c3p context aware crowdsourced cloud privacy
play

C3P: Context-Aware Crowdsourced Cloud Privacy Privacy Enhancing - PowerPoint PPT Presentation

C3P: Context-Aware Crowdsourced Cloud Privacy Privacy Enhancing Technologies Symposium, 2014 1 CloudSpaces Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files to Flowers Conversion 2 Files


  1. C3P: Context-Aware Crowdsourced Cloud Privacy Privacy Enhancing Technologies Symposium, 2014 1 CloudSpaces

  2. Files to Flowers Conversion 2

  3. Files to Flowers Conversion 2

  4. Files to Flowers Conversion 2

  5. Files to Flowers Conversion 2

  6. Files to Flowers Conversion 2

  7. 60% increase in corporate data shared to the cloud in 2015 3 Source: Elastica’s Q2 2015 Shadow Data Report

  8. 60% increase in corporate data shared to the cloud in 2015 20% of files shared to the cloud contain protected data 3 Source: Elastica’s Q2 2015 Shadow Data Report

  9. 60% increase in corporate data shared to the cloud in 2015 20% of files shared to the cloud contain protected data 60% 30% of sensitive files contain PII …contain health info 3 Source: Elastica’s Q2 2015 Shadow Data Report

  10. 60% increase in corporate data shared to the cloud in 2015 20% of files shared to the cloud contain protected data 60% 30% of sensitive files contain PII …contain health info Emergence of “Shadow IT” 3 Source: Elastica’s Q2 2015 Shadow Data Report

  11. Anti-Snooping Tools for the Cloud Your files are always encrypted You are fully You cannot use before protected. cloud services. uploading. Examples: 4

  12. What if Antivirus Software was Similar? Your files are You cannot You are fully always run protected. quarantined. software. 5

  13. Obstacles Privacy vs. Services dilemma

  14. Obstacles Privacy vs. Services dilemma Context-dependence of privacy

  15. Obstacles Privacy vs. Services dilemma Context-dependence of privacy I dedicate the rest of Manual effort and expertise my life for sorting out sensitive from non-sensitive for assessing data sensitivity files on my HD 6

  16. What is needed? Ensure serviceable protection instead of brute encryption.

  17. What is needed? Ensure serviceable protection instead of brute encryption. Account for the metadata, sharing environment, and data content.

  18. What is needed? Ensure serviceable protection instead of brute encryption. Account for the metadata, sharing environment, and data content. Automatically estimate the I dedicate the rest of my life for sorting out sensitive from non-sensitive sensitivity of shared data. files on my HD 7

  19. Introducing C3P Various levels of information hiding 8

  20. Introducing C3P Various levels of information hiding Define data in terms of context 8

  21. Introducing C3P Various levels of information hiding Define data in terms of context Private crowdsourcing mechanism for gathering people privacy policies I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD 8

  22. Introducing C3P Various levels of information hiding Define data in terms of context Private crowdsourcing mechanism for gathering people privacy policies I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD Psychologically grounded approach for estimating sensitivity 8

  23. Fine-Grained Policies 9

  24. Defining Data through Context Content Metadata Environment 10

  25. Defining Data through Context Content Metadata Environment 10

  26. Defining Data through Context Content Metadata Environment 10

  27. Context V ocabulary Home Document Location Office Data Software Financial Media Topic Educational 11

  28. Privacy Preserving Crowdsourcing I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD Financial Me Stranger Faces Home Friend Business Me Colleague Business Me Colleague Financial Me Stranger Faces Home Friend User 1 User 2 User 3 12

  29. Privacy Preserving Crowdsourcing I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD Financial Me Stranger Faces Home Friend Business Me Colleague Context Sharing Operation Faces Home Friend Business Me Colleague Financial Me Stranger Faces Home Friend User 1 User 2 User 3 12

  30. Privacy Preserving Crowdsourcing I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD Financial Me Stranger Faces Home Friend Business Me Colleague Family Context Sharing Operation Colleague Faces Home Friend Work Sea Business Me Colleague Financial Me Stranger Faces Home Friend User 1 User 2 User 3 12

  31. Privacy Preserving Crowdsourcing I dedicate the rest of my life for sorting out sensitive from non-sensitive files on my HD Financial Me Stranger Faces Home Friend Business Me Colleague Family Context Context Sharing Operation Colleague Faces Home Friend Faces Home Friend K-anonymity Work Forward-Anonymity Sea Business Me Colleague Financial Me Stranger Faces Home Friend User 1 User 2 User 3 12

