SlideShare a Scribd company logo
1 of 127
Download to read offline
IfyouCan’tBeatThem,JoinThem:
HamzaHarkousandKarlAberer
1
AUsabilityApproachto
InterdependentPrivacyinCloudApps
hamzaharkous.com
Growing Business Adoption
of Cloud Ecosystems
*Skyhigh Networks. Cloud Report | Skyhigh Networks. https://www.skyhighnetworks.com/cloud-report/
3
Your Files
CSPs
3rd
party apps
Files
Organizations use 10-20 times more
cloud apps than their IT departments think*.
TheProliferationof
newAdversaries:
6
3rdpartyapps
7
average financial impact on a company as a result of a
cloud-storage data breach
Elastica Cloud Threat Labs. Q2 2015 Shadow Data Report: https: //www.elastica.net/q2-2015-shadow-data-report/
$13.85M
8
76%
of Google Drive apps featured on Chrome Store
ask for full access to all your files*
*Harkous et al. The Curious Case of the PDF Converter that Likes Mozart:
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps. (PoPETs 2016)
9
of documents are
shared with at least
1 other user
37.2%
*Elastica Cloud Threat Labs. 1H 2016 Shadow Data Report. 2016.
*Skyhigh Networks. Cloud Adoption and Risk Report. 2015.
9
of documents are
shared with at least
1 other user
37.2% 23%
of documents are
broadly shared
(with all employees or
with outsiders)
*Elastica Cloud Threat Labs. 1H 2016 Shadow Data Report. 2016.
*Skyhigh Networks. Cloud Adoption and Risk Report. 2015.
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
10
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
TooManyShareholders
→LargerAttackSurface 10
Company 1 Company 2 Company 3
11
Company 1 Company 2 Company 3
FewerShareholders→
Narrowerattacksurface 11
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
Challenge
Shared Data Non-shared Data
You
12
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
Challenge
Shared Data Non-shared Data
You
12
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
Challenge
Shared Data Non-shared Data
You
12
Challenges
You
13
Challenges
You Cannot remember all companies
13
Challenges
You Cannot remember all companies
Don’t know what others install
so that you don’t give access to new companies
13
Challenges
You Cannot remember all companies
Don’t know what others install
so that you don’t give access to new companies
Cannot control what others install
13
14
Interdependent Privacy
"The privacy of individual users is bound to be affected by the decisions of
others, and could be out of their own control"*
14
Interdependent Privacy
"The privacy of individual users is bound to be affected by the decisions of
others, and could be out of their own control"*
Originally introduced in the context of Facebook apps
- Biczok and Chia, Interdependent privacy: Let me share your data. In FC 2013
- Pu and Grossklags, An economic model and simulation results of app adoption decisions on networks with interdependent privacy
consequences, GameSec 2014
14
Interdependent Privacy
"The privacy of individual users is bound to be affected by the decisions of
others, and could be out of their own control"*
* Olteanu, et al. "Quantifying interdependent privacy risks with location data." IEEE TMC (2016).
Also used in the context of location privacy
Originally introduced in the context of Facebook apps
- Biczok and Chia, Interdependent privacy: Let me share your data. In FC 2013
- Pu and Grossklags, An economic model and simulation results of app adoption decisions on networks with interdependent privacy
consequences, GameSec 2014
15
of cloud apps with full
access get the
collaborators’ data
100%2%
of Facebook apps get the
friends’ data*
- Biczok and Chia, Interdependent privacy: Let me share your data. In FC 2013
16
Contributions
• First to study the problem in the context of cloud apps.
16
Contributions
• First to study the problem in the context of cloud apps.
• We quantify the effects of interdependent privacy in the wild.
16
Contributions
• First to study the problem in the context of cloud apps.
• We quantify the effects of interdependent privacy in the wild.
• We propose a usable privacy solution to mitigate the issue.
16
Contributions
