Personal Privacy in Ubiquitous Personal Privacy in Ubiquitous - - PowerPoint PPT Presentation

personal privacy in ubiquitous personal privacy in
SMART_READER_LITE
LIVE PREVIEW

Personal Privacy in Ubiquitous Personal Privacy in Ubiquitous - - PowerPoint PPT Presentation

Personal Privacy in Ubiquitous Personal Privacy in Ubiquitous Computing Marc Langheinrich Institute for Pervasive Computing Institute for Pervasive Computing ETH Zurich, Switzerland Approaches to Ubicomp Privacy Disappearing Computer


slide-1
SLIDE 1

Personal Privacy in Ubiquitous Personal Privacy in Ubiquitous Computing

Marc Langheinrich Institute for Pervasive Computing Institute for Pervasive Computing ETH Zurich, Switzerland

slide-2
SLIDE 2

Approaches to Ubicomp Privacy

Disappearing Computer Troubadour Project (10/02 05/03) Disappearing Computer Troubadour Project (10/02 - 05/03)

Promote Absence of Protection as User Empowerment

Promote Absence of Protection as User Empowerment

„ It's maybe about letting them find their own ways of cheating”

Make it Someone Elses Problem

„For [my colleague] it is more appropriate to think about [security

and privacy] issues. It’s not really the case in my case”

Insist that “Good Security” will Fix It

„All you need is really good firewalls“

C l d it i I tibl ith Ubi it C ti

Conclude it is Incompatible with Ubiquitous Computing

„I think you can't think of privacy... it's impossible, because if I do

it, I have troubles with finding [a] Ubicomp future”

Personal Privacy in Ubiquitous Computing 2

it, I have troubles with finding [a] Ubicomp future

11/29/2007

slide-3
SLIDE 3

Today‘s Topics

What is Privacy and Why Should We Want It? What is Privacy and Why Should We Want It? H

d F t S t E i t Ch ll

How do Future Smart Environments Challenge

Existing Solutions?

How Less Security Can (Sometimes) Increase

y Privacy

Results of ETH/Hitachi-SDL cooperation 2006

p

11/29/2007 Personal Privacy in Ubiquitous Computing 3

slide-4
SLIDE 4

What is Privacy?

The right to be let alone “ „The right to be let alone.

Louis Brandeis, 1890 (Harvard Law Review)

h d i f l t h f l

Louis D Brandeis 1856 - 1941

„The desire of people to choose freely

under what circumstances and to what t t th ill

Louis D. Brandeis, 1856 1941

extent they will expose themselves, their attitude and their b h i t th “ behavior to others.“

Alan Westin („Privacy And Freedom“, 1967)

Prof Emeritus Columbia University

Alan Westin

11/29/2007 Personal Privacy in Ubiquitous Computing 4

  • Prof. Emeritus, Columbia University
slide-5
SLIDE 5

Why Privacy?

Reasons for Privacy Reasons for Privacy

Free from Nuisance

Intimacy

Intimacy Free to Decide for Oneself

B A th N

By Another Name...

Data Protection Informational Self-Determination

Privacy isn‘t just about keeping secrets –

11/29/2007 Personal Privacy in Ubiquitous Computing 5

y j p g data exchange and transparency are key issues!

slide-6
SLIDE 6

“But I’ve Got Nothing to Hide!”

Do you?

Arson Near Youth House Niederwangen Arson Near Youth House Niederwangen

At scene of crime: Migros-tools

Court ordered disclosure of all 133

Court ordered disclosure of all 133

consumers who bought items on their supermarket loyalty card (8/2004) their supermarket loyalty card (8/2004)

(Arsonist not yet found)

“Give me six lines written by the most

Give me six lines written by the most honorable of men, and I will find an excuse in them to hang him”

d d l 8 6

11/29/2007 Personal Privacy in Ubiquitous Computing 6

excuse in them to hang him

Armand Jean du Plessis, 1585-1642 (a.k.a. Cardinal de Richelieu)

slide-7
SLIDE 7

Ubicomp Privacy Implications

Data Collection Data Collection

Scale (everywhere, anytime)

Manner (inconspicuous invisible)

Manner (inconspicuous, invisible) Motivation (context!)

D t T

Data Types

Observational instead of factual data

Data Access

“The Internet of Things”

Personal Privacy in Ubiquitous Computing 7 11/29/2007

slide-8
SLIDE 8

How do we achieve privacy? How do we achieve privacy?

11/29/2007 Personal Privacy in Ubiquitous Computing 8

slide-9
SLIDE 9

Privacy – Not Just a Recent Fad

Justices Of The Peace Act (England 1361)

Justices Of The Peace Act (England, 1361)

Sentences for Eavesdropping and Peeping Toms

  • The poorest man may in his cottage bid defiance to all

„The poorest man may in his cottage bid defiance to all

the force of the crown. It may be frail; its roof may shake; … – but the king of England cannot enter; all his forces … but the king of England cannot enter; all his forces dare not cross the threshold of the ruined tenement“

William Pitt the Elder (1708-1778)

( 7 77 )

First Data Protection Law in the World in Hesse

  • 1970

11/29/2007 Personal Privacy in Ubiquitous Computing 9

slide-10
SLIDE 10

The Fair Information Principles (FIP)

Drawn up by the OECD 1980

Drawn up by the OECD, 1980

“Organisation for economic cooperation and development” Voluntary guidelines for member states

y g

Goal: ease transborder flow of goods (and information!)

