privacy enhanced sharing of personal content on the web
play

Privacy-Enhanced Sharing of Personal Content on the Web Mohammad - PowerPoint PPT Presentation

IMPECS WWW Presentation- April 24, 2008 Privacy-Enhanced Sharing of Personal Content on the Web Mohammad Mannan and P . C. van Oorschot Carleton University, Canada M. Mannan April 24, 2008 1 IMPECS The need for sharing is real People


  1. IMPECS WWW Presentation- April 24, 2008 Privacy-Enhanced Sharing of Personal Content on the Web Mohammad Mannan and P . C. van Oorschot Carleton University, Canada M. Mannan April 24, 2008 1

  2. IMPECS The need for sharing is real People want to share: – photos, contact info – “What are you doing?” – preferences, opinions M. Mannan April 24, 2008 2

  3. IMPECS Sharing is easy Popular techniques: – Social networking sites, blogs – Cheap (or free) personal web space But maintaining “privacy” is not so easy. M. Mannan April 24, 2008 3

  4. IMPECS Common solutions for privacy Popular techniques: – Passwords (distribution, retraction) – Obscure web links – “Friends’ circle” on social networking sites M. Mannan April 24, 2008 4

  5. IMPECS Privacy in social networking sites – Usability 1. Build the friends’ circle (without annoying others?) 2. Viewers must join the same network as the publisher 3. Publisher is restricted to a particular site M. Mannan April 24, 2008 5

  6. IMPECS So your profile is “privacy-protected” – but you forgot about the “U.S. Patriot Act” – also forgot to read the site’s privacy policy (Facebook “beacon”, no deleting of accounts) M. Mannan April 24, 2008 6

  7. IMPECS Consequences: job lost M. Mannan April 24, 2008 7

  8. IMPECS Consequences: job denied You have “cleaned” your profile before an interview – but profiles are incrementally archived M. Mannan April 24, 2008 8

  9. IMPECS Consequences: targeted phishing/malware M. Mannan April 24, 2008 9

  10. IMPECS Problem statement 1. How to share personal content on the web among selected peers 2. Goals: – share only within a “circle of trust” – deny access to strangers, web crawlers, auto-indexers – usable security Military-grade security is a non-goal M. Mannan April 24, 2008 10

  11. IMPECS Our proposal: overview IMPECS: IM-based Privacy-Enhanced Content Sharing – only a publisher’s IM contacts can view her web page – IM and web servers share a user-specific key – IM server generates a ‘ticket’ for a viewing user (contact) – Web server validates the ticket before serving content M. Mannan April 24, 2008 11

  12. IMPECS Notation used in IMPECS A, B Two IM users Alice and Bob S i , S w IM and web servers ID Aw A ’s user ID at S w which is unique in S w ’s domain K Aw A ’s content sharing key, shared with both S w and S i The URL of A ’s publishing web folder on S w URL A R A set of access restrictions on URL A as imposed by A T iw = { ID Aw , R } K Aw (access control ticket for viewing URL A ) M. Mannan April 24, 2008 12

  13. � � � � � � � IMPECS Registering a URL in IMPECS Publisher ( A ) IM Server ( S i ) Web Server ( S w ) Auth (between A , S w ) Request a key for URL A , specifying restrictions R URL AR = http://URL A /?userid= ID Aw &key= K Aw &restrictions= R Auth (between A , S i ) URL AR M. Mannan April 24, 2008 13

  14. � � � � � � IMPECS Viewing a personal URL in IMPECS Viewer ( B ) IM Server ( S i ) Web Server ( S w ) Auth (between B , S i ) Request to access URL A URL AT = http://URL A /?userid= ID Aw &ticket= T iw URL AT Content hosted at URL A M. Mannan April 24, 2008 14

  15. IMPECS IMPECS in action M. Mannan April 24, 2008 15

  16. IMPECS IMPECS – Advantages 1. Privacy-friendly sharing 2. ‘Improved’ usability 3. Interoperability – publish ‘anywhere’ 4. Decreased risks related to sharing M. Mannan April 24, 2008 16

  17. IMPECS IMPECS – Shortcomings 1. Must use IM – modification of IM server source code – may require IM client updates – needs to run PHP scripts at the web server 2. Malicious contacts may copy and publish personal content on public forums 3. Only as secure as the underlying IM and web protocols M. Mannan April 24, 2008 17

  18. IMPECS Concluding thoughts 1. Any pre-arranged grouping can be used as “circle of trust” 2. How to protect against compromised/malicious IM and web servers? 3. How to make people privacy-aware? M. Mannan April 24, 2008 18

  19. IMPECS Thank you � Question/Comments? mmannan@scs.carleton.ca http://www.ccsl.carleton.ca M. Mannan April 24, 2008 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend