Privacy for Mobile Sensing Systems

Jason Hong
Jason HongProfessor at Carnegie Mellon University, Human Computer Interaction
©2018CarnegieMellonUniversity:1
Privacy for
Mobile Sensing Systems
October 21 2020
Jason Hong
@jas0nh0ng
jasonh@cs.cmu.edu
Computer
Human
Interaction:
Mobility
Privacy
Security
©2020CarnegieMellonUniversity:2
In the near future, our
smart devices will know
everything about us
©2020CarnegieMellonUniversity:3
©2020CarnegieMellonUniversity:4
©2020CarnegieMellonUniversity:5
We Are Just Starting to Enter
the Third Wave of Computing
• First Wave: Computation
– Making the basics of computers work
• Second Wave: Networking
– Connecting computers around the world
• Third Wave: Ubiquitous Computing
– Also called Internet of Things (IoT)
– Computation, communication, sensing, and
actuation woven into our everyday physical world
– Possible because of fast wireless networking,
small sensors, better CPUs, vastly decreasing costs
©2020CarnegieMellonUniversity:6
Smartphones Give Us a Glimpse
of this Coming World
• Over 1B smartphones
sold every year
• Penetration rate in Indonesia
~70% (and 90% by 2025)
– Statista 2020
• Incredibly intimate devices
©2020CarnegieMellonUniversity:7
Smartphones are Intimate
Fun Facts about Millennials
• 83% sleep with phones
©2020CarnegieMellonUniversity:8
Smartphones are Intimate
Fun Facts about Millennials
• 83% sleep with phones
• 90% check first thing in morning
©2020CarnegieMellonUniversity:9
Smartphones are Intimate
Fun Facts about Millennials
• 83% sleep with phones
• 90% check first thing in morning
• 1 in 3 use in bathroom
©2020CarnegieMellonUniversity:10
Smartphone Data is Intimate
Who we know
(contacts + call log)
Sensors
(accel, sound, light)
Where we go
(gps, photos)
©2020CarnegieMellonUniversity:11
Using Call Log, SMS, Contacts
©2020CarnegieMellonUniversity:12
Using Call Log, SMS, Contacts
See our CSCW 2015 paper
©2020CarnegieMellonUniversity:13
Sleep Monitor Using Smartphone Data
See our CHI 2014 paper
©2020CarnegieMellonUniversity:14
These Technologies Offer Many Benefits
to Society
• These devices +
artificial intelligence
technologies will allow
us to build amazing
things…
• But only if we can
legitimately address
the privacy concerns
©2020CarnegieMellonUniversity:15
©2020CarnegieMellonUniversity:16
©2020CarnegieMellonUniversity:17
Why Care About Privacy?
People Less Likely to Adopt What We Create
• Pew Research Center survey (2015)
– 60% of people chose not to install an app when they
discovered how much personal info it required
– 43% uninstalled app after downloading it for same
reason
– http://www.pewinternet.org/2015/11/10/apps-permissions-in-the-
google-play-store/
• GSMA study of privacy in Indonesia (2013)
– 80% concerned about apps collecting info w/o consent
– 78% want to know what data will be collected
©2020CarnegieMellonUniversity:18
Why Care About Privacy?
We May Cause Harms to People
• Undesired social obligations
• Spam, identity theft
• Accidentally sharing sensitive information
• Government mass surveillance
• Abusive partners or stalkers
Everyday Risks Extreme Risks
Strangers
_________________________________
Stalking
Personal safety
Employers
_________________________________
Over-monitoring
Discrimination
Reputation
Friends, Family
_________________________________
Over-protection
Social obligations
Embarrassment
Government
__________________________
Civil liberties
©2020CarnegieMellonUniversity:19
Some Design Challenges for Privacy
A Fundamental Tension
• The same data can help as well as harm
(or creep people out) depending on use
©2020CarnegieMellonUniversity:20
Some Design Challenges for Privacy
Very Strong Incentives to Keep Collecting More Data
• “[An analyst at Target] was able to identify about
25 products that… allowed him to assign each
shopper a ‘pregnancy prediction’ score. [H]e
could also estimate her due date to within a small
window, so Target could send coupons timed to
very specific stages of her pregnancy.” (NYTimes)
• Companies: More data -> Better ads and services