• First to study the problem in the context of cloud apps.
• We quantify the effects of interdependent privacy in the wild.
• We propose a usable privacy solution to mitigate the issue.
• We showcase the network effect of privacy-aware decisions at scale.
17
ResearchQuestion-1
How significant is the impact of
collaborators’ app adoption
decisions on the users’ privacy loss?
Datasetstudy:
GoogleDrive+PrivySeal
18
+
privyseal.epfl.ch
Anonymized Dataset
20
183 Google Drive users
131 Google Drive apps
≥ 10 files each
≥ 5% shared files
Anonymized Dataset
20
183 Google Drive users
131 Google Drive apps
Data:
- anonymized user ids
- anonymized file ids
- list of collaborators per file
- list of apps per user
- vendor for each app
≥ 10 files each
≥ 5% shared files
Anonymized Dataset
21
For collaborators not in the
dataset, assign the apps of a
random user from the dataset
Anonymized Dataset
21
For collaborators not in the
dataset, assign the apps of a
random user from the dataset
Anonymized Dataset
21
For collaborators not in the
dataset, assign the apps of a
random user from the dataset
Anonymized Dataset
21
For collaborators not in the
dataset, assign the apps of a
random user from the dataset
Anonymized Dataset
21
For collaborators not in the
dataset, assign the apps of a
random user from the dataset
3,422 users+collaborators
Metric:Vendors’FileCoverage
number of files of user u accessible by vendor v
number of files of user u
metric. Consider a user u and a set V of vendors at a certain
ime step. For notation simplicity, we will omit the time step
enceforth. VFCu(V ) is computed as the summation of the
les’ fractions shared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
Intuitively, VFCu(V ) increases as vendors in V get access
o more files of u. It has the range [0, |V |]. 3
If we consider the set Vu of vendors explicitly authorized
y user u, we can define the Self-Vendors File Coverage as
y problem, which covers all vendors with full
n issue in least-privileged apps too.
y Loss Metrics
uantify the privacy loss that a user incurs with
duce now the Vendors File Coverage (VFC)
er a user u and a set V of vendors at a certain
notation simplicity, we will omit the time step
FCu(V ) is computed as the summation of the
shared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
VFCu(V ) increases as vendors in V get access
u. It has the range [0, |V |]. 3
problem, which covers all vendors with full
ssue in least-privileged apps too.
Loss Metrics
ntify the privacy loss that a user incurs with
ce now the Vendors File Coverage (VFC)
a user u and a set V of vendors at a certain
tation simplicity, we will omit the time step
u(V ) is computed as the summation of the
ared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
Cu(V ) increases as vendors in V get access
. It has the range [0, |V |]. 3
forauseruandsetVofvendors
23
WhyVFC?
Easy to relay to the user:
"the percentage of your files accessible by the company"
23
WhyVFC?
Easy to relay to the user:
"the percentage of your files accessible by the company"
Does not need external vendor evaluations:
e.g. based on reputation, number of installations, etc
Metric:Vendors’FileCoverage
v2V
|Fu|
Intuitively, VFCu(V ) increases as vendors in V get access
to more files of u. It has the range [0, |V |]. 3
If we consider the set Vu of vendors explicitly authorized
by user u, we can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
Similarly, if we consider the set VC(u) of vendors autho-
rized by the collaborators C(u) of u, we can define the
Collaborators-Vendors File Coverage as:
Collaborators-VFCu = VFCu(VC(u)) (3)
Part due to the users’ decisions
VFCu(V ) is computed as the summation of the
s shared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
VFCu(V ) increases as vendors in V get access
of u. It has the range [0, |V |]. 3
der the set Vu of vendors explicitly authorized
can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
f we consider the set VC(u) of vendors autho-
collaborators C(u) of u, we can define the
-Vendors File Coverage as:
ollaborators-VFCu = VFCu(VC(u)) (3)
s already achieves the least privilege possible.
