TU Eindhoven
Privacy in Ubiquitous Computing Systems
Marc Langheinrich ETH Zurich, Switzerland
http://www.inf.ethz.ch/~langhein/
Privacy in Ubiquitous Computing Systems Marc Langheinrich ETH - - PowerPoint PPT Presentation
Privacy in Ubiquitous Computing Systems Marc Langheinrich ETH Zurich, Switzerland http://www.inf.ethz.ch/~langhein/ TU Eindhoven Whats Up? TU Eindhoven What is privacy, anyway? Privacy definitions Privacy motivation How
TU Eindhoven
http://www.inf.ethz.ch/~langhein/
November 13, 2003 Slide 2
TU Eindhoven
Definitions and Motivation
Evolution and Threats
Concepts and Solutions February 24, 2003 Slide 3
What is Privacy, Anyway?
November 13, 2003 Slide 4
TU Eindhoven
– Louis Brandeis, 1890 (Harvard Law Review)
“Numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the housetops’”
Louis D. Brandeis, 1856 - 1941
November 13, 2003 Slide 5
TU Eindhoven
Being in control of personal information flow
Being in control of personal information flow
November 13, 2003 Slide 6
TU Eindhoven
November 13, 2003 Slide 7
TU Eindhoven
November 13, 2003 Slide 8
TU Eindhoven
November 13, 2003 Slide 9
TU Eindhoven
– “Spy” on you in your own home (natural borders)
– Grandma knows when you’re home (social borders)
– Span time & space (spatial/temporal borders)
– Records careless utterances (transitory borders) Privacy Litmus-test: What borders can be crossed?
November 13, 2003 Slide 10
TU Eindhoven
Justices of the peace act (England, 1361) „The poorest man may in his cottage bid defiance to all the force of the crown”
– William Pitt, English Parliamentarian, 1765
1948 United Nations: Universal declaration of human rights, article 12
– No one should be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks on his honor or reputation.
1970 European convention on human rights, article 8 First data protection law of the world: state of Hesse, Germany (1970)
November 13, 2003 Slide 11
TU Eindhoven
“A free and democratic society requires respect for the autonomy of individuals, and limits on the power of both state and private organizations to intrude on that autonomy… privacy is a key value which underpins human dignity and other key values such as freedom of association and freedom of speech…”
– Preamble To Australian Privacy Charter, 1994
“All this secrecy is making life harder, more expensive, dangerous and less serendipitous”
– Peter Cochrane, Former Head Of BT Research
“You have no privacy anyway, get over it”
– Scott McNealy, CEO Sun Microsystems, 1995
November 13, 2003 Slide 12
TU Eindhoven
– “Ownership” of personal data
– Protection from nuisances (e.g., spam)
– Balance of power (“nakedness”)
– Limits enforcement capabilities of ruling elite
– Residue of inefficient collection mechanisms
Source: Lawrence Lessig, Code and Other Laws Of Cyberspace. Basic Books, 2000
November 13, 2003 Slide 13
TU Eindhoven
November 13, 2003 Slide 14
TU Eindhoven
– Fridges detect stored explosives, PCs scan hard disks for illegal data, knifes report stabbings
– Private conversations, actions, remain private – Only illegal events reported to police
– Compatible with 4th amendment?
Definitions and Motivation
Evolution and Threats
Concepts and Solutions February 24, 2003 Slide 15
How is Privacy Changing?
November 13, 2003 Slide 17
TU Eindhoven
November 13, 2003 Slide 18
TU Eindhoven
cups
November 13, 2003 Slide 19
TU Eindhoven
– More detailed & precise data – Cheaper, smaller, self-powered (ubiquitous!)
– Body sensors detect stress, anger, sadness – Health sensors alert physician – Nervous? Floor & seat sensors, eye tracker
November 13, 2003 Slide 20
TU Eindhoven
– More data = more patterns = smarter – Context is everything, everything is context
– Typing speed (dedicated?), shower habits (having an affair?), chocolate consumption (depressed?)
November 13, 2003 Slide 21
TU Eindhoven
November 13, 2003 Slide 22
TU Eindhoven
– Detailed recording of position (soon), acceleration, etc.
– “Imagine if you could sit next to your teenager every second of their driving. Imagine the control you would have. Would they speed? Street race? Hard corner? Hard brake? Play loud music? Probably not. But how do they drive when you are not in the car? ” – Audio warnings when speeding, cutting corners – Continuous reckless driving is reported home
Source: http://www.roadsafety.com/Teen_Driver.htm
November 13, 2003 Slide 23
TU Eindhoven
– Automatically fines drivers US$150,- at speeds over 79mph – GPS records exact position of speed violation
– Pilot program 1998/99, Houston, TX – Insurance based on individual driving habits (when, where, how) – GPS tracking, mobile communication, data center
Source: : Insurance & Technology Online, Jan 2nd 2002 (http://www.insurancetech.com/story/update/IST20020108S0004) Source: http://news.com.com/2100-1040-268747.html?legacy=cnet
November 13, 2003 Slide 24
TU Eindhoven
Definitions and Motivation
Evolution and Threats
Concepts and Solutions February 24, 2003 Slide 25
How can We Achieve Privacy?
November 13, 2003 Slide 26
TU Eindhoven
November 13, 2003 Slide 27
TU Eindhoven
November 13, 2003 Slide 28
TU Eindhoven
November 13, 2003 Slide 29
TU Eindhoven
November 13, 2003 Slide 30
TU Eindhoven
– High security for back-end storage – Low security for low-power sensors
– Free access to medical data in emergency situations
– Depending on device battery status – Depending on types of data, transmission – Depending on locality, situation
November 13, 2003 Slide 31
TU Eindhoven
November 13, 2003 Slide 32
TU Eindhoven
– People expect solitude to mean privacy – Strangers usually don’t know me
– Devices only record if owner is present
– Local information stays local – Walls and flower-pots can talk (but won‘t do so over the phone)
November 13, 2003 Slide 33
TU Eindhoven
Optional: P3P Optional: US/EU Privacy Laws
November 13, 2003 Slide 34
TU Eindhoven
Privacy Policy Accept / Decline
Privacy Beacons Privacy Beacons Privacy Proxies Privacy Proxies Privacy DB Privacy DB
Definitions and Motivation
Evolution and Threats
Concepts and Solutions February 24, 2003 Slide 35
The Take-Home Message
November 13, 2003 Slide 38
TU Eindhoven
– Technology, laws still to evolve
– Invisible, real-world coverage, comprehensive collection, inconspicuous
– User interface (notice, choice, consent) – Protocols (anonymity, security, access, locality) – Social acceptance (user expectations)
November 13, 2003 Slide 39
TU Eindhoven
November 13, 2003 Slide 40
TU Eindhoven
November 13, 2003 Slide 41
TU Eindhoven
Security for Ubiquitous Computing, by Frank Stajano The Privacy Law Sourcebook 2002: United States Law, International Law, and Recent Developments, by Marc Rotenberg Privacy & Human Rights, EPIC