SlideShare a Scribd company logo
1 of 23
Ubiquitous Computing:
Privacy Issues
Hongseok Kim
November 19, 2003
SI 668
Overview
• Basics of Ubiquitous Computing
• Context Awareness
• Privacy Issues
• Policy Principles and Guidelines
Ubiquitous Computing Vision
• Mark Weiser (1952~1999), XEROX PARC
– Coined the term, “ubiquitous computing”, in 1988
– Seminal Article: “The Computer for the 21st
Century,”
Scientific American (Sep. 1991)
“The most profound technologies are
those that disappear. They weave
themselves into the fabric of everyday
life until they are indistinguishable
from it.”
Inverted Paradigm
• “Computer in the world (embodied virtuality)”
instead of “World in the computer (virtual
reality)”
• Small, lightweight, and cheap processors
embedded in everyday objects
Smart Objects
• Enrich real world objects with information
processing capabilities
– Embedded Processors and Memory
can remember pertinent events!
– Wireless Communications
communicate with their environment
– Sensors
responsive
context-sensitive or context-aware behavior
Context Awareness
• Context awareness
– A ubiquitous computing system must be cognizant of
its user’s state and surroundings, and must modify
its behavior according to the cognizance.
• A user’s context can be:
– Physical location
– Physiological state (e.g., body temperature and heart
rate)
– Emotional state (e.g., angry, distraught, and calm)
– Personal history
– Daily behavioral patterns
An Example of a Smart Object
• MediaCup@TecO
– augmented with
sensing, processing
and communication
capabilities (integrated
in the cup's bottom), to
collect and
communicate general
context information in
a given environment
Networked with Other Smart Objects
ANOTHER BEER,
PLEASE, HAL…
I’M SORRY, DAVE.
I CAN’T DO THAT.
THE BATHROOM SCALE
AND THE HALL MIRROR
ARE REPORTING
DISTURBING
FLAB ANOMALIES.
Smart Clothing
• Conductive textiles and inks
– Print electrically active patterns
directly onto fabrics
• Sensors based on fabric
– e.g., monitor pulse, blood
pressure, body temperature
• Invisible collar microphones
and Integrated small cameras
• Youth clothing
– Game console on the sleeves?
– Integrated GPS-driven locators
Privacy Issues?
Context Awareness Revisited
• Xerox Parc’s automatic phone-call routing
experiment
• A federal office described in Neal Stephenson’s
“Snow Crash”
Privacy Implications of
UbiComp
• What is it that makes ubiquitous computing any
different from other computer science domains
with respect to privacy?
• Why should scientists and engineers in this
particular domain be any more concerned with
such vague notions of liberty, freedom, and
privacy?
Privacy Implications, cont’d.
• Ubiquitous devices are ideally suited for covert
operation and illegal surveillance.
• Information provided by many sensors to
acquire knowledge about the context; these
sensors can be invisible to users.
• The sensors, gathering information about people
without being noticed, can be a threat to
privacy.
Privacy Challenges (1)
• Privacy is already a concern with the WWW
• Much more dramatic in a ubiquitous computing
environment
– Unlimited coverage (sensors everywhere)
– Loss of awareness (invisible computing)
– New types of data (location, health, habits, …)
– More knowledge though context
– Anonymity hard to achieve
– Difficulty in explicit notice or consent by user
Privacy Challenges (2)
• Privacy is greatly complicated by ubiquitous
computing.
– Mechanisms such as location tracking, smart spaces,
and use of surrogates monitor user actions on an
almost continuous basis.
– As a user becomes more dependent on a ubiquitous
computing system, the system becomes more
knowledgeable about that user’s movements,
behavior patterns and habits.
Six Guiding Principles
• Marc Langheinrich, “Privacy by Design: Principles
of Privacy-Aware Ubiquitous Systems,” in the
proceedings of Ubicomp 2001.
– Notice
– Choice and Consent
– Anonymity and Pseudonymity
– Proximity and Locality
– Adequate Security
– Access and Recourse
Notice (Openness)
• The subject whose information is collected must
be notified.
• Environment where it is often difficult for data
subjects to realize that data collection is actually
taking place
• Necessary to have not only mechanisms to
declare collection practices (i.e., privacy
policies), but also efficient ways to communicate
these to the user (i.e., policy announcement).
Choice and Consent
• It is necessary to get explicit consent of the
subject by means of digital or handwriting
signature.
• How can we offer customers many choices of
security and get their consent?
• In order to give users a true choice, we need to
provide a selection mechanism (i.e., privacy
agreements) so that users can indicate which
services they prefer.
Anonymity and Pseudonymity
• An important option when offering clients a
number of choices.
– But, it is not easy to get anonymity in ubiquitous
environment because sensors will easily disclose the
real identity.
• Pseudonymity is an alternative that allows for a
more fine grained control of anonymity in
ubiquitous environments.
Proximity and Locality
• A user can benefit from information gathered
only within a particular area. Information value
decreases when distance increases.
• The system should support mechanisms to
encode and use locality information for collected
data that can enforce access restrictions based
on the location of the person wanting to use the
data.
Adequate Security
• It is not necessary to increase the security level to
an extent when it is not worth the intrusion.
• We need to employ robust security features only
in situations with highly sensitive data transfer
– financial transactions
– transfer of medical information
Access and Recourse
• Needs to provide a way for users to access their
personal information in a simple way through
standardized interfaces (i.e., data access).
• Users should be informed about the usage of
their data once it is stored, similar to call-lists
that are often part of monthly phone bills (i.e.,
usage logs).
Privacy in Ubiquitous
Computing
• Privacy is possible in ubiquitous computing
environment.
– Let people know about collections
– Let people query, update, delete their own data
– Let people know about each usage
• Solutions need not be perfect to be useful
– Trusting fair information practices
– Trusting collectors to keep their promises
– Trusting the legal system
Conclusions
• We are not trying to achieve total security, let
alone total privacy!
• What should be within our reach is achieving a
good balance of convenience and control when
interacting with ubiquitous, invisible devices
and infrastructures.
• We can begin by designing ubiquitous systems
for privacy in the initial stages, not after
implementation.