vendors authorized by the user
Metric:Vendors’FileCoverage
v2V
|Fu|
Intuitively, VFCu(V ) increases as vendors in V get access
to more files of u. It has the range [0, |V |]. 3
If we consider the set Vu of vendors explicitly authorized
by user u, we can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
Similarly, if we consider the set VC(u) of vendors autho-
rized by the collaborators C(u) of u, we can define the
Collaborators-Vendors File Coverage as:
Collaborators-VFCu = VFCu(VC(u)) (3)
Part due to the users’ decisions
VFCu(V ) is computed as the summation of the
s shared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
VFCu(V ) increases as vendors in V get access
of u. It has the range [0, |V |]. 3
der the set Vu of vendors explicitly authorized
can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
f we consider the set VC(u) of vendors autho-
collaborators C(u) of u, we can define the
-Vendors File Coverage as:
ollaborators-VFCu = VFCu(VC(u)) (3)
s already achieves the least privilege possible.
vendors authorized by the user
v2V
|Fu|
Intuitively, VFCu(V ) increases as vendors in V get access
to more files of u. It has the range [0, |V |]. 3
If we consider the set Vu of vendors explicitly authorized
by user u, we can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
Similarly, if we consider the set VC(u) of vendors autho-
rized by the collaborators C(u) of u, we can define the
Collaborators-Vendors File Coverage as:
Collaborators-VFCu = VFCu(VC(u)) (3)
2Per-file access already achieves the least privilege possible.
Part due to the collaborators’ decisions
with each of these vendors:
Cu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
) increases as vendors in V get access
as the range [0, |V |]. 3
et Vu of vendors explicitly authorized
ne the Self-Vendors File Coverage as:
VFCu = VFCu(Vu) (2)
sider the set VC(u) of vendors autho-
ators C(u) of u, we can define the
File Coverage as:
ors-VFCu = VFCu(VC(u)) (3)vendors authorized by the collaborators
Metric:Vendors’FileCoverage
Combined metric due to the users’ and the collaborators
quantify the privacy loss that a user incurs with
oduce now the Vendors File Coverage (VFC)
der a user u and a set V of vendors at a certain
notation simplicity, we will omit the time step
FCu(V ) is computed as the summation of the
shared with each of these vendors:
VFCu(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
VFCu(V ) increases as vendors in V get access
of u. It has the range [0, |V |]. 3
der the set Vu of vendors explicitly authorized
can define the Self-Vendors File Coverage as:
Self-VFCu = VFCu(Vu) (2)
we consider the set VC(u) of vendors autho-
collaborators C(u) of u, we can define the
vendors authorized by the user
u(V ) =
X
v2V
|Fu,v|
|Fu|
(1)
increases as vendors in V get access
s the range [0, |V |]. 3
Vu of vendors explicitly authorized
e the Self-Vendors File Coverage as:
FCu = VFCu(Vu) (2)
der the set VC(u) of vendors autho-
tors C(u) of u, we can define the
File Coverage as:
s-VFCu = VFCu(VC(u)) (3)
hieves the least privilege possible.
vendors authorized by the collaborators
Finally, the Aggregate VFCu for a user u is that due to all
vendors authorized by u or its collaborators:
Aggregate-VFCu = VFCu(Vu [ VC(u)) (4)
Throughout this work, we will use the terms privacy loss
and VFC interchangeably. As will become evident in Sec-
26
HowtheVFCevolveswithmoreshareddata:
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
183 133 87 58 43 35 22
0
5
10
15
5 10 20 30 40 50 60
Minimum % of shared files per user
Coveragevalue
Self_VFC Colls_VFC Agg_VFC
Minimum % of Shared Files per User
VFCvalue
26
HowtheVFCevolveswithmoreshareddata:
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
183 133 87 58 43 35 22
0
5
10
15
5 10 20 30 40 50 60
Minimum % of shared files per user
Coveragevalue
Self_VFC Colls_VFC Agg_VFC
Minimum % of Shared Files per User
VFCvalue
Users with at least 5% of files shared
26
HowtheVFCevolveswithmoreshareddata:
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
183 133 87 58 43 35 22
0
5
10
15
5 10 20 30 40 50 60