• Government: More data -> More national security
©2020CarnegieMellonUniversity:21
Some Design Challenges for Privacy
Physical Safety and Security
• Today’s Ransomware
– Several hospitals in USA have already been locked
out of their computers unless pay a ransom
– As information tech increasingly adopted (and more
kinds of devices), these attacks will expand
• Future: Pay ransom or we will…
– …share all your intimate photos to the world
– …remotely trip circuit breakers at office (lose power)
– …hold citizens of your country virtually hostage
©2020CarnegieMellonUniversity:22
Some Design Challenges for Privacy
Physical Safety and Security
• Nightmare scenarios
– Ex. Crashing autonomous vehicles
– Ex. Injecting fake data into medical devices
©2020CarnegieMellonUniversity:23
Some Design Challenges for Privacy
Scalability
• Billions of devices will need to be secured
• Scale turns easy problems into hard problems
– Ex. Unique passwords for dozens of devices?
– Ex. Security policies, each device having different user
interface (most not having a display and keyboard)?
– Ex. Physically locking down dozens of devices?
– Ex. Installing software updates?
©2020CarnegieMellonUniversity:24
Some Design Challenges for Privacy
Emergent Behaviors
©2020CarnegieMellonUniversity:25
• A six-year-old asked her family’s
Echo “can you play dollhouse with
me and get me a dollhouse?”
• The device complied, ordering a
KidKraft Sparkle mansion
dollhouse, in addition to “four
pounds of sugar cookies.”
©2020CarnegieMellonUniversity:26
• The story ended up on a local
morning show, where the anchor
remarked “I love the little girl,
saying ‘Alexa ordered me a
dollhouse.’”
©2020CarnegieMellonUniversity:27
Some Design Challenges for Privacy
Internationalization
• The vast majority of research and UX design for
privacy is focused on US and Western Europe
– There is relatively little knowledge about how privacy
is the same and how it differs in other contexts
• Examples
– Strong emphasis on individual privacy in the West
(vs family or group)
– Strong emphasis on individual choice
– Strong emphasis on privacy procedures and rules to
comply with regulation
©2020CarnegieMellonUniversity:28
Some Opportunities
What People View as (In)Appropriate
• Especially how it differs from the West
• Specific kinds of data
– Ex. Social media sharing
– Ex. Video and audio recordings in public places
– Ex. Sharing of health and fitness data
• Specific kinds of cases
– Ex. Sharing of COVID contact tracing data
– Ex. Mobile payments (see our CSCW 2020 paper)
– Ex. Behavioral advertising (and ad tracking)
©2020CarnegieMellonUniversity:29
Some Opportunities
Examining Adoption of Technologies
• What influences adoption of tech?
• How can we design systems better so that
they are more likely to be adopted?
• Example systems
– Two factor authentication, password managers
• Example influences
– Romantic partners (see SOUPS 2018 and CSCW 2020)
– Social proof (see our CCS 2014 paper)
©2020CarnegieMellonUniversity:30
Some Opportunities
New Kinds of User Interfaces
• The West has primarily adopted a framework
of notice and consent.
– However, it leads to interfaces like these…
©2020CarnegieMellonUniversity:31
New York Times Privacy Policy
• Still state of the art for privacy notices
• But no one reads these
©2020CarnegieMellonUniversity:32
Some Opportunities
New Kinds of User Interfaces
• The highlighted area on the top-right is how you
can control ad tracking
– Studies suggest vast majority of people unaware,
and have never noticed or clicked
©2020CarnegieMellonUniversity:33
Some Opportunities
New Kinds of User Interfaces
• Addressing scalability
– What devices are in a room? Where are they?
– What can my family / friends see about me (across
all devices and services)?
– Help me manage privacy preferences across all
devices / services
©2020CarnegieMellonUniversity:34
https://www.flickr.com/photos/johnivara/536856713
©2020CarnegieMellonUniversity:35
https://www.flickr.com/photos/johnivara/536856713
How can we create
a connected world we
would all want to live in?
1 of 35