More Related Content

What's hot

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
Rupsee
 
context aware computing
context aware computingcontext aware computing
context aware computing
swati sonawane
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
 
Distributed document based system
Distributed document based systemDistributed document based system
Distributed document based system
Chetan Selukar
 

What's hot (20)

4. system models
4. system models4. system models
4. system models
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Unit 1
Unit 1Unit 1
Unit 1
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Distributed document based system
Distributed document based systemDistributed document based system
Distributed document based system
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
On demand provisioning
On demand provisioningOn demand provisioning
On demand provisioning
 
Scalability and fault tolerance
Scalability and fault toleranceScalability and fault tolerance
Scalability and fault tolerance
 
Distributed System
Distributed SystemDistributed System
Distributed System
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 

Viewers also liked

Viewers also liked (8)

The future of wireless innovation - more than just software
The future of wireless innovation - more than just softwareThe future of wireless innovation - more than just software
The future of wireless innovation - more than just software
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Hostel management
Hostel managementHostel management
Hostel management
 
Hostel management
Hostel managementHostel management
Hostel management
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Ubiquitous Computing: Privacy Issues

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
BeniamTekeste
 
Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...
Diego López-de-Ipiña González-de-Artaza
 

Similar to Ubiquitous Computing: Privacy Issues (20)

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
CN presentation
CN presentationCN presentation
CN presentation
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
Web of Things
Web of ThingsWeb of Things
Web of Things
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Ubiquitous Computing: Privacy Issues

  • 1. Ubiquitous Computing: Privacy Issues Hongseok Kim November 19, 2003 SI 668
  • 2. Overview • Basics of Ubiquitous Computing • Context Awareness • Privacy Issues • Policy Principles and Guidelines
  • 3. Ubiquitous Computing Vision • Mark Weiser (1952~1999), XEROX PARC – Coined the term, “ubiquitous computing”, in 1988 – Seminal Article: “The Computer for the 21st Century,” Scientific American (Sep. 1991) “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.”
  • 4. Inverted Paradigm • “Computer in the world (embodied virtuality)” instead of “World in the computer (virtual reality)” • Small, lightweight, and cheap processors embedded in everyday objects
  • 5. Smart Objects • Enrich real world objects with information processing capabilities – Embedded Processors and Memory can remember pertinent events! – Wireless Communications communicate with their environment – Sensors responsive context-sensitive or context-aware behavior
  • 6. Context Awareness • Context awareness – A ubiquitous computing system must be cognizant of its user’s state and surroundings, and must modify its behavior according to the cognizance. • A user’s context can be: – Physical location – Physiological state (e.g., body temperature and heart rate) – Emotional state (e.g., angry, distraught, and calm) – Personal history – Daily behavioral patterns
  • 7. An Example of a Smart Object • MediaCup@TecO – augmented with sensing, processing and communication capabilities (integrated in the cup's bottom), to collect and communicate general context information in a given environment
  • 8. Networked with Other Smart Objects ANOTHER BEER, PLEASE, HAL… I’M SORRY, DAVE. I CAN’T DO THAT. THE BATHROOM SCALE AND THE HALL MIRROR ARE REPORTING DISTURBING FLAB ANOMALIES.
  • 9. Smart Clothing • Conductive textiles and inks – Print electrically active patterns directly onto fabrics • Sensors based on fabric – e.g., monitor pulse, blood pressure, body temperature • Invisible collar microphones and Integrated small cameras • Youth clothing – Game console on the sleeves? – Integrated GPS-driven locators Privacy Issues?
  • 10. Context Awareness Revisited • Xerox Parc’s automatic phone-call routing experiment • A federal office described in Neal Stephenson’s “Snow Crash”
  • 11. Privacy Implications of UbiComp • What is it that makes ubiquitous computing any different from other computer science domains with respect to privacy? • Why should scientists and engineers in this particular domain be any more concerned with such vague notions of liberty, freedom, and privacy?
  • 12. Privacy Implications, cont’d. • Ubiquitous devices are ideally suited for covert operation and illegal surveillance. • Information provided by many sensors to acquire knowledge about the context; these sensors can be invisible to users. • The sensors, gathering information about people without being noticed, can be a threat to privacy.
  • 13. Privacy Challenges (1) • Privacy is already a concern with the WWW • Much more dramatic in a ubiquitous computing environment – Unlimited coverage (sensors everywhere) – Loss of awareness (invisible computing) – New types of data (location, health, habits, …) – More knowledge though context – Anonymity hard to achieve – Difficulty in explicit notice or consent by user
  • 14. Privacy Challenges (2) • Privacy is greatly complicated by ubiquitous computing. – Mechanisms such as location tracking, smart spaces, and use of surrogates monitor user actions on an almost continuous basis. – As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.
  • 15. Six Guiding Principles • Marc Langheinrich, “Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems,” in the proceedings of Ubicomp 2001. – Notice – Choice and Consent – Anonymity and Pseudonymity – Proximity and Locality – Adequate Security – Access and Recourse
  • 16. Notice (Openness) • The subject whose information is collected must be notified. • Environment where it is often difficult for data subjects to realize that data collection is actually taking place • Necessary to have not only mechanisms to declare collection practices (i.e., privacy policies), but also efficient ways to communicate these to the user (i.e., policy announcement).
  • 17. Choice and Consent • It is necessary to get explicit consent of the subject by means of digital or handwriting signature. • How can we offer customers many choices of security and get their consent? • In order to give users a true choice, we need to provide a selection mechanism (i.e., privacy agreements) so that users can indicate which services they prefer.
  • 18. Anonymity and Pseudonymity • An important option when offering clients a number of choices. – But, it is not easy to get anonymity in ubiquitous environment because sensors will easily disclose the real identity. • Pseudonymity is an alternative that allows for a more fine grained control of anonymity in ubiquitous environments.
  • 19. Proximity and Locality • A user can benefit from information gathered only within a particular area. Information value decreases when distance increases. • The system should support mechanisms to encode and use locality information for collected data that can enforce access restrictions based on the location of the person wanting to use the data.
  • 20. Adequate Security • It is not necessary to increase the security level to an extent when it is not worth the intrusion. • We need to employ robust security features only in situations with highly sensitive data transfer – financial transactions – transfer of medical information
  • 21. Access and Recourse • Needs to provide a way for users to access their personal information in a simple way through standardized interfaces (i.e., data access). • Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e., usage logs).
  • 22. Privacy in Ubiquitous Computing • Privacy is possible in ubiquitous computing environment. – Let people know about collections – Let people query, update, delete their own data – Let people know about each usage • Solutions need not be perfect to be useful – Trusting fair information practices – Trusting collectors to keep their promises – Trusting the legal system
  • 23. Conclusions • We are not trying to achieve total security, let alone total privacy! • What should be within our reach is achieving a good balance of convenience and control when interacting with ubiquitous, invisible devices and infrastructures. • We can begin by designing ubiquitous systems for privacy in the initial stages, not after implementation.