Minimum % of shared files per user
Coveragevalue
Self_VFC Colls_VFC Agg_VFC
Minimum % of Shared Files per User
VFCvalue
Users with at least 5% of files shared
Number of users
26
HowtheVFCevolveswithmoreshareddata:
●
●●●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●
●
●●●● ●●●
●
●●
0
5
5 10 20
Cov
Minimum % of Shared Files per User
VFCvalue
Users with at least 5% of files shared
Number of users
139% of the Self-VFC
27
0 5 10 20 30 40 50 60
139%
200%
306%
256%
582%
610% 623%
% Privacy Loss due to Collaborators relative to that due to the User
Minimum % of Shared Files per User
28
ResearchQuestion-1
How significant is the impact of collaborators’ app adoption
decisions on the users’ privacy loss?
Collaborators’ decisions are highly significant.
They become more important as the sharing frequency increases
29
ResearchQuestion-2
DoCurrentPermissionModels
helpuserminimizetheVFC?
Howcanwe improvethem?
30
CurrentPermissionModels
30
CurrentPermissionModels
31
CurrentPermissionModels
History-Based (HB) Insights Model
History-Based(HB)InsightsModel
You are made aware of the percentage of your files that
the vendor already has (i.e. the Aggregate VFC)
(due to your or your collaborators’ decisions)
You
BaselinePermissionModels
HBInsightsPermissionModels
HBInsightsPermissionModels
Selecting the vendor with maximum existing
access results in minimizing the aggregate VFC
(proof in the paper)
HBInsightsPermissionModels
Selecting the vendor with maximum existing
access results in minimizing the aggregate VFC
(proof in the paper)
Userstudy
37
38
OnlineStudySetup
Recruited users via Crowdflower (141 users)
Baseline group (BL): 72 users History-based group (HB): 69 users
38
OnlineStudySetup
Recruited users via Crowdflower (141 users)
Baseline group (BL): 72 users History-based group (HB): 69 users
Introductory Survey
38
OnlineStudySetup
Recruited users via Crowdflower (141 users)
Baseline group (BL): 72 users History-based group (HB): 69 users
4 modulesIntroductory Survey
38
OnlineStudySetup
Recruited users via Crowdflower (141 users)
Baseline group (BL): 72 users History-based group (HB): 69 users
4 modulesIntroductory Survey Concluding Survey
39
Demographics
nsider the di↵erences in access
rs that collaborators installed?
the user was asked to choose
th a list of 12 apps (Figure 5
y two of these apps were rel-
nd they were placed on top of
as first or second). With this
e realistic setup of app brows-
e user’s e↵ort on finding apps.
ccess permissions too (namely
n Chrome Store, we removed
reviews, and screenshots and
is is all in order to reduce the
de the study. We refer the user
0] who investigated the e↵ects
ecisions for Android apps.
gue and learning e↵ects, mod-
d in a random order for users.
setup in two stages: with col-
s from the CrowdFlower com-
the online pilot testers work,
de for session recording in our
Age 18-62 (median 31 years)
Gender 35.5% Female
64.5% Male
Occupation 59.6% full-time employees
14.2% student
6.4% part-time worker
8.5% self-employed
5.0% homemaker
6.4% Unemployed/retired
IT Experience 41.8% Have worked or studied in IT
Degree 19.1% High school
7.1% Trade/tech./vocational training
51.1% Associate or Bachelor’s degree
22.7% Post Graduate Degree
Countries 35.0% USA
37.5% IND
7.5% GBR
6.9% DEU
6.9% CAN
7.4% AUS+IRL+ NLD + PAK
40
Module1
You installed
by: Company 1
Howlikelyareuserstoselectanappfromthe
samecompanytheyinstalledfrombefore?
40
Module1
You installed
by: Company 1
by Company 1
by Company 2
. Would you choose:
?OR
Howlikelyareuserstoselectanappfromthe
samecompanytheyinstalledfrombefore?
Module1-HBGroup
Module1-HBGroup
50%
Results
Baseline
75.4%
History-based
p-value= 0.003Fisher’s exact test
Probabilityofinstallingthemore privacy preservingoption
Results
Baselinegroupsparticipantslookedforotherreasons:
(morecomprehensivedescription,moreprofessionallogo,abettersoundingname,oramoretrustableURL)
Difficultyofrememberingthepreviousvendors
(e.g.2participantsjustifiedbymentioningthattheappcomesfromthesamevendor,butactuallyselectedadifferentone)
44
Module2
Howlikelyareuserstoselectthesameappthattheir
collaboratorhaveusedbefore?
44
Module2
Your friend
John
installed by: Company 1
Howlikelyareuserstoselectthesameappthattheir
collaboratorhaveusedbefore?
44
Module2
Your friend
John
installed by: Company 1
by: Company 1
by: Company 2
. Would you choose: ?OR
Howlikelyareuserstoselectthesameappthattheir
collaboratorhaveusedbefore?
52.8%
Results
Baseline
88.4%
History-based
p-value<0.001
Probabilityofinstallingthemore privacy preservingoption
Fisher’s exact test
Results
Results
Quote: “Mytools.com is the maker of PDF Mergy and since they already have ALOT of
access to my files (thanks to John), might as well stick with the brand and not open up
more files to another company.”
47
Module3
Your friend
Lisa
installed Company 1
Howlikelyareuserstoselectanappfromthesamevendor
thattheircollaboratorhaveusedbefore?
47
Module3
Your friend
Lisa
installed Company 1
Company 1
Company 2
. Would you choose: ?OR
Howlikelyareuserstoselectanappfromthesamevendor
thattheircollaboratorhaveusedbefore?
58.3%
Results
Baseline
82.6%
History-based
p-value= 0.002
Probabilityofinstallingthemore privacy preservingoption
Fisher’s exact test
49
Module4
Howlikelyareuserstoconsiderthedifferences inaccess
levelsofvendorsthatcollaboratorsauthorized?
50
Module4
Your friend
Lisa
installed Company 1
50
Module4
Your friend
Lisa
installed Company 1
Your friend
John
installed Company 2
50
Module4
Your friend
Lisa
installed Company 1
Your friend
John
installed Company 2
Your share
more files
with Lisa
50
Module4
Your friend
Lisa
installed Company 1
Your friend
John
installed Company 2
Company 1
Company 2
. Would you choose: ?OR
Your share
more files
with Lisa
44.4%
Results
Probabilityofinstallingthemore privacy preservingoption
Baseline
82.6%
History-based
p-value=<0.001Fisher’s exact test
Results
Quote: “This is the app that John already uses, and he has access to all of my files. The
PDF Mergy app is used by Lisa, but she only has access to part of my files.”
53
ResearchQuestion-3
HowdotheHistory-basedDecisions
affectusers’privacyatscale?
54
Idea: Study the network effect of
History-based decisions
installed from v1
User A
54
Idea: Study the network effect of
History-based decisions
installed from v1
User A
installed from v1
User B
54
Idea: Study the network effect of
History-based decisions
installed from v1
VFC for User A increases by 0
User A
installed from v1
User B
55
Issue: We do not have access to large
networks of cloud storage and apps’ users.
Create networks with similar properties.
Network1:InflatedGoogleDriveNetwork
Start from PrivySeal users’ network.
*Newman. The structure and function of complex networks. SIAM review, 2003
Extract the degree distribution.
Network1:InflatedGoogleDriveNetwork
Start from PrivySeal users’ network.
*Newman. The structure and function of complex networks. SIAM review, 2003
Create a large scale connected graph with a
similar distribution using the Configuration Model*.
Extract the degree distribution.
Network1:InflatedGoogleDriveNetwork
Start from PrivySeal users’ network.
*Newman. The structure and function of complex networks. SIAM review, 2003
Create a large scale connected graph with a
similar distribution using the Configuration Model*.
Extract the degree distribution.
Network1:InflatedGoogleDriveNetwork
Start from PrivySeal users’ network.
*Newman. The structure and function of complex networks. SIAM review, 2003
- 18,000 users
- 138,440 edges
- average degree: 15
Network2:AuthorCollaborationNetwork
Rely on Microsoft Academic Graph
(papers, authors, affiliations)
Use a snapshot of 50,000 papers to
construct a collaboration graph
Network2:AuthorCollaborationNetwork
Rely on Microsoft Academic Graph
(papers, authors, affiliations)
Obtain a graph
Use a snapshot of 50,000 papers to
construct a collaboration graph
Network2:AuthorCollaborationNetwork
Rely on Microsoft Academic Graph
(papers, authors, affiliations)
Obtain a graph
Use a snapshot of 50,000 papers to
construct a collaboration graph
Network2:AuthorCollaborationNetwork
Rely on Microsoft Academic Graph
(papers, authors, affiliations)
- 41,000 users
- 199,980 edges
- average degree: 4
Network3:TeamsCollaborationNetwork
Take the previously constructed
collaboration graph
Compute the Strongly Connected
Components (SCC)
Network3:TeamsCollaborationNetwork
Take the previously constructed
collaboration graph
Each team is a SCC.
Compute the Strongly Connected
Components (SCC)
Network3:TeamsCollaborationNetwork
Take the previously constructed
collaboration graph
Each team is a SCC.
Compute the Strongly Connected
Components (SCC)
Network3:TeamsCollaborationNetwork
Take the previously constructed
collaboration graph
- 16,400 users
- 1700 teams
Each team is a SCC.
Compute the Strongly Connected
Components (SCC)
Network3:TeamsCollaborationNetwork
Take the previously constructed
collaboration graph
- 16,400 users
- 1700 teams
Assumption:
Team members only account for
other team members’ decisions
Keepsimulationpropertiesrealistic:
- Distribution of shared files
- Number of apps installed
Match the PrivySeal dataset
Keepsimulationpropertiesrealistic:
- Apps vendors
- App installation count
Select at random on each step among1000
apps from Chrome Store
61
Fully-Aware model (FA)
(always selects the HB option)
Experimental HB Model (EHB)
Experimental Baseline Model (EBL)
3UserModels
62
3UserModels
Fully-Aware model (FA)
(always selects the HB option)
Experimental HB Model (EHB)
Experimental Baseline Model (EBL)
Users are self-interested and do not cooperate on
app installation decisions.
62
3UserModels
Fully-Aware model (FA)
(always selects the HB option)
Experimental HB Model (EHB)
Experimental Baseline Model (EBL)
Users are self-interested and do not cooperate on
app installation decisions.
63
SimulationSteps
Select a user
(based on the installation frequency of the user)
63
SimulationSteps
Select a user
(based on the installation frequency of the user)
Select an app
(based on the installation frequency of the app)
63
SimulationSteps
Select a user
(based on the installation frequency of the user)
Select an app
(based on the installation frequency of the app)
Choose to install the app or one of its related apps
(based on the user model)
63
SimulationSteps
Select a user
(based on the installation frequency of the user)
Select an app
(based on the installation frequency of the app)
Choose to install the app or one of its related apps
(based on the user model)
Compute the average Aggregate VFC per user
(based on the user model)
64
SimulationResults
Growth of the Privacy Loss is curtailed as users install more apps.
65
Inflated Network Authors’ Network Teams’ Network
Growth of the Average aggregate VFC with more apps installed by users.
How much is the privacy loss reduction by the end of the simulation
(w.r.t. the baseline (EBL))?
66
Inflated Network Authors’ Network
Users
modeled by
our study
(EHB)
Users who
always take
the optimal
decision
(FA)
41% 28%
70% 40%
How much is the privacy loss reduction by the end of the simulation
(w.r.t. the baseline (EBL))?
66
Inflated Network Authors’ Network
Users
modeled by
our study
(EHB)
Users who
always take
the optimal
decision
(FA)
41% 28%
70% 40%
Difference due to the
graph connectivity
How much is the privacy loss reduction by the end of the simulation
(w.r.t. the baseline (EBL))?
67
Users
modeled by
our study
(EHB)
Users who
always take
the optimal
decision
(FA)
23%
45%
Teams’ Network
Assumption:
Team members only account for other team
members’ decisions
68
Take-aways
The impact of collaborators on user’s privacy significantly important.
With a Usable privacy solutions, we show how to mitigate this issue.
With large networks, the network effect of HB decisions increases.
69
FutureWork
History based insights are a basic building block for:
Data-driven, Usable privacy
69
FutureWork
History based insights are a basic building block for:
Data-driven, Usable privacy
Communicating risk to the users in their own language
69
FutureWork
History based insights are a basic building block for:
Data-driven, Usable privacy
Communicating risk to the users in their own language
Context of permissions, privacy policies, etc.
hamzaharkous.com
hamza.harkous@gmail.com
hamzaharkous.com
hamza.harkous@gmail.com

More Related Content

Viewers also liked

Purple parrots westing game character profiles
Purple parrots westing game character profilesPurple parrots westing game character profiles
Purple parrots westing game character profilesajroets
 
O que é CRM? - Grupo Semear
O que é CRM? - Grupo SemearO que é CRM? - Grupo Semear
O que é CRM? - Grupo SemearFelipe Felix
 
Enhance Worldwide 2016 Annual Report
Enhance Worldwide 2016 Annual ReportEnhance Worldwide 2016 Annual Report
Enhance Worldwide 2016 Annual ReportHeather Mahardy
 
Métodos proyectivos tema iii
Métodos proyectivos  tema iiiMétodos proyectivos  tema iii
Métodos proyectivos tema iiiPROF. NORIS SOSA
 
2017.3.24 市中肺炎にステロイドは効く
2017.3.24 市中肺炎にステロイドは効く2017.3.24 市中肺炎にステロイドは効く
2017.3.24 市中肺炎にステロイドは効くsyokiken
 
Grava y conglomerados christian romero
Grava y conglomerados christian romeroGrava y conglomerados christian romero
Grava y conglomerados christian romeroChrisTian Romero
 
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματος
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματοςΠαρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματος
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματοςΘεοδώρα Γρομητσάρη
 
(363)long reconquistar derechos sociale sdocx
(363)long reconquistar derechos sociale sdocx(363)long reconquistar derechos sociale sdocx
(363)long reconquistar derechos sociale sdocxManfredNolte
 

Viewers also liked (16)

Pro chi pics class work
Pro chi pics class workPro chi pics class work
Pro chi pics class work
 
Psychisme Humain
Psychisme HumainPsychisme Humain
Psychisme Humain
 
Purple parrots westing game character profiles
Purple parrots westing game character profilesPurple parrots westing game character profiles
Purple parrots westing game character profiles
 
O que é CRM? - Grupo Semear
O que é CRM? - Grupo SemearO que é CRM? - Grupo Semear
O que é CRM? - Grupo Semear
 
Enhance Worldwide 2016 Annual Report
Enhance Worldwide 2016 Annual ReportEnhance Worldwide 2016 Annual Report
Enhance Worldwide 2016 Annual Report
 
Grandezas físicas
Grandezas físicasGrandezas físicas
Grandezas físicas
 
Q4
Q4Q4
Q4
 
Métodos proyectivos tema iii
Métodos proyectivos  tema iiiMétodos proyectivos  tema iii
Métodos proyectivos tema iii
 
2017.3.24 市中肺炎にステロイドは効く
2017.3.24 市中肺炎にステロイドは効く2017.3.24 市中肺炎にステロイドは効く
2017.3.24 市中肺炎にステロイドは効く
 
Grava y conglomerados christian romero
Grava y conglomerados christian romeroGrava y conglomerados christian romero
Grava y conglomerados christian romero
 
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματος
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματοςΠαρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματος
Παρουσίαση Περιβαλλοντικού Προγράμματος Β2 τμήματος
 
trabajo didactica
trabajo didacticatrabajo didactica
trabajo didactica
 
Ht sika rep
Ht sika repHt sika rep
Ht sika rep
 
(363)long reconquistar derechos sociale sdocx
(363)long reconquistar derechos sociale sdocx(363)long reconquistar derechos sociale sdocx
(363)long reconquistar derechos sociale sdocx
 
Friki 123
Friki 123Friki 123
Friki 123
 
Jornal digital 27-03-17
Jornal digital 27-03-17Jornal digital 27-03-17
Jornal digital 27-03-17
 

Similar to A Usability Approach to Interdependent Privacy in Cloud Apps (at CODASPY 2017)

Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian EducationSourav Biswas
 
Bus 421 Research Paper
Bus 421 Research PaperBus 421 Research Paper
Bus 421 Research PaperCrystal Torres
 
Cloud computing
Cloud computingCloud computing
Cloud computingsuman2010
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?PECB
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingINFOGAIN PUBLICATION
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
State of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply ChainState of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply Chainstemkat
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Atlantic Security Conference
 
Secure data storage and retrieval in the cloud
Secure data storage and retrieval in the cloudSecure data storage and retrieval in the cloud
Secure data storage and retrieval in the cloudeSAT Publishing House
 
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...FIWARE
 

Similar to A Usability Approach to Interdependent Privacy in Cloud Apps (at CODASPY 2017) (20)

Cloud computing usa
Cloud computing usaCloud computing usa
Cloud computing usa
 
Marketing of services Australian Education
Marketing of services Australian EducationMarketing of services Australian Education
Marketing of services Australian Education
 
Bus 421 Research Paper
Bus 421 Research PaperBus 421 Research Paper
Bus 421 Research Paper
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Netcool Impact docs
Netcool Impact docsNetcool Impact docs
Netcool Impact docs
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Download
DownloadDownload
Download
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
State of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply ChainState of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply Chain
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
Secure data storage and retrieval in the cloud
Secure data storage and retrieval in the cloudSecure data storage and retrieval in the cloud
Secure data storage and retrieval in the cloud
 
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...Juanjo Hierro -  Integrating Trust and IAM with trading in Data Space Connect...
Juanjo Hierro - Integrating Trust and IAM with trading in Data Space Connect...
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

A Usability Approach to Interdependent Privacy in Cloud Apps (at CODASPY 2017)