claim: In general users prefer to add files to pre-set folder rather than set permissions

Page 51: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

51

Results – ACL contents• Consider only

“explicitly set” lists• 4527 user rules;

4755 group rules• 22% read-only rules;

73% read-write rules

• Complex ACLs are common• Only 3.9% contain

exactly one group

Page 52: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

52

More about ACL contents• Users are often double-listed: individually and

as part of a listed group• All cases with 17 or more individuals

• Almost nothing is private to owner (8 docs)• Lots of things are “public”

• 22% readable by built-in “everyone”• 86% readable by local “authorized users”• May be a function of DocuShare usage model,

and/or this organization’s open culture

Page 53: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

53

Discussion and guidelines• Simplify access control

• Positive rules only– Negative rules are complex and hard to parse– Same goal can be achieved with better groups

• Simplify inheritance– Don’t force users to choose

• Limit permission types– Do we need anything beyond read, write, exec?

Page 54: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

54

Further guidelines• Let users create their own groups

• Good groups make specifying good policy easier• But earlier, disorganized groups are dangerous?

• Better management tools• Group management: reduce redundancy• ACL management: promote groups over users• Cleanup management: prune outdated items• Intelligent activity-based grouping• Effective policy visualizations

Page 55: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

55

Overview of guidelines• Multiple-precision policy configuration• Statistical policy recommender systems

• Person and file clustering• Location- and content-based• To predict policy or warn about possible errors

• Make aggregate disclosure visible• Provide comparison to social norms• Show the user what others will see

Page 56: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

56

Overview of guidelines 2• Decouple policy for different information types

• Search vs. access, photo vs. location, etc.

• Encourage users to get beyond defaults• Allow fine-grained control• Plan for lending devices• Include reactive policy creation• Reduce up-front complexity• Support iterative policy specification• Acknowledge social conventions

Page 57: Access Control Michelle Mazurek Usable Privacy and Security October 29, 2009.

57

Overview of guidelines 3• Account for mental models• Positive rules only• Simplify policy inheritance• Limit permission types• Promote use of groups in access lists

• Let users create their own groups• Tools to reduce redundancy and promote cleanup• Activity-based suggestions

• Effective policy visualizations


Recommended