Recommended

Helping Developers with Privacy by
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
16.5K views72 slides
Privacy and Security for the Emerging Internet of Things by
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
20.2K views74 slides
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing by
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
163 views83 slides
Security and Privacy Challenges for IoT by
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoTJason Hong
175 views19 slides
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things by
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
364 views56 slides
The Role of Social Influence In Security Feature Adoption, at CSCW 2015 by
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
501 views36 slides

More Related Content

What's hot

Using Topological Data Analysis to Explore Emergent Consumer Experience from ... by
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Donna Hoffman
785 views22 slides
Consumer Experience in the Internet of Things by
Consumer Experience in the Internet of ThingsConsumer Experience in the Internet of Things
Consumer Experience in the Internet of ThingsDonna Hoffman
832 views40 slides
2024 Future of Communication Technology by
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication TechnologyHolly Baldwin
1.3K views17 slides
Consumer Experience in the Internet of Things: Conceptual Foundations by
Consumer Experience in the Internet of Things: Conceptual FoundationsConsumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual FoundationsDonna Hoffman
638 views39 slides
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus... by
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
352 views5 slides
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ... by
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Dana Gardner
288 views14 slides

What's hot(20)

Using Topological Data Analysis to Explore Emergent Consumer Experience from ... by Donna Hoffman
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Using Topological Data Analysis to Explore Emergent Consumer Experience from ...
Donna Hoffman785 views
Consumer Experience in the Internet of Things by Donna Hoffman
Consumer Experience in the Internet of ThingsConsumer Experience in the Internet of Things
Consumer Experience in the Internet of Things
Donna Hoffman832 views
2024 Future of Communication Technology by Holly Baldwin
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication Technology
Holly Baldwin1.3K views
Consumer Experience in the Internet of Things: Conceptual Foundations by Donna Hoffman
Consumer Experience in the Internet of Things: Conceptual FoundationsConsumer Experience in the Internet of Things: Conceptual Foundations
Consumer Experience in the Internet of Things: Conceptual Foundations
Donna Hoffman638 views
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus... by Lilian Edwards
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
Lilian Edwards352 views
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ... by Dana Gardner
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Dana Gardner288 views
The ethics of cloud and mobile computing for lawyers by Nicole Black
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
Nicole Black597 views
iPractice for Lawyers: Cloud and mobile computing and social media by Nicole Black
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
Nicole Black824 views
The challenge of security awareness by Jisc
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
Jisc1.5K views
"Technology, Ethics, and Social Work" by Tawny Brown
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown2.5K views
Big Data and High Performance Computing by Abzetdin Adamov
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
Abzetdin Adamov171 views
ZION: Security and Internet of Things by Ankam Karthik
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
Ankam Karthik1.1K views
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil... by mkeane
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
mkeane438 views
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms by James Stewart
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsInternet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
James Stewart184 views
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck by e-SIDES.eu
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
e-SIDES.eu46 views
Advanced threat protection and big data by Peter Wood
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood1.3K views
New trends of IoT in 2018 and beyond (SJSU Conference ) by Ahmed Banafa
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
Ahmed Banafa930 views
20090906 On Future Internet, Cloud Computing, and Semantics – You name it by Arian Zwegers
20090906 On Future Internet, Cloud Computing, and Semantics – You name it20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
Arian Zwegers2.6K views

Similar to Privacy for Mobile Sensing Systems

Towards a Responsible Internet of Things by
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of ThingsJeff Katz
242 views41 slides
Building the internet of things with ibm (slideshare) by
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
4.2K views47 slides
ACS Talk (Melbourne) - The future of security by
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
236 views22 slides
WF-IOT-2014, Seoul, Korea, 06 March 2014 by
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
2.8K views20 slides
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015 by
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
333 views27 slides

Similar to Privacy for Mobile Sensing Systems(20)

