SlideShare a Scribd company logo
Privacy Issues in Smart Living
Dr. Arpan Pal
Principal Scientist and Research Head
Innovation Lab, Kolkata
Tata Consultancy Services Ltd.
IEEE Sr. Member
Associate Editor, IEEE and ACM Transactions
B.Tech, M.Tech and Ph.D. in Electronics and Telecommunication
January 24, 2014
The Holy Grail of Privacy
Data that is both contextually useful as well as forever privacy preserving
• Privacy agreements are ok for legalities sake – but does the average user
understand it?
https://www.privacyrights.org/fs/fs2b-cellprivacy.htm
• Main issue – Is the data I am giving out is worth the Utility I am getting?
PrivacyUtility
Smart Energy Meters – Utility
 Accurate billing
 Tailored energy efficiency advice – based on accurate data
specific to your home
 Understand how much appliances are costing you and check
if things are working properly
 More control over how much energy you’re using
 Efficient peak-load management and Demand-response
http://www.efoodsdirect.com
Source: www.winlab.rutgers.edu/~gruteser/papers/fp023-roufPS.pdf
Smart Energy Meters – Privacy Issues
 Could indicate your pattern of living and what you are doing
in your own home
 Bad guy knows when you're not at home and burgles your
house, or worse, he knows when only one old woman is at
home and breaks in
 User Profiling
Occupancy / Footfall Detection – Utility
Energy consumption and carbon footprint can be reduced by
using energy judiciously
• Occupancy and footfall give important feedback parameters for
energy management in public places
• When person is at Home, room-level occupancy can be used to
reduce energy footprint via automatic on-off switches
• At Office, zone/area level occupancy and presence can provide cues
to energy management like lighting, heating and cooling
• In hospitals, zone level occupancy can provide input for running
cooling / heating equipment.
http://www.lumenergize.com/
http://pixgood.com/
http://liveinnovations.com.auhttp://www.commlab.unimo.it
Occupancy Detection – Privacy Issues
 Home occupancy data can reveal pattern of living / activity /
absence at Home
 Location data at Malls can reveal shopping behavior pattern
 Recent MIT study showed that 4 spatio-temporal points,
approximate places and times, are enough to uniquely
identify 95% of 1.5M people in a mobility database
De Montjoye, Yves-Alexandre; César A. Hidalgo; Michel Verleysen; Vincent D. Blondel (March 25, 2013). "Unique in the Crowd:
The privacy bounds of human mobility". Nature srep.
Palmer, Jason (March 25, 2013). "Mobile location data 'present anonymity risk'". BBC News
http://www.etihad.com
Even Sleeping Smartphones Could Soon Hear Spoken Commands
Nuance is working with chipmakers on technology that would enable
“persistent listening” apps.
http://www.technologyreview.com/news/429316/even-sleeping-smartphones-could-soon-hear-spoken-
commands/
MIT Technology Review, Sept. 2012
Smartphone Malware Designed to Steal Your Life
The US Naval Surface Warfare Center has created
an Android app that secretly records your
environment and reconstructs it as a 3D virtual model
http://www.technologyreview.com/view/429394/placeraider-the-military-
smartphone-malware-designed-to-steal-your-life/
MIT Technology Review, Sept. 2012
Vehicle Trip Overlay Over a Year reveals your
hub locations (home, office??)
Source: https://www.aclu.org/technology-and-liberty/meet-jack-or-what-
government-could-do-all-location-data
Privacy Breach in other IoT Applications
Source: http://techcrunch.com/2014/11/13/u-s-authorities-are-reportedly-gathering-phone-data-using-fake-celltowers-on-planes/
What happens if this gathered data is leaked?
Big Brother Watching
Information-centric Approach
 Need something more than
anonymization and on-off control
 Hybrid approach using K-
Anonymity and Differential
Privacy – selective masking /
obfuscation of data
 Information Theoretic Smart
Privacy Analyzer (SPA)
 Statistical Processing based
Outlier Detection to identify
Sensitive data
 Information-theoretic privacy
measure
 Adaptation for differential
privacy possible using
variable sampling rate or
obfuscation or randomization
Arijit Ukil et. al., BuildSys 2014 Demo
Some Results
Publications in Infocomm, Buildys and ICC
Points to Ponder
• How to quantify utility and privacy
• Privacy control at user hand
Thank You
arpan.pal@tcs.com