  32. Sensitivity Estimation using Item Response Theory Faces Home Friend 13

  33. Sensitivity Estimation using Item Response Theory High Sensitivity 75% Faces Home Friend 13

  34. Sensitivity Estimation using Item Response Theory High Sensitivity 75% Faces Home Friend 13

  35. Sensitivity Estimation using Item Response Theory High High Sensitivity Privacy Attitude 75% 75% Faces Home Friend 13

  36. Sensitivity Estimation using Item Response Theory High High Sensitivity Privacy Attitude 75% 75% Faces Home Friend 13

  37. Sensitivity Estimation using Item Response Theory High High Sensitivity Privacy Attitude 75% 75% Faces Home Friend 13

  38. Sensitivity Estimation using Item Response Theory High High Sensitivity Privacy Attitude 75% 75% Faces Home Friend Faces Home Friend Faces Home Friend Group Invariance 13

  39. Sensitivity Estimation using Item Response Theory High High Sensitivity Privacy Attitude 75% 75% Faces Home Friend Faces Home Friend Faces Home Friend Item Group Invariance Invariance 13

  40. Server Connecting the Dots ? Client 14

  41. Server Connecting the Dots ? Client 14

  42. Server Connecting the Dots ? Context Extraction Financial Me Stranger Client 14

  43. Server Connecting the Dots Sensitivity Request ? Context Extraction Financial Me Stranger Client 14

  44. Server Connecting the Dots ? Sensitivity Reply Financial Me Stranger Client 14

  45. Server Connecting the Dots ? Sensitivity Reply Financial Me Stranger Policy Decision Client 14

  46. Server Connecting the Dots ? Data Sharing Financial Me Stranger Policy Decision Client 14

  47. Server Connecting the Dots ? Financial Me Stranger Crowdsourcing Client 14

  48. Server Connecting the Dots ? Sensitivity Computation Financial Me Stranger Crowdsourcing Client 14

  49. C3P Evaluation 15

  50. IRT Models Fit Privacy-Aware Cloud Sharing? 96 81 16

  51. IRT Models Fit Privacy-Aware Cloud Sharing? 96 81 • Ex: With which privacy level would you share a project presentation with a friend? 16

  52. IRT Models Fit Privacy-Aware Cloud Sharing? Dichotomous case A dot represents a 96 Sensitivity context 81 • Ex: With which privacy level would you share a project presentation with a friend? Infit t-statistic • Standardized Infit Statistic: • (x-axis values should lie in [-2,2]) 16

  53. IRT Models Fit Privacy-Aware Cloud Sharing? Dichotomous case A dot represents a 96 Sensitivity context 81 • Ex: With which privacy level would you share a project presentation with a friend? Infit t-statistic • Standardized Infit Statistic: • (x-axis values should lie in [-2,2]) 16

  54. IRT Models Fit Privacy-Aware Cloud Sharing? Dichotomous case A dot represents a 96 Sensitivity context 81 • Ex: With which privacy level would you share a project presentation with a friend? Infit t-statistic Polytomous case • Standardized Infit Statistic: • (x-axis values should lie in [-2,2]) Sensitivity Infit t-statistic 16

  55. IRT Models Fit Privacy-Aware Cloud Sharing? Dichotomous case A dot represents a 96 Sensitivity context 81 • Ex: With which privacy level would you share a project presentation with a friend? Infit t-statistic Polytomous case • Standardized Infit Statistic: • (x-axis values should lie in [-2,2]) Sensitivity Infit t-statistic 16

  56. IRT Models Fit Privacy-Aware Cloud Sharing? Dichotomous case A dot represents a 96 Sensitivity context 81 • Ex: With which privacy level would you share a project presentation with a friend? Infit t-statistic Polytomous case • Standardized Infit Statistic: • (x-axis values should lie in [-2,2]) Sensitivity Yes! Infit t-statistic 16

  57. Temporal Cost of Crowdsourcing & Privacy • Synthetic Dataset: 3125 500 30000 Zipf context distribution av.: 1 Item/6 hours 17

  58. Temporal Cost of Crowdsourcing & Privacy • Synthetic Dataset: 3125 500 30000 k Zipf context distribution av.: 1 Item/6 hours 17

  59. Temporal Cost of Crowdsourcing & Privacy • Synthetic Dataset: 3125 500 30000 k Zipf context distribution av.: 1 Item/6 hours 17 Crowdsourcing cost : Hit rate (HR) from 0 to 90% in 10 days

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend