SlideShare a Scribd company logo
1 of 52
Download to read offline
Data-Driven
Hamza Harkous, Rameez Rahman, Karl Aberer
PrivacyIndicators
EPFL, Switzerland
WorkshoponPrivacyIndicators,SOUPS2016
2
Permissionsin3rdPartyApps
Android
Facebook
3
Permissionsin3rdPartyApps
Dropbox
11/26/2015 Request for Permission
AllowDeny
Pdf Merger would like to:
View and manage Google Drive files and folders that
you have opened or created with this app
View and manage the files in your Google Drive
By clicking Allow, you allow this app and Google to use your information in
accordance with their respective terms of service and privacy policies. You can
change this and other Account Permissions at any time.
GoogleDrive
3
Permissionsin3rdPartyApps
Dropbox
AllowDeny
Pdf Merger would like to:
View and manage Google Drive files and folders that
you have opened or created with this app
View and manage the files in your Google Drive
By clicking Allow, you allow this app and Google to use your information in
accordance with their respective terms of service and privacy policies. You can
change this and other Account Permissions at any time.
GoogleDrive
3
Permissionsin3rdPartyApps
Dropbox
AllowDeny
Pdf Merger would like to:
View and manage Google Drive files and folders that
you have opened or created with this app
View and manage the files in your Google Drive
By clicking Allow, you allow this app and Google to use your information in
accordance with their respective terms of service and privacy policies. You can
change this and other Account Permissions at any time.
GoogleDrive
Challenges
Onesizefitsall
Habituationeffects
Differentfromuserexpectations
4
Data-DrivenPrivacyIndicators(DDPIS)
Dynamicindicatorsasafunctionofusers’data
4
Data-DrivenPrivacyIndicators(DDPIS)
Dynamicindicatorsasafunctionofusers’data
Serviceproviderdeliversinsightsthathelpusersmakeprivacy-awaredecisions.
5
Focuson3rdPartyCloudApps
6
Your Files
CSPs
3rd
party apps
Files
7
Problem1:
DealingwithAppOver-privilege
8
DealingwithAppOver-privilege
64%of 3rd party apps request
more data than needed*
*H. Harkous, R. Rahman, B. Karlas, and K. Aberer.
"The Curious Case of the PDF Converter that Likes Mozart:
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps", PoPETs
ZIP Extractor wants to:
Current Interface
View your basic profile info
View your email address
View and manage Google Drive files and folders
that you have opened or created with this app.
View the files in your Google Drive
9
per-file access
full access
ZIP Extractor wants to:
View your basic profile info
View your email address
View and manage Google Drive files and folders
that you have opened or created with this app.
View the files in your Google Drive
obtain permissions it needs to function
obtain permissions it doesn't need
9
ZIP Extractor wants to:
View your basic profile info
View your email address
View and manage Google Drive files and folders
that you have opened or created with this app.
View the files in your Google Drive
obtain permissions it needs to function
obtain permissions it doesn't need
Labelling
9
10privyseal.epfl.ch
Immediate
Insights
(examples)
from your
Data
1- Immediate Insights
10privyseal.epfl.ch
11
They tell the app that you have the below image,
named ‘brithday21.jpg':
2- Immediate Insights1- Immediate Insights
privyseal.epfl.ch
12
They tell the app that you have an image, named‘dinner.jpg’, which
was captured at this location:
2- Immediate Insights1- Immediate Insights
privyseal.epfl.ch
Far-reaching
Insights
from your
Data
2- Far-reaching Insights
13privyseal.epfl.ch
Far-reaching
Insights
from your
Data
2- Far-reaching Insights
13privyseal.epfl.ch
14
…with Entities/Concepts/Topics
3- Far-reaching Insights2- Far-reaching Insights
privyseal.epfl.ch
15
…Sentiments
3- Far-reaching Insights2- Far-reaching Insights
privyseal.epfl.ch
16
…Top Collaborators
3- Far-reaching Insights2- Far-reaching Insights
privyseal.epfl.ch
17
…Shared Interests
3- Far-reaching Insights2- Far-reaching Insights
privyseal.epfl.ch
18
3- Far-reaching Insights
…Faces with Context
2- Far-reaching Insights
privyseal.epfl.ch
19
3- Far-reaching Insights
…Faces on Map
2- Far-reaching Insights
privyseal.epfl.ch
20
InefficacyofBaselinePermissions
16%
23%
39%
Baseline Immediate Far-reaching
AcceptanceLikelihood
(Percentageofuserswhowouldstillacceptover-privilegedapps)
• Onlineexperiment
• Actualuser’sdata
• 160participantsin3groups
• GLMMsforsignificancetests
*H. Harkous, R. Rahman, B. Karlas, and K. Aberer.
"The Curious Case of the PDF Converter that Likes Mozart:
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps", PoPETs
21
ThePowerofRelationalInsights
<
They tell the app that you have the
below image, named ‘brithday21.jpg':
Acceptance
Likelihood
22
ImpactofFaceRecognition
<Acceptance
Likelihood
8% 21%
23
Problem2:
MinimizingInterdependentPrivacy
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
24
Company 1 Company 2 Company 3 Company 4 Company 5 Company 6
TooManyShareholders→
LargerAttackSurface
24
Company 1 Company 2 Company 3
25
Company 1 Company 2 Company 3
FewerShareholders→
BetterPrivacy
25
26
History-basedInsights
Keep data with a minimum number of vendors
When possible, install apps from vendors that already have
access to your data, either directly or from collaborators.
27
BaselinePermissionModel
28
History-based(HB)InsightsModel
29
Findings
30
SuperiorityoftheHBInsights
75-84%
42-56%
Baseline History-based
(Percentageofuserswhowouldfavortheappwithexistingaccesstotheirdata)
• Onlineexperiment(CrowdFlower)
• Role-playingscenario
• 141participantsin2groups
• Fisher’stestforsignificance
31
UserMotivations
cross-app compatibility
interface familiarity
satisfaction with the previous vendor
31
UserMotivations
cross-app compatibility
interface familiarity
satisfaction with the previous vendor
Users’ data can be used to highlight the other
advantages of taking privacy-aware decisions
32
FurtherApplicationsofDDPIs
33
ExtensionsofFRand HBInsights
mobile/social networking platforms
browser extensions (visualize browser history contents)
visualize the power of 4th party ad providers
34
NewDDPIs
consequences of privacy settings
how others view my encrypted data
visualize which of the user’s apps still operate with encryption
35
Post-installationScenario
insights based on downloaded files
insights based on accessed location*
* H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. F. Cranor, and Y. Agarwal.
Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. CHI 2015
Limitations
36
37
TheBusinessCase
The provider is interested in strengthening the ecosystem
Could privacy be the selling point?
38
TheEconomicCost
extra computational cost
data analysis already run for other purposes (e.g. search)
39
UsabilityChallenges
How to stay minimize information overload?
How to prioritize messages when multiple optimizations are possible?
40
DDPIS
Privacy
Assistants
What’sNext?
41
Questions/Feedback?
hamza.harkous@gmail.com
hamzaharkous.com
42
Image/MediaCredits
Markus Magnusson: slide 8
David Holm: slide 24
Freepik: slide 23
Fab Design: slide 41

More Related Content

Viewers also liked

My final mini riset (nesfi)
My final mini riset (nesfi)My final mini riset (nesfi)
My final mini riset (nesfi)
Nesfi Vayuni
 

Viewers also liked (11)

Smartphoto Presentation
Smartphoto PresentationSmartphoto Presentation
Smartphoto Presentation
 
PriBots: Conversational Privacy with Chatbots (at SOUPS 2016)
PriBots: Conversational Privacy with Chatbots (at SOUPS 2016)PriBots: Conversational Privacy with Chatbots (at SOUPS 2016)
PriBots: Conversational Privacy with Chatbots (at SOUPS 2016)
 
C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)
C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)
C3P: Context-Aware Crowdsourced Cloud Privacy (at PETS 2014)
 
Penguapan pelarut dan pengeringan
Penguapan pelarut dan pengeringanPenguapan pelarut dan pengeringan
Penguapan pelarut dan pengeringan
 
Present perfect
Present perfectPresent perfect
Present perfect
 
Avon product analysis 2009
Avon product analysis 2009Avon product analysis 2009
Avon product analysis 2009
 
role model entrepreneur
role model entrepreneurrole model entrepreneur
role model entrepreneur
 
Nomenclature
NomenclatureNomenclature
Nomenclature
 
My final mini riset (nesfi)
My final mini riset (nesfi)My final mini riset (nesfi)
My final mini riset (nesfi)
 
Tugas 3 rpp
Tugas 3 rppTugas 3 rpp
Tugas 3 rpp
 
My final mini riset (nesfi)
My final mini riset (nesfi)My final mini riset (nesfi)
My final mini riset (nesfi)
 

Similar to Data Driven Privacy Indicators (at SOUPS 2016)

10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer
aloscocco
 
Big dataimplementation hadoop_and_beyond
Big dataimplementation hadoop_and_beyondBig dataimplementation hadoop_and_beyond
Big dataimplementation hadoop_and_beyond
Patrick Bouillaud
 
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
lorainedeserre
 
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
BHANU281672
 
Transporter Overview - Customer - CurrentSHORT
Transporter Overview - Customer - CurrentSHORTTransporter Overview - Customer - CurrentSHORT
Transporter Overview - Customer - CurrentSHORT
Russell Johnson
 

Similar to Data Driven Privacy Indicators (at SOUPS 2016) (20)

Big Data on Public Cloud
Big Data on Public CloudBig Data on Public Cloud
Big Data on Public Cloud
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer10 cosas que un firewall debería hacer
10 cosas que un firewall debería hacer
 
5 Best Practices to Achieve Operational Excellence with Big Data Apps
5 Best Practices to Achieve Operational Excellence with Big Data Apps5 Best Practices to Achieve Operational Excellence with Big Data Apps
5 Best Practices to Achieve Operational Excellence with Big Data Apps
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 
Lesson 1 introduction to_big_data_and_hadoop.pptx
Lesson 1 introduction to_big_data_and_hadoop.pptxLesson 1 introduction to_big_data_and_hadoop.pptx
Lesson 1 introduction to_big_data_and_hadoop.pptx
 
Big dataimplementation hadoop_and_beyond
Big dataimplementation hadoop_and_beyondBig dataimplementation hadoop_and_beyond
Big dataimplementation hadoop_and_beyond
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
 
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
2Running Head BIG DATA PROCESSING OF SOFTWARE AND TOOLS2BIG.docx
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Transporter Overview - Customer - CurrentSHORT
Transporter Overview - Customer - CurrentSHORTTransporter Overview - Customer - CurrentSHORT
Transporter Overview - Customer - CurrentSHORT
 
big data
big databig data
big data
 
BigData Analytics
BigData AnalyticsBigData Analytics
BigData Analytics
 
Big Data Hadoop using Amazon Elastic MapReduce: Hands-On Labs
Big Data Hadoop using Amazon Elastic MapReduce: Hands-On LabsBig Data Hadoop using Amazon Elastic MapReduce: Hands-On Labs
Big Data Hadoop using Amazon Elastic MapReduce: Hands-On Labs
 
Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1
 
5 Best Practices for Monitoring Hive and MapReduce Application Performance
5 Best Practices for Monitoring Hive and MapReduce Application Performance5 Best Practices for Monitoring Hive and MapReduce Application Performance
5 Best Practices for Monitoring Hive and MapReduce Application Performance
 
XA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within HadoopXA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within Hadoop
 
Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Software Compatibility testing
Software Compatibility testingSoftware Compatibility testing
Software Compatibility testing
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

Data Driven Privacy Indicators (at SOUPS 2016)