SlideShare a Scribd company logo
Ubiquitous Computing:
Privacy Issues
Hongseok Kim
November 19, 2003
SI 668
Overview
• Basics of Ubiquitous Computing
• Context Awareness
• Privacy Issues
• Policy Principles and Guidelines
Ubiquitous Computing Vision
• Mark Weiser (1952~1999), XEROX PARC
– Coined the term, “ubiquitous computing”, in 1988
– Seminal Article: “The Computer for the 21st
Century,”
Scientific American (Sep. 1991)
“The most profound technologies are
those that disappear. They weave
themselves into the fabric of everyday
life until they are indistinguishable
from it.”
Inverted Paradigm
• “Computer in the world (embodied virtuality)”
instead of “World in the computer (virtual
reality)”
• Small, lightweight, and cheap processors
embedded in everyday objects
Smart Objects
• Enrich real world objects with information
processing capabilities
– Embedded Processors and Memory
can remember pertinent events!
– Wireless Communications
communicate with their environment
– Sensors
responsive
context-sensitive or context-aware behavior
Context Awareness
• Context awareness
– A ubiquitous computing system must be cognizant of
its user’s state and surroundings, and must modify
its behavior according to the cognizance.
• A user’s context can be:
– Physical location
– Physiological state (e.g., body temperature and heart
rate)
– Emotional state (e.g., angry, distraught, and calm)
– Personal history
– Daily behavioral patterns
An Example of a Smart Object
• MediaCup@TecO
– augmented with
sensing, processing
and communication
capabilities (integrated
in the cup's bottom), to
collect and
communicate general
context information in
a given environment
Networked with Other Smart Objects
ANOTHER BEER,
PLEASE, HAL…
I’M SORRY, DAVE.
I CAN’T DO THAT.
THE BATHROOM SCALE
AND THE HALL MIRROR
ARE REPORTING
DISTURBING
FLAB ANOMALIES.
Smart Clothing
• Conductive textiles and inks
– Print electrically active patterns
directly onto fabrics
• Sensors based on fabric
– e.g., monitor pulse, blood
pressure, body temperature
• Invisible collar microphones
and Integrated small cameras
• Youth clothing
– Game console on the sleeves?
– Integrated GPS-driven locators
Privacy Issues?
Context Awareness Revisited
• Xerox Parc’s automatic phone-call routing
experiment
• A federal office described in Neal Stephenson’s
“Snow Crash”
Privacy Implications of
UbiComp
• What is it that makes ubiquitous computing any
different from other computer science domains
with respect to privacy?
• Why should scientists and engineers in this
particular domain be any more concerned with
such vague notions of liberty, freedom, and
privacy?
Privacy Implications, cont’d.
• Ubiquitous devices are ideally suited for covert
operation and illegal surveillance.
• Information provided by many sensors to
acquire knowledge about the context; these
sensors can be invisible to users.
• The sensors, gathering information about people
without being noticed, can be a threat to
privacy.
Privacy Challenges (1)
• Privacy is already a concern with the WWW
• Much more dramatic in a ubiquitous computing
environment
– Unlimited coverage (sensors everywhere)
– Loss of awareness (invisible computing)
– New types of data (location, health, habits, …)
– More knowledge though context
– Anonymity hard to achieve
– Difficulty in explicit notice or consent by user
Privacy Challenges (2)
• Privacy is greatly complicated by ubiquitous
computing.
– Mechanisms such as location tracking, smart spaces,
and use of surrogates monitor user actions on an
almost continuous basis.
– As a user becomes more dependent on a ubiquitous
computing system, the system becomes more
knowledgeable about that user’s movements,
behavior patterns and habits.
Six Guiding Principles
• Marc Langheinrich, “Privacy by Design: Principles
of Privacy-Aware Ubiquitous Systems,” in the
proceedings of Ubicomp 2001.
– Notice
– Choice and Consent
– Anonymity and Pseudonymity
– Proximity and Locality
– Adequate Security
– Access and Recourse
Notice (Openness)
• The subject whose information is collected must
be notified.
• Environment where it is often difficult for data
subjects to realize that data collection is actually
taking place
• Necessary to have not only mechanisms to
declare collection practices (i.e., privacy
policies), but also efficient ways to communicate
these to the user (i.e., policy announcement).
Choice and Consent
• It is necessary to get explicit consent of the
subject by means of digital or handwriting
signature.
• How can we offer customers many choices of
security and get their consent?
• In order to give users a true choice, we need to
provide a selection mechanism (i.e., privacy
agreements) so that users can indicate which
services they prefer.
Anonymity and Pseudonymity
• An important option when offering clients a
number of choices.
– But, it is not easy to get anonymity in ubiquitous
environment because sensors will easily disclose the
real identity.
• Pseudonymity is an alternative that allows for a
more fine grained control of anonymity in
ubiquitous environments.
Proximity and Locality
• A user can benefit from information gathered
only within a particular area. Information value
decreases when distance increases.
• The system should support mechanisms to
encode and use locality information for collected
data that can enforce access restrictions based
on the location of the person wanting to use the
data.
Adequate Security
• It is not necessary to increase the security level to
an extent when it is not worth the intrusion.
• We need to employ robust security features only
in situations with highly sensitive data transfer
– financial transactions
– transfer of medical information
Access and Recourse
• Needs to provide a way for users to access their
personal information in a simple way through
standardized interfaces (i.e., data access).
• Users should be informed about the usage of
their data once it is stored, similar to call-lists
that are often part of monthly phone bills (i.e.,
usage logs).
Privacy in Ubiquitous
Computing
• Privacy is possible in ubiquitous computing
environment.
– Let people know about collections
– Let people query, update, delete their own data
– Let people know about each usage
• Solutions need not be perfect to be useful
– Trusting fair information practices
– Trusting collectors to keep their promises
– Trusting the legal system
Conclusions
• We are not trying to achieve total security, let
alone total privacy!
• What should be within our reach is achieving a
good balance of convenience and control when
interacting with ubiquitous, invisible devices
and infrastructures.
• We can begin by designing ubiquitous systems
for privacy in the initial stages, not after
implementation.

More Related Content

What's hot

Unit 6
Unit 6Unit 6
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
SVijaylakshmi
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Data dissemination
Data disseminationData dissemination
Data dissemination
Vikram Nandini
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
Harshad Umredkar
 
Service provision cycle
Service provision cycleService provision cycle
Service provision cycle
Purvi Sankhe
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
SHIKHA GAUTAM
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
vampugani
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
rajisri2
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
Alan Dix
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Pragya Srivastava
 
Distributed shared memory shyam soni
Distributed shared memory shyam soniDistributed shared memory shyam soni
Distributed shared memory shyam soni
Shyam Soni
 
Remote Login
Remote LoginRemote Login
Remote Login
hariprasadnr
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
Jayanthi Radhakrishnan
 
5 architecture
5 architecture5 architecture
5 architecture
Adarsh Kumar
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
Ramesh Babu
 
Broadcast Models
Broadcast ModelsBroadcast Models
Broadcast Models
Nataraja Vellanki
 

What's hot (20)

Unit 6
Unit 6Unit 6
Unit 6
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Data dissemination
Data disseminationData dissemination
Data dissemination
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Service provision cycle
Service provision cycleService provision cycle
Service provision cycle
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Distributed shared memory shyam soni
Distributed shared memory shyam soniDistributed shared memory shyam soni
Distributed shared memory shyam soni
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
5 architecture
5 architecture5 architecture
5 architecture
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Broadcast Models
Broadcast ModelsBroadcast Models
Broadcast Models
 

Viewers also liked

The future of wireless innovation - more than just software
The future of wireless innovation - more than just softwareThe future of wireless innovation - more than just software
The future of wireless innovation - more than just software
David Wood
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
abhisheksaini
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
Lew Oleinick
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
Hamza Malik
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Hostel management
Hostel managementHostel management
Hostel management
Himanshu Sajwan
 
Hostel management
Hostel managementHostel management
Hostel management
Mini Gupta
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
photomatt
 

Viewers also liked (8)

The future of wireless innovation - more than just software
The future of wireless innovation - more than just softwareThe future of wireless innovation - more than just software
The future of wireless innovation - more than just software
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Hostel management
Hostel managementHostel management
Hostel management
 
Hostel management
Hostel managementHostel management
Hostel management
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Ubiquitous Computing: Privacy Issues

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
Jason Hong
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
Rehmat Ullah
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Abhinav Wagadre
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 
CN presentation
CN presentationCN presentation
CN presentation
AADIL AHMED ADAM
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
joshuasimon97
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
Rui M. Barreira
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
BeniamTekeste
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
murugesanarumugam
 
Web of Things
Web of ThingsWeb of Things
Web of Things
Jayesh Pai
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Priti Punia
 
Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...
Diego López-de-Ipiña González-de-Artaza
 

Similar to Ubiquitous Computing: Privacy Issues (20)

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
CN presentation
CN presentationCN presentation
CN presentation
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
Web of Things
Web of ThingsWeb of Things
Web of Things
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...Bringing together smart things and people to realize smarter environments sho...
Bringing together smart things and people to realize smarter environments sho...
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 

Ubiquitous Computing: Privacy Issues

  • 1. Ubiquitous Computing: Privacy Issues Hongseok Kim November 19, 2003 SI 668
  • 2. Overview • Basics of Ubiquitous Computing • Context Awareness • Privacy Issues • Policy Principles and Guidelines
  • 3. Ubiquitous Computing Vision • Mark Weiser (1952~1999), XEROX PARC – Coined the term, “ubiquitous computing”, in 1988 – Seminal Article: “The Computer for the 21st Century,” Scientific American (Sep. 1991) “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.”
  • 4. Inverted Paradigm • “Computer in the world (embodied virtuality)” instead of “World in the computer (virtual reality)” • Small, lightweight, and cheap processors embedded in everyday objects
  • 5. Smart Objects • Enrich real world objects with information processing capabilities – Embedded Processors and Memory can remember pertinent events! – Wireless Communications communicate with their environment – Sensors responsive context-sensitive or context-aware behavior
  • 6. Context Awareness • Context awareness – A ubiquitous computing system must be cognizant of its user’s state and surroundings, and must modify its behavior according to the cognizance. • A user’s context can be: – Physical location – Physiological state (e.g., body temperature and heart rate) – Emotional state (e.g., angry, distraught, and calm) – Personal history – Daily behavioral patterns
  • 7. An Example of a Smart Object • MediaCup@TecO – augmented with sensing, processing and communication capabilities (integrated in the cup's bottom), to collect and communicate general context information in a given environment
  • 8. Networked with Other Smart Objects ANOTHER BEER, PLEASE, HAL… I’M SORRY, DAVE. I CAN’T DO THAT. THE BATHROOM SCALE AND THE HALL MIRROR ARE REPORTING DISTURBING FLAB ANOMALIES.
  • 9. Smart Clothing • Conductive textiles and inks – Print electrically active patterns directly onto fabrics • Sensors based on fabric – e.g., monitor pulse, blood pressure, body temperature • Invisible collar microphones and Integrated small cameras • Youth clothing – Game console on the sleeves? – Integrated GPS-driven locators Privacy Issues?
  • 10. Context Awareness Revisited • Xerox Parc’s automatic phone-call routing experiment • A federal office described in Neal Stephenson’s “Snow Crash”
  • 11. Privacy Implications of UbiComp • What is it that makes ubiquitous computing any different from other computer science domains with respect to privacy? • Why should scientists and engineers in this particular domain be any more concerned with such vague notions of liberty, freedom, and privacy?
  • 12. Privacy Implications, cont’d. • Ubiquitous devices are ideally suited for covert operation and illegal surveillance. • Information provided by many sensors to acquire knowledge about the context; these sensors can be invisible to users. • The sensors, gathering information about people without being noticed, can be a threat to privacy.
  • 13. Privacy Challenges (1) • Privacy is already a concern with the WWW • Much more dramatic in a ubiquitous computing environment – Unlimited coverage (sensors everywhere) – Loss of awareness (invisible computing) – New types of data (location, health, habits, …) – More knowledge though context – Anonymity hard to achieve – Difficulty in explicit notice or consent by user
  • 14. Privacy Challenges (2) • Privacy is greatly complicated by ubiquitous computing. – Mechanisms such as location tracking, smart spaces, and use of surrogates monitor user actions on an almost continuous basis. – As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.
  • 15. Six Guiding Principles • Marc Langheinrich, “Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems,” in the proceedings of Ubicomp 2001. – Notice – Choice and Consent – Anonymity and Pseudonymity – Proximity and Locality – Adequate Security – Access and Recourse
  • 16. Notice (Openness) • The subject whose information is collected must be notified. • Environment where it is often difficult for data subjects to realize that data collection is actually taking place • Necessary to have not only mechanisms to declare collection practices (i.e., privacy policies), but also efficient ways to communicate these to the user (i.e., policy announcement).
  • 17. Choice and Consent • It is necessary to get explicit consent of the subject by means of digital or handwriting signature. • How can we offer customers many choices of security and get their consent? • In order to give users a true choice, we need to provide a selection mechanism (i.e., privacy agreements) so that users can indicate which services they prefer.
  • 18. Anonymity and Pseudonymity • An important option when offering clients a number of choices. – But, it is not easy to get anonymity in ubiquitous environment because sensors will easily disclose the real identity. • Pseudonymity is an alternative that allows for a more fine grained control of anonymity in ubiquitous environments.
  • 19. Proximity and Locality • A user can benefit from information gathered only within a particular area. Information value decreases when distance increases. • The system should support mechanisms to encode and use locality information for collected data that can enforce access restrictions based on the location of the person wanting to use the data.
  • 20. Adequate Security • It is not necessary to increase the security level to an extent when it is not worth the intrusion. • We need to employ robust security features only in situations with highly sensitive data transfer – financial transactions – transfer of medical information
  • 21. Access and Recourse • Needs to provide a way for users to access their personal information in a simple way through standardized interfaces (i.e., data access). • Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e., usage logs).
  • 22. Privacy in Ubiquitous Computing • Privacy is possible in ubiquitous computing environment. – Let people know about collections – Let people query, update, delete their own data – Let people know about each usage • Solutions need not be perfect to be useful – Trusting fair information practices – Trusting collectors to keep their promises – Trusting the legal system
  • 23. Conclusions • We are not trying to achieve total security, let alone total privacy! • What should be within our reach is achieving a good balance of convenience and control when interacting with ubiquitous, invisible devices and infrastructures. • We can begin by designing ubiquitous systems for privacy in the initial stages, not after implementation.