+ All Categories
Home > Documents > Privacy by Design - ETH Z · 10/3/2001 Slide 17 Ubicomp 2001, Atlanta 5. Security! No...

Privacy by Design - ETH Z · 10/3/2001 Slide 17 Ubicomp 2001, Atlanta 5. Security! No...

Date post: 01-Jul-2018
Category:
Upload: trinhphuc
View: 212 times
Download: 0 times
Share this document with a friend
22
Ubicomp 2001, Atlanta Privacy by Design Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich ETH Zurich, Switzerland www.inf.ethz.ch/~langhein Privacy by Design
Transcript

Ubicomp 2001, Atlanta

Privacy by DesignPrinciples of Privacy-Aware

Ubiquitous Systems

Marc LangheinrichETH Zurich, Switzerland

www.inf.ethz.ch/~langhein

Priv

acy

by D

esig

n

10/3/2001

Slide 2

Ubicomp 2001, AtlantaContents

! Privacy primer– Does privacy matter?

! Privacy in ubiquitous systems– What’s so different about it?

! Challenges– Issues to address in ubicomp systems

! Privacy-aware infrastructures– A first attempt

Priv

acy

by D

esig

n

10/3/2001

Slide 3

Ubicomp 2001, AtlantaJust a Modern Fad?

! “All this secrecy is making life harder, more expensive, dangerous...“ – Peter Cochran, former head of BT Research

! “You have zero privacy anyway” – Scott McNealy, CEO Sun Microsystems

! “By 2010, privacy will become a meaningless concept in western society” – Gartner Report

1. Pr

ivac

y Pr

imer

10/3/2001

Slide 4

Ubicomp 2001, AtlantaPrivacy – a Human Need?

! References in the Bible! Jewish law (“…free from being watched”)! Justice of Peace act (England 1361)! Privacy is a human right

– Universal declaration of human rights, article 12 (1948)

– European convention on human rights, article 8 (1970)

1. Pr

ivac

y Pr

imer

10/3/2001

Slide 5

Ubicomp 2001, AtlantaLegal Realities Today

! Legislation varies around the world– Mostly self-regulatory approach in US– Comprehensive laws for government and

industry in EU! EU Directive 95/46/EC

– Limits data collection– Requires comprehensive disclosures – Prohibits data export to „unsafe“ countries

• Prompted legislative updates worldwide

1. Pr

ivac

y Pr

imer

10/3/2001

Slide 6

Ubicomp 2001, AtlantaContents

! Privacy primer– Does privacy matter?

! Privacy in ubiquitous systems– What’s so different about it?

! Challenges– Issues to address in ubicomp systems

! Privacy-aware infrastructures– A first attempt

2. P

rivac

y in

Ubi

com

p

10/3/2001

Slide 7

Ubicomp 2001, AtlantaAspects of Privacy

! Anonymity– Authentication & Routing

! Security– Encryption & Communication Hiding

! Transparency– Trust-Labels, Signatures, Protocols (P3P)

How much of this works in ubicomp?

2. P

rivac

y in

Ubi

com

p

10/3/2001

Slide 8

Ubicomp 2001, AtlantaUnlimited Coverage

! The Web: covers our digital life– Shopping, chatting, news reading

! Ubicomp: real-world deployment!– Home, School, Office, Public Spaces, ...

2. P

rivac

y in

Ubi

com

p

! Covers all of our life, comprehensively!– Day in, day out – from cradle to grave

! No switch to turn it off?– Constant, seamless surveillance possible

10/3/2001

Slide 9

Ubicomp 2001, AtlantaLoss of Awareness

! Surveillance and data collection today– Stores, credit card applications, sweepstakes

! Ubicomp: invisible computing– Computers disappear into the environment

2. P

rivac

y in

Ubi

com

p

! When am I giving out data? – Fingerprint could be taken without notice

! When am I under surveillance? – Life recorders, room computers, smart cups

10/3/2001

Slide 10

Ubicomp 2001, AtlantaNew Types of Data

! Last 50 years of data collection– Identity, contact info, preferences, …

! Ubicomp: advanced sensors – New data (location, health, habits, …)– More detailed & precise (24/7)

2. P

rivac

y in

Ubi

com

p

! Does the system know more than I?– Body sensors detect moods– Nervous? Floor & seat sensors, eye tracker

10/3/2001

Slide 11

Ubicomp 2001, AtlantaMore Data, More Knowledge! Traditional data, traditional use

– Compiling mailing lists, predicting trends, …! Ubicomp: smartness through context

– Context is distilled sensory information

2. P

rivac

y in

Ubi

com

p

! Encourages increased data collection– More data means more, better context

! Innocuous data can lead to new knowledge– Data mining: more than the sum of its parts

10/3/2001

Slide 12

Ubicomp 2001, AtlantaContents

! Privacy primer– Does privacy matter?

! Privacy in ubiquitous systems– What’s so different about it?

! Challenges– Issues to address in ubicomp systems

! Privacy-aware infrastructures– A first attempt

3. C

halle

nges

10/3/2001

Slide 13

Ubicomp 2001, Atlanta1. Notice

! No hidden data collection!– Legal requirement in many countries

! Established means: privacy policies– Who, what, why, how long, etc. ...

3. C

halle

nges

! How to publish policies in Ubicomp?– Periodic broadcasts– Privacy service?

! Too many devices?– Countless announcements an annoyance

10/3/2001

Slide 14

Ubicomp 2001, Atlanta2. Choice & Consent

! Laws require explicit consent by user– Usually a signature or pressing a button

! True consent requires true choice– More than „take it or leave it“

3. C

halle

nges

! How to ask without a screen?– Designing UI‘s for embedded systems, or– Finding means of delegation (is this legal?)

! Providing conditional services– Can there be levels of location tracking?

10/3/2001

Slide 15

Ubicomp 2001, Atlanta3. Anonymity, Pseudonymity! Anonymous data comes cheap

– no consent, security, access needed! Pseudonyms allow for customization

– user can discard at any time

3. C

halle

nges

! Sometimes one cannot hide!– No anonymizing cameras & microphones

! Real-world data hard to anonymized– Even pseudonyms can reveal true identity

10/3/2001

Slide 16

Ubicomp 2001, Atlanta4. Meeting Expectations

! Ubicomp: invisibly augments real-world! Old habits adapt slowly (if ever)

– People expect solitude to mean privacy– Strangers usually don’t know me

3. C

halle

nges

! No spying, please (Proximity)– Devices only record if owner is present

! Rumors should not spread (Locality)– Local information stays local– Walls and Flower-Pots can talk (but won‘t do so over

the phone)

10/3/2001

Slide 17

Ubicomp 2001, Atlanta5. Security

! No one-size-fits-all solutions– High security for back-end storage – Low security for low-power sensors

! Real-world has complex situation-dependant security requirements– Free access to medical data in emergency situations

3. C

halle

nges

! Context-specific security?– Depending on device battery status– Depending on types of data, transmission– Depending on locality, situation

10/3/2001

Slide 18

Ubicomp 2001, Atlanta6. Access & Recourse

! Identifiable data must be accessible– Users can review, change, sometimes delete

! Collectors must be accountable– Privacy-aware storage technology?

3. C

halle

nges

! Ubicomp applications like lots of data– Increased need for accounting and access

! Carefully consider what is relevant– How much data do I really need?

10/3/2001

Slide 19

Ubicomp 2001, AtlantaContents

! Privacy primer– Does privacy matter?

! Privacy in ubiquitous systems– What’s so different about it?

! Challenges– Issues to address in ubicomp systems

! Privacy-aware infrastructures– A first attempt

4. P

rivac

y In

fras

truc

ture

s

10/3/2001

Slide 20

Ubicomp 2001, Atlanta

The Internet

Privacy Infrastructures

PA (PrivacyAssistant)

Privacy Beacon

Devices

Printer CounterpartCamera Counterpart

PA Counterpart

Privacy PolicyAccept / Decline

4. P

rivac

y In

fras

truc

ture

s

10/3/2001

Slide 21

Ubicomp 2001, AtlantaPrivacy Infrastructure

! Project Status– Started Aug 2001– Currently devising architecture

! Challenges– Policy broadcasts, privacy services, user

interface, ...! Goals

– Operational prototype for trying out new concepts

4. P

rivac

y In

fras

truc

ture

s

10/3/2001

Slide 22

Ubicomp 2001, AtlantaThe Take Home Message

! Many questions, few answers– Technology, laws still to evolve

! Ubicomp adds a new quality to privacy– Invisible, real-world coverage,

comprehensive collection, inconspicuous! Ubicomp (privacy) challenges

– User interface (notice, choice, consent)– Protocols (anonymity, security, access)– Social acceptance (user expectations)

Sum

mar

y &

Con

clus

ions


Recommended