Towards a Responsible Internet of Things by Jeff Katz
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
Jeff Katz242 views
Building the internet of things with ibm (slideshare) by Bernard Kufluk
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
Bernard Kufluk4.2K views
ACS Talk (Melbourne) - The future of security by siswarren
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
siswarren236 views
WF-IOT-2014, Seoul, Korea, 06 March 2014 by Charith Perera
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
Charith Perera2.8K views
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015 by Jason Hong
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Jason Hong333 views
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security by Pro Mrkt
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Pro Mrkt111 views
Next Generation of the Previously Unthinkable by qmatheson
Next Generation of the Previously UnthinkableNext Generation of the Previously Unthinkable
Next Generation of the Previously Unthinkable
qmatheson723 views
Ethical, Legal and Social issues IoT by Luckeylama
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama1.3K views
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ... by 지훈 서
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
지훈 서114 views
[SLIDES] Internet of Things presentation at AEI (Sept 2014) by Adam Thierer
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer574 views
IoT security and privacy: main challenges and how ISOC-OTA address them by Radouane Mrabet
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet3.1K views
GEC+ 2016: Ainsley Lloyd by Peter Komives
GEC+ 2016: Ainsley LloydGEC+ 2016: Ainsley Lloyd
GEC+ 2016: Ainsley Lloyd
Peter Komives416 views
How Can Policymakers and Regulators Better Engage the Internet of Things? by Mercatus Center
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center757 views

Recently uploaded

Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
113 views18 slides
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
86 views25 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
49 views73 slides
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
138 views8 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
58 views9 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
103 views59 slides

Recently uploaded(20)

Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue86 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue138 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash103 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE67 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue121 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue69 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue149 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson142 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10110 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue75 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive

Privacy for Mobile Sensing Systems

Editor's Notes

  1. I’ve been working on sensor-based systems for about 20 years now I believe in the near future, our smart devices will know pretty much everything about us They are going to know how well we are sleeping, whether we are depressed or not, and how sustainable or green we are You probably have many questions about this simple statement: How did we get here? How do these technologies work? What will this all mean for you and for society? And given the title of my talk, what will this all mean for privacy? Let’s start with the first question, how did we get here?
  2. https://commons.wikimedia.org/wiki/File:Dell_Desktop_Computer_in_school_classroom.jpg About 30 years ago, computers were primarily large boxes that came with a monitor, keyboard, and mouse Emphasis is on large here, really takes up the entire desk You could also only get computers in one color:ugly
  3. Today, computers come in all kinds of form factors Smartphones, tablets, glasses, cars, watches, clothes, fitness trackers, health monitoring devices, parking meters, electronic locks, smart mirrors, drones, and yes, even smart toilets.
  4. All of these smart devices are part of the third big wave of computing. The first wave focused on computation, making the basics of computing work. The second wave centered on networking, connecting all of these computers together in a global network. The third wave, of which we are in the early stages, looks at making computers part of the physical world in which we live. Computation and communication are being embedded into everyday objects. All of this is possible because of shifts in the costs and capabilities of technology.
  5. What will this world be like? Will just focus on smartphones for now, since they are the most pervasive devices we have today Representative of many of the problems and opportunities we will be grappling with in the future Smartphones are everywhere http://marketingland.com/report-us-smartphone-penetration-now-75-percent-117746 http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/ http://www.androidauthority.com/google-play-store-vs-the-apple-app-store-601836/
  6. These devices are also incredibly intimate, perhaps the most intimate computing devices we’ve ever created. From Pew Internet and Cisco 2012 study Main stats on this page are from: http://www.cisco.com/c/en/us/solutions/enterprise/connected-world-technology-report/index.html#~2012 https://www.cisco.com/c/dam/en/us/solutions/enterprise/connected-world-technology-report/2012-CCWTR-Chapter1-Global-Results.pdf Additional stats about mobile phones: http://www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/ ----------------------- What’s also interesting are trends in how people use these smartphones http://blog.sciencecreative.com/2011/03/16/the-authentic-online-marketer/ http://www.generationalinsights.com/millennials-addicted-to-their-smartphones-some-suffer-nomophobia/ In fact, Millennials don’t just sleep with their smartphones. 75% use them in bed before going to sleep and 90% check them again first thing in the morning.  Half use them while eating and third use them in the bathroom. A third check them every half hour. Another fifth check them every ten minutes. A quarter of them check them so frequently that they lose count. http://www.androidtapp.com/how-simple-is-your-smartphone-to-use-funny-videos/ Pew Research Center Around 83 percent of those 18- to 29-year-olds sleep with their cell phones within reach.  http://persquaremile.com/category/suburbia/
  7. From Cisco report
  8. Also from Cisco report
  9. But it’s not just the devices that are intimate, the data is also intimate. Location, call logs, SMS, pics, more
  10. Sleep monitor example
  11. A grand challenge for computer science http://www.flickr.com/photos/robby_van_moor/478725670/
  12. Every week, we’re seeing more and more news articles like these
  13. http://www.pewinternet.org/2015/11/10/apps-permissions-in-the-google-play-store/ https://www.gsma.com/publicpolicy/wp-content/uploads/2013/08/Research_into_mobile_users_privacy_attitudes-Key_findings_from_Malaysia_and_Indonesia-FINAL.pdf
  14. Girls Around Me used foursquare checkin data and profile data to see who (women) was nearby Same data, different context, very different reactions
  15. What kinds of safeguards for physical safety? Can we build models of normal vs abnormal behaviors for devices and apps, and enforce?
  16. What kinds of network protocols, APIs, and middleware to help manage IoT devices at scale? The sheer number of these devices will make what would ordinarily be trivial tasks into significant challenges. For example, configuring a security policy for a single device is tractable. Configuring a security policy for hundreds of devices, each of which has a different user interface, is not. Similarly, it is easy to have unique passwords for a few devices, but less so for a house or building full of devices, many of which do not even have keyboard input or displays. It is also easy to physically lock down a few computers to prevent them from being stolen, but it is very difficult to do the same for large numbers of IoT devices. Even worse, many of these IoT devices can be easily lost or stolen due to their small size, or even tampered with to send back fake data.
  17. Image from wired.com A friend told me that a person once annoyed a bunch of people wearing Google Glass by shouting out “Ok Glass, take a picture,” causing everyone’s wearable to take a picture.
  18. What kinds of network protocols, APIs, and middleware to help manage IoT devices at scale? The sheer number of these devices will make what would ordinarily be trivial tasks into significant challenges. For example, configuring a security policy for a single device is tractable. Configuring a security policy for hundreds of devices, each of which has a different user interface, is not. Similarly, it is easy to have unique passwords for a few devices, but less so for a house or building full of devices, many of which do not even have keyboard input or displays. It is also easy to physically lock down a few computers to prevent them from being stolen, but it is very difficult to do the same for large numbers of IoT devices. Even worse, many of these IoT devices can be easily lost or stolen due to their small size, or even tampered with to send back fake data.
  19. Grade 12.5 About 10 min to read So based on Lorrie and Aleecia’s work, it will take 25 full days to read all privacy policies of all web sites But this assumes people read it Rationale behavior not to read privacy policies: we want to use the service, painful to read, clear cost but unclear benefit
  20. https://www.flickr.com/photos/johnivara/536856713 https://creativecommons.org/licenses/by-nc-nd/2.0/ I want to wrap up by taking a big step back and looking at the big picture. Today, we are at a crossroads. There is only one time in human history when a global network of computers is created, and that time is now. And there is only one time in human history when computation, communication, and sensing is woven into our everyday world, and that time is now. We’re already in the early stages of IoT. And it will offer tremendous benefits to society in terms of safety, sustainability, transportation, health care, and more, but only if we can address the real privacy problems that these same technologies pose. So I’ll end with a question for you to consider:
  21. https://www.flickr.com/photos/johnivara/536856713 https://creativecommons.org/licenses/by-nc-nd/2.0/ Today, we are at a crossroads. There is only one time in human history when a global network of computers is created, and that time is now. And there is only one time in human history when computation, communication, and sensing is woven into our everyday world, and that time is now. Now, I’ve avoided using the term Internet of Things because as you may remember from yesterday, I don’t really like the term. But regardless of what it’s called, it’s coming, and coming soon. And it will offer tremendous benefits to society in terms of safety, sustainability, transportation, health care, and more, but only if we can address the real privacy problems that these same technologies pose. So I’ll end with a question for you to consider: