• No results found

Technology and Privacy

N/A
N/A
Protected

Academic year: 2021

Share "Technology and Privacy"

Copied!
10
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Technology and Privacy

Technology and Privacy

Teresa Lunt

Palo Alto Research Center

Teresa Lunt

Palo Alto Research Center

In collaboration with Victoria Bellotti, Richard Chow, Glenn

Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, and

others…

In collaboration with Victoria Bellotti, Richard Chow, Glenn

Durfee, Philippe Golle, Diana Smetters, Jessica Staddon, and

others…

(3)

Gender

ZIP code

Date of Birth

Cancer Type

Patient Records

Voter Registration

Name

Street address

Gender

ZIP code

Date of Birth

Voter Registration

Name

Street address

Gender

ZIP code

Date of Birth

Hot Privacy Technology Research

Hot Privacy Technology Research

Identity management and access

control

Credentials, reputation, pseudonyms,

unlinkability, phishing

Data privacy, data mining and

inference control

Census data, medical data

Location privacy

Location-based cell-phone services,

friend locator

Usable privacy

Privacy policy languages, automatic

negotiation

Anonymous communication

Web-browsing, censorship resistant

publishing, voting

Identity management and access

control

Credentials, reputation, pseudonyms,

unlinkability, phishing

Data privacy, data mining and

inference control

Census data, medical data

Location privacy

Location-based cell-phone services,

friend locator

Usable privacy

Privacy policy languages, automatic

negotiation

Anonymous communication

Web-browsing, censorship resistant

(4)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Hot Privacy Technology Research

Hot Privacy Technology Research

Privacy in ubiquitous computing

environments

Sensors, RFID tags

Private information retrieval

Look-up of patents, medical

conditions, DNA sequences

Private computations (secure

function evaluation)

Millionaire problem, collaborative

forecasting, intrusion detection

Search on encrypted data

Classification of encrypted emails,

encrypted documents

And More…

Economics of privacy, policy, law, etc.

Privacy in ubiquitous computing

environments

Sensors, RFID tags

Private information retrieval

Look-up of patents, medical

conditions, DNA sequences

Private computations (secure

function evaluation)

Millionaire problem, collaborative

forecasting, intrusion detection

Search on encrypted data

Classification of encrypted emails,

encrypted documents

And More…

Economics of privacy, policy, law, etc.

In

d

e

x

i

R

e

c

o

rd

i

Private

Computation

x

y

f (x, y)

(5)

Technology is a Moving Target

Technology is a Moving Target

Examples of current research at PARC

Ubiquitous Computing

Embedded everywhere, often with sensors

Context Aware Computing

Able to make inferences and act based on sensing

Social Computing

Interaction and collaboration online

Privacy and Security Research

Increased IT capabilities imply greater need for

control

Examples of current research at PARC

Ubiquitous Computing

Embedded everywhere, often with sensors

Context Aware Computing

Able to make inferences and act based on sensing

Social Computing

Interaction and collaboration online

Privacy and Security Research

Increased IT capabilities imply greater need for

control

(6)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Ubicomp &

sensor data

Outsourced

data

Transaction data

data

source

data

source

data

source

Privacy-preserving

transfor

m

ations and

knowledge extraction

privacy

appliance

customer

query

Infor

m

ation storefront

Enable sale of transformed data

while providing privacy protection for

individuals represented in the data

PARC started research here but

more work is needed

Privacy Appliance

(7)

Personal Privacy Appliance

Personal Privacy Appliance

Profile

Database

Profile

Database

3.

She enables the

mall to read her profile

from her phone. No

identity is needed

1.

Her shopping and

other activities are

reported to her PPA

2.

She synchs her

Personal

(8)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

User Control of Profile Dissemination

User Control of Profile Dissemination

Clothing

ƒ

Colors: B

ƒ

Size: 16

ƒ

Extra tall

Books

ƒ

History

ƒ

Mysteries

Music

ƒ

Opera

ƒ

Baroque

Children

ƒ

Aged 3 and 5

X

X

Privacy software in the PDA can inform the

user of the privacy consequences of releasing

certain data

Stores could offer incentives to users to enable

their profiles: coupons, discounts, …

Users can disable portions of their profile when

entering certain stores, friends houses, etc.

Not

sensitive

Very

sensitive

Medium

sensitive

(9)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

In-document Security

In-document Security

Credit Report

Mortgage

Application

SSN: 123-45-6789

Social Security Number:

123456789

Home Inspection

Report

Property Address:

1234 Main St.

Fence with adjacent

property, 1234 Elm St. , is

damaged.

Property

Appraisal

Property Address:

Property has view of

Golden Gate Bridge.

Police Report

Atherton, CA

…outside the apartment

Property Address:

1234 Main St.

Natural Language

understanding

aids content

analysis

Document appears different to people based on their

access rights

Document appears different to people based on their

access rights

(10)

29e CONF

29e CONFÉÉRENCE INTERNATIONALE DES COMMISSAIRES RENCE INTERNATIONALE DES COMMISSAIRES ÀÀLA PROTECTION DES DONNLA PROTECTION DES DONNÉÉES ET DE LA VIE PRIVES ET DE LA VIE PRIVÉÉE 29E 29ththINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERSINTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Technology and privacy are

often seen as opposing forces

Privacy advocates feel like

Sisyphus versus his stone

But some technologists feel the

same way

Both sides need to work

together continuously

Technology and privacy are

often seen as opposing forces

Privacy advocates feel like

Sisyphus versus his stone

But some technologists feel the

same way

Both sides need to work

together continuously

Privacy

Privacy

Technology

Technology

A Never-Ending Story

A Never-Ending Story

References

Related documents

All the Omani government bodies including the Ministry of Commerce and Industry and the Public Authority for the SMEs Development have helped to grow and enhance the small and

The specific content of the request and response data is determined by the service data type , which is analogous to the message types that determine the content of messages

For the first two pairs of articles, in the first version students could mostly recognize in what side the writer was interested. For the first two pairs that were about the

To determine whether the patients not fully satisfying the selection criteria had different postoperative outcomes, comparative analyses of the postoperative outcomes were done

A novel, safe and sensitive method of spectrophotometric estimation in the ultraviolet region has been developed using a mixed hydrotropic solution, containing a blend of

From the corporate cluster perspective, although the head of cluster does attend the bi-weekly sessions, the response from risk analyst 1 and 2 emphasise the issue that senior

The second measure of accruals ( ACCR ) is defined as the change in current assets (COMPUSTAT item #4) less the change in cash (COMPUSTAT item#1) less the change in

Modified bagasse by propionic acid is an effective bio- sorbent for the removal of both reactive yellow 2 and reactive blue 4 dyes from wastewater. Effect of pH on the