More Related Content

What's hot

Intelligent Virtual Assistants - The Good, Bad, and Ugly
Intelligent Virtual Assistants - The Good, Bad, and UglyIntelligent Virtual Assistants - The Good, Bad, and Ugly
Intelligent Virtual Assistants - The Good, Bad, and Ugly
Olivera Kotevska, Ph.D.
 
IoT
IoTIoT
IoT
Mphasis
 
Role of it in Environment and Human health
Role of it in Environment and Human healthRole of it in Environment and Human health
Role of it in Environment and Human health
Rajat Cool
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Kelly Zhang
 
Ai introduction ppt
Ai introduction pptAi introduction ppt
Ai introduction ppt
Lavanya Sharma
 
Role of IT in environment & Human Health
Role of IT in environment & Human HealthRole of IT in environment & Human Health
Role of IT in environment & Human Health
Tanvi Potluri
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Nature Locator
Nature LocatorNature Locator
Nature Locator
Simon Price
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Amit Sheth
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big Data
Robert Sutor
 
The Social Side of Mobile Health
The Social Side of Mobile HealthThe Social Side of Mobile Health
The Social Side of Mobile Health
Daniel Hooker
 
2020 sd college- internet of everyhing
2020 sd college- internet of everyhing2020 sd college- internet of everyhing
2020 sd college- internet of everyhing
Surkhab Shelly
 
Ioe module 1
Ioe module 1Ioe module 1
Ioe module 1
nikshaikh786
 
Evaluating a Potential Commercial Tool for Healthcare Application for People ...
Evaluating a Potential Commercial Tool for Healthcare Application for People ...Evaluating a Potential Commercial Tool for Healthcare Application for People ...
Evaluating a Potential Commercial Tool for Healthcare Application for People ...
Artificial Intelligence Institute at UofSC
 
Role of IT in environmental and human health
Role of IT in environmental and human healthRole of IT in environmental and human health
Role of IT in environmental and human health
MahaAmanAli
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World Speaks
Simplify360
 
Role of IT in environment
Role of IT in environmentRole of IT in environment
Role of IT in environment
MasoomTulsiani
 

What's hot (19)

Intelligent Virtual Assistants - The Good, Bad, and Ugly
Intelligent Virtual Assistants - The Good, Bad, and UglyIntelligent Virtual Assistants - The Good, Bad, and Ugly
Intelligent Virtual Assistants - The Good, Bad, and Ugly
 
IoT
IoTIoT
IoT
 
Role of it in Environment and Human health
Role of it in Environment and Human healthRole of it in Environment and Human health
Role of it in Environment and Human health
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ai introduction ppt
Ai introduction pptAi introduction ppt
Ai introduction ppt
 
Role of IT in environment & Human Health
Role of IT in environment & Human HealthRole of IT in environment & Human Health
Role of IT in environment & Human Health
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Nature Locator
Nature LocatorNature Locator
Nature Locator
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big Data
 
The Social Side of Mobile Health
The Social Side of Mobile HealthThe Social Side of Mobile Health
The Social Side of Mobile Health
 
2020 sd college- internet of everyhing
2020 sd college- internet of everyhing2020 sd college- internet of everyhing
2020 sd college- internet of everyhing
 
Ioe module 1
Ioe module 1Ioe module 1
Ioe module 1
 
Evaluating a Potential Commercial Tool for Healthcare Application for People ...
Evaluating a Potential Commercial Tool for Healthcare Application for People ...Evaluating a Potential Commercial Tool for Healthcare Application for People ...
Evaluating a Potential Commercial Tool for Healthcare Application for People ...
 
Role of IT in environmental and human health
Role of IT in environmental and human healthRole of IT in environmental and human health
Role of IT in environmental and human health
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World Speaks
 
Role of IT in environment
Role of IT in environmentRole of IT in environment
Role of IT in environment
 

Similar to Intelect ppt arpanpal_security

The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
PayamBarnaghi
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) ppt
AhibaPathan
 
Closing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen ActuationClosing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen Actuation
David Crowley
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 
p9-riliskis
p9-riliskisp9-riliskis
p9-riliskis
Laurynas Riliskis
 
The Edge Group Quito Lima - july 2014
The Edge Group   Quito Lima - july 2014The Edge Group   Quito Lima - july 2014
The Edge Group Quito Lima - july 2014
Jose A Torres
 
Big data
Big dataBig data
Big data
Cisco
 
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
Mikko Ahonen
 
Data Analytics Project proposal: Smart home based ambient assisted living - D...
Data Analytics Project proposal: Smart home based ambient assisted living - D...Data Analytics Project proposal: Smart home based ambient assisted living - D...
Data Analytics Project proposal: Smart home based ambient assisted living - D...
Tarun Swarup
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
Ahmad Atef Al-Shoubaki
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Where is the internet taking us?
Where is the internet taking us?Where is the internet taking us?
Where is the internet taking us?
Michael Coghlan
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future Directions
HHS Digital
 
Creating self-aware and smart healthy cities
Creating self-aware and smart healthy citiesCreating self-aware and smart healthy cities
Creating self-aware and smart healthy cities
Maged N. Kamel Boulos
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
PayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
CityPulse Project
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
Christopher P. Williams
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
suherashaik2003
 
Iot new
Iot newIot new

Similar to Intelect ppt arpanpal_security (20)

The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) ppt
 
Closing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen ActuationClosing the Loop - From Citizen Sensing to Citizen Actuation
Closing the Loop - From Citizen Sensing to Citizen Actuation
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
p9-riliskis
p9-riliskisp9-riliskis
p9-riliskis
 
The Edge Group Quito Lima - july 2014
The Edge Group   Quito Lima - july 2014The Edge Group   Quito Lima - july 2014
The Edge Group Quito Lima - july 2014
 
Big data
Big dataBig data
Big data
 
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
Sources of Innovative Opportunity and Mass-Customization – An Analysis of ...
 
Data Analytics Project proposal: Smart home based ambient assisted living - D...
Data Analytics Project proposal: Smart home based ambient assisted living - D...Data Analytics Project proposal: Smart home based ambient assisted living - D...
Data Analytics Project proposal: Smart home based ambient assisted living - D...
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Where is the internet taking us?
Where is the internet taking us?Where is the internet taking us?
Where is the internet taking us?
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future Directions
 
Creating self-aware and smart healthy cities
Creating self-aware and smart healthy citiesCreating self-aware and smart healthy cities
Creating self-aware and smart healthy cities
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
Iot new
Iot newIot new
Iot new
 

More from Arpan Pal

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
Arpan Pal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
Arpan Pal
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
Arpan Pal
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
Arpan Pal
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
Arpan Pal
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
Arpan Pal
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
Arpan Pal
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
Arpan Pal
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
Arpan Pal
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
Arpan Pal
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
Arpan Pal
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
Arpan Pal
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
Arpan Pal
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
Arpan Pal
 
Embedded
EmbeddedEmbedded
Embedded
Arpan Pal
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
Arpan Pal
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
Arpan Pal
 
Generic mac
Generic macGeneric mac
Generic mac
Arpan Pal
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
Arpan Pal
 

More from Arpan Pal (20)

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
 
Embedded
EmbeddedEmbedded
Embedded
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
 
Generic mac
Generic macGeneric mac
Generic mac
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Intelect ppt arpanpal_security

  • 1. Privacy Issues in Smart Living Dr. Arpan Pal Principal Scientist and Research Head Innovation Lab, Kolkata Tata Consultancy Services Ltd. IEEE Sr. Member Associate Editor, IEEE and ACM Transactions B.Tech, M.Tech and Ph.D. in Electronics and Telecommunication January 24, 2014
  • 2. The Holy Grail of Privacy Data that is both contextually useful as well as forever privacy preserving • Privacy agreements are ok for legalities sake – but does the average user understand it? https://www.privacyrights.org/fs/fs2b-cellprivacy.htm • Main issue – Is the data I am giving out is worth the Utility I am getting? PrivacyUtility
  • 3. Smart Energy Meters – Utility  Accurate billing  Tailored energy efficiency advice – based on accurate data specific to your home  Understand how much appliances are costing you and check if things are working properly  More control over how much energy you’re using  Efficient peak-load management and Demand-response http://www.efoodsdirect.com
  • 4. Source: www.winlab.rutgers.edu/~gruteser/papers/fp023-roufPS.pdf Smart Energy Meters – Privacy Issues  Could indicate your pattern of living and what you are doing in your own home  Bad guy knows when you're not at home and burgles your house, or worse, he knows when only one old woman is at home and breaks in  User Profiling
  • 5. Occupancy / Footfall Detection – Utility Energy consumption and carbon footprint can be reduced by using energy judiciously • Occupancy and footfall give important feedback parameters for energy management in public places • When person is at Home, room-level occupancy can be used to reduce energy footprint via automatic on-off switches • At Office, zone/area level occupancy and presence can provide cues to energy management like lighting, heating and cooling • In hospitals, zone level occupancy can provide input for running cooling / heating equipment. http://www.lumenergize.com/ http://pixgood.com/ http://liveinnovations.com.auhttp://www.commlab.unimo.it
  • 6. Occupancy Detection – Privacy Issues  Home occupancy data can reveal pattern of living / activity / absence at Home  Location data at Malls can reveal shopping behavior pattern  Recent MIT study showed that 4 spatio-temporal points, approximate places and times, are enough to uniquely identify 95% of 1.5M people in a mobility database De Montjoye, Yves-Alexandre; César A. Hidalgo; Michel Verleysen; Vincent D. Blondel (March 25, 2013). "Unique in the Crowd: The privacy bounds of human mobility". Nature srep. Palmer, Jason (March 25, 2013). "Mobile location data 'present anonymity risk'". BBC News http://www.etihad.com
  • 7. Even Sleeping Smartphones Could Soon Hear Spoken Commands Nuance is working with chipmakers on technology that would enable “persistent listening” apps. http://www.technologyreview.com/news/429316/even-sleeping-smartphones-could-soon-hear-spoken- commands/ MIT Technology Review, Sept. 2012 Smartphone Malware Designed to Steal Your Life The US Naval Surface Warfare Center has created an Android app that secretly records your environment and reconstructs it as a 3D virtual model http://www.technologyreview.com/view/429394/placeraider-the-military- smartphone-malware-designed-to-steal-your-life/ MIT Technology Review, Sept. 2012 Vehicle Trip Overlay Over a Year reveals your hub locations (home, office??) Source: https://www.aclu.org/technology-and-liberty/meet-jack-or-what- government-could-do-all-location-data Privacy Breach in other IoT Applications
  • 9. Information-centric Approach  Need something more than anonymization and on-off control  Hybrid approach using K- Anonymity and Differential Privacy – selective masking / obfuscation of data  Information Theoretic Smart Privacy Analyzer (SPA)  Statistical Processing based Outlier Detection to identify Sensitive data  Information-theoretic privacy measure  Adaptation for differential privacy possible using variable sampling rate or obfuscation or randomization Arijit Ukil et. al., BuildSys 2014 Demo
  • 10. Some Results Publications in Infocomm, Buildys and ICC
  • 11. Points to Ponder • How to quantify utility and privacy • Privacy control at user hand Thank You arpan.pal@tcs.com