C3P: Context-Aware Crowdsourced Cloud Privacy
1
CloudSpaces
Privacy Enhancing Technologies Symposium, 2014
C3P: Context-Aware Crowdsourced Cloud Privacy Privacy Enhancing - - PowerPoint PPT Presentation
C3P: Context-Aware Crowdsourced Cloud Privacy Privacy Enhancing Technologies Symposium, 2014 1 CloudSpaces Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files
1
CloudSpaces
Privacy Enhancing Technologies Symposium, 2014
2
2
2
2
2
3
Source: Elastica’s Q2 2015 Shadow Data Report
3
Source: Elastica’s Q2 2015 Shadow Data Report
3
Source: Elastica’s Q2 2015 Shadow Data Report
3
Source: Elastica’s Q2 2015 Shadow Data Report
You cannot use cloud services. You are fully protected. Your files are always encrypted before uploading.
Examples:
4
You cannot run software. You are fully protected. Your files are always quarantined.
5
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
6
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
7
8
8
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
8
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
8
9
10
10
10
11
12
Business Me Colleague Financial Me Stranger
Faces Home Friend Financial Me Stranger Business Me Colleague Faces Home Friend
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
User 1 User 2 User 3
12
Business Me Colleague Financial Me Stranger
Faces Home Friend Financial Me Stranger Business Me Colleague Faces Home Friend Faces Home Friend
Sharing Operation Context
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
User 1 User 2 User 3
12
Business Me Colleague Financial Me Stranger
Faces Home Friend Financial Me Stranger Business Me Colleague Faces Home Friend Faces Home Friend
Work Sea Colleague Family Sharing Operation Context
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
User 1 User 2 User 3
12
Business Me Colleague Financial Me Stranger
Faces Home Friend Financial Me Stranger Business Me Colleague Faces Home Friend Faces Home Friend
Work Sea Colleague Family Forward-Anonymity K-anonymity Sharing Operation Context
I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD
User 1 User 2 User 3
Faces Home Friend
Context
13
Faces Home Friend
13
Faces Home Friend
High Sensitivity 75%
13
Faces Home Friend
High Sensitivity 75%
High Privacy Attitude 75%
13
Faces Home Friend
High Sensitivity 75%
High Privacy Attitude 75%
13
Faces Home Friend
High Sensitivity 75%
High Privacy Attitude 75%
13
Faces Home Friend
High Sensitivity 75%
High Privacy Attitude 75%
13
Faces Home Friend
High Sensitivity 75% Group Invariance
Faces Home Friend Faces Home Friend
High Privacy Attitude 75%
13
Faces Home Friend
High Sensitivity 75% Group Invariance
Faces Home Friend Faces Home Friend
Item Invariance
14
14
14
Financial Me Stranger
Context Extraction
14
Financial Me Stranger
Context Extraction Sensitivity Request
14
Financial Me Stranger
Sensitivity Reply
14
Financial Me Stranger
Sensitivity Reply Policy Decision
14
Financial Me Stranger
Policy Decision Data Sharing
14
Financial Me Stranger
Crowdsourcing
14
Financial Me Stranger
Crowdsourcing
Sensitivity Computation
15
16
share a project presentation with a friend?
16
share a project presentation with a friend?
16
Dichotomous case Sensitivity Infit t-statistic A dot represents a context
share a project presentation with a friend?
16
Dichotomous case Sensitivity Infit t-statistic A dot represents a context
share a project presentation with a friend?
16
Polytomous case Infit t-statistic Sensitivity Dichotomous case Sensitivity Infit t-statistic A dot represents a context
share a project presentation with a friend?
16
Polytomous case Infit t-statistic Sensitivity Dichotomous case Sensitivity Infit t-statistic A dot represents a context
share a project presentation with a friend?
16
Polytomous case Infit t-statistic Sensitivity Dichotomous case Sensitivity Infit t-statistic A dot represents a context
17
Zipf context distribution
av.: 1 Item/6 hours
k
17
Zipf context distribution
av.: 1 Item/6 hours
k
17
Zipf context distribution
av.: 1 Item/6 hours
k
17
Zipf context distribution
av.: 1 Item/6 hours
18
Anonymity Parameter K=3
av.: 1 Item/6 hours
18
Anonymity Parameter K=3
av.: 1 Item/6 hours
19
19
19
19
Preset Sensitivity Computed Sensitivity
19
Preset Sensitivity Computed Sensitivity
Tolerance: 25% malicious: ≈8% difgerence, 50% malicious: ≈17% difgerence
20
21
22
PrivyShare
23
23
thumbnails)
23
24
PrivyShare
25
PrivySeal
privyseal.epfl.ch
26
hamzaharkous.com