Five Principles (simplified)

1.

Openness

2.

Data access and control

4.

Collection Limitation

5.

Data subject’s consent

Core principles of most modern privacy laws

3.

Data security

Personal Privacy in Ubiquitous Computing 10

Implication: Technical solutions must support FIP

11/29/2007

slide-11
SLIDE 11
  • 1. Challenge: Openness

No Hidden Data Collection!

No Hidden Data Collection!

Legal requirement in many countries

Established Means: Privacy Policies

Established Means: Privacy Policies

Who, what, why, how long, etc. ...

How to Publish Policies in Smart Environments?

How to Publish Policies in Smart Environments?

Is a poster enough? A paragraph of fine print?

Too Many Transactions? Too Many Transactions?

Countless announcements an annoyance

11/29/2007 Personal Privacy in Ubiquitous Computing 11

slide-12
SLIDE 12
  • 2. Challenge: Access & Control

Identifiable Data Must be Accessible Identifiable Data Must be Accessible

Users can review, change, sometimes delete

C ll

t M t b A t bl

Collectors Must be Accountable

Privacy-aware storage technology

When Does Sensor Data Become Identifiable?

Even anonymized data can identify people (AOL case)

Who to Ask? How to Verify? How to Display?

Who was reading me when? Is this really my trace?

11/29/2007 Personal Privacy in Ubiquitous Computing 12

g y y

slide-13
SLIDE 13
  • 3. Challenge: Data Security

Traditional Approach: Centralistic Authentication

Traditional Approach: Centralistic Authentication

Powerful centralized system with known user list Plan for worst case scenario (powerful attacker)

Numerous, Spontaneous Interactions

How do I know who I communicate with, who to trust?

h d “b ” k ?

How much extra time does “being secure” take?

Complex Real-World Situations

Access to my medical data in case of emergency?

Access to my medical data in case of emergency?

Context-Dependent Security?

Based on battery power data type location situation

11/29/2007 Personal Privacy in Ubiquitous Computing 13

Based on battery power, data type, location, situation

slide-14
SLIDE 14
  • 4. Challenge: Data Minimization

Only collect as much information as needed Only collect as much information as needed

No in-advance data collection for future uses

B

t / d d t

Best: use anonymous/pseudonymous data

No consent, security, access needed

How much data is needed for becoming “smart”?

No useless data in smart environments (context!)

Sometimes one cannot hide!

Sensor data (biometrics) hard to anonymize

Slide 14

( ) y

11/29/2007 Personal Privacy in Ubiquitous Computing

slide-15
SLIDE 15
  • 5. Challenge: Consent

Participation Requires Explicit Consent Participation Requires Explicit Consent

Usually a signature or pressing a button

True Consent Requires True Choice

True Consent Requires True Choice

More than „take it or leave it“, needs alternatives

How to Ask “On The Fly”?

How to Ask On The Fly ?

The mobile phone as a background agent (legal issues?)

Consenting to What? Consenting to What?

Do I understand the implications?

D I h ti ?

11/29/2007 Personal Privacy in Ubiquitous Computing 15

Do I have options?

slide-16
SLIDE 16

Ubicomp Challenges to Security & Privacy

1

How to inform subjects about data

1.

How to inform subjects about data collections?

2

How to provide access to stored data?

  • 2. How to provide access to stored data?
  • 3. How to ensure confidentiality, integrity, and

h i i ( li i )? authenticity (w/o alienating user)?

  • 4. How to minimize data collection?
  • 5. How to obtain consent from data subjects?

11/29/2007 Personal Privacy in Ubiquitous Computing 16

slide-17
SLIDE 17

Public Concern over Unauthorized RFID Access

11/29/2007 Personal Privacy in Ubiquitous Computing 17

slide-18
SLIDE 18

Unauthorized RFID Access – Implications

Pa Passport:

Name: John Doe Nationality: USA Visa for: Isreal

Wi Wig

Modell #2342 Material: Polyester Visa for: Isreal

atories

Our focus: Consumer items

Juels, RSA Labora

Ti Tiger T Tanga:

Manufacturer: Woolworth Washed: 736

  • rk (c) 2006 Ari J

Wallet llet

:Contents: 370 Euro

Vi Viagra ra:

Manufacturer: Pfitzer

RFID-Man” Artwo

11/29/2007 Personal Privacy in Ubiquitous Computing 18 :Contents: 370 Euro Disability Card: #2845 Extra Large Package

Original “R

slide-19
SLIDE 19

Killing Consumer Item RFID Tags

  • Dead Tags Tell No Tales“

„Dead Tags Tell No Tales

Permanently deactivate tag at checkout

Hard Kill

Hard Kill

Cut tag antenna or „fry“ circuit

Soft Kill

Metro RFID De-Activator

Soft Kill

Needs password to prevent unauthorized killing

Both Approaches Require Consumer Action

Also voids any post-sales benefits (returns, services, …)

y p ( , , )

11/29/2007 Personal Privacy in Ubiquitous Computing 19

slide-20
SLIDE 20

Alternative: Securing RFID Access

General Principle: Lock/Unlock ID With Password General Principle: Lock/Unlock ID With Password

Tag only replies if correct password/secret is sent

Requires RFID-Owner to Know Secret

d b f d h k ( h )

Password must be transferred at checkout (where to?)

Requires Owner to Know Which Secret to Use Requires Owner to Know Which Secret to Use

Chicken And Egg Problem: If you don‘t know what tag

it is how do you know what password to use? it is, how do you know what password to use?

11/29/2007 Personal Privacy in Ubiquitous Computing 20

slide-21
SLIDE 21

What about small businesses?

Deactivation terminals? Password management?

11/29/2007 Personal Privacy in Ubiquitous Computing 21

slide-22
SLIDE 22

Goal: Protecting RFID Readout Without Consumer Effort Goa :

  • tect

g eadout t out Co su e

  • t

11/29/2007 Personal Privacy in Ubiquitous Computing 22

slide-23
SLIDE 23

Shamir Tags [Lan2007a]

A E l f Z M t P i P t ti An Example for Zero-Managament Privacy Protection

Default: Tags Take Long Time To Read Out

Default: Tags Take Long Time To Read Out

Complicates Tracking & Unauthorized Identification Bitwise release short range (e g one random bit/sec)

Bitwise release, short range (e.g., one random bit/sec)

Intermediate results meaningless, since encrypted Decryption requires all bits being read

yp q g

But: Known Tags Can be Directly Identified

Allows owner to use tags without apparent restrictions

  • s o

e to use tags t out appa e t est ct o s

Initial partial release of bits enough for instant identification

from a limited set of known tags

11/29/2007 Personal Privacy in Ubiquitous Computing 23

[Lan2007a] [Lan2007a] Marc Langheinrich, Remo Marti: “Practical Minimalist Cryptography for RFID Privacy.” IEEE Systems Journal, Special Issue on RFID Technology, 1(1), December 2007.

slide-24
SLIDE 24

Secret Shares (Shamir 1979)

Polynomial of degree n can be described using at least n+1 n+1 points P2 P1 P3

11/29/2007 Personal Privacy in Ubiquitous Computing 24

slide-25
SLIDE 25

Secret Shares (Shamir 1979)

P2 P1 P3

11/29/2007 Personal Privacy in Ubiquitous Computing 25

slide-26
SLIDE 26

96 bit EPC C d

011010111…1101 Secret s

96‐bit EPC‐Code 106‐bit Shamir Share

111000011…101101 101101101…110111 101010011…101101 Shares hi 111000011101010001010111010101101010100…1010101110101 Shamir Tag

318‐bit Shamir Tag

10‐bit x‐value 96‐bit y‐value

g P2 P1 P3

11/29/2007 Personal Privacy in Ubiquitous Computing 26

slide-27
SLIDE 27

96 bit EPC C d

011010111…1101 Secret s

96‐bit EPC‐Code 106‐bit Shamir Share

111000011…101101 101101101…110111 101010011…101101 Shares hi 111000011101010001010111010101101010100…1010101110101 Shamir Tag

318‐bit Shamir Tag

10‐bit x‐value 96‐bit y‐value

g 111000011101010001010111010101101010100…1010101110101 Initial Reply

16‐bit Reply

Instant identification

  • f known items

Time

+1 bit

111000011101010001010111010101101010100…1010101110101

+1 bit

  • f known items
  • sure Over T

+1 bit

111000011101010001010111010101101010100…1010101110101

+1 bit

111000011101010001010111010101101010100…1010101110101

+1 bit

Bit Disclo 111000011101010001010111010101101010100…1010101110101

+1 bit +1 bit

111000011101010001010111010101101010100…1010101110101

Unknown tags will eventually be identified

11/29/2007 Personal Privacy in Ubiquitous Computing 27

slide-28
SLIDE 28

Preventing Tracking

000101111010101111101011010100011011010 0110111101001

Tag 3

Readout 3

111000011101010001010111010101101010100…1010101110101

Tag 1

000101111010101111101011010100011011010…0110111101001

Original Readout Readout 3

Tag 2

111000011101010001010111010101101010100…1010101110101

Tag 1

Readout 1 Readout 2

010100111000110101010110010100001010101…1010100001100

Tag 2

Subsequent readouts receive only substring of bits

Subsequent readouts receive only substring of bits

Insufficient data to track tag repeatedly E.g., tag population of 109 over 3 million tag have 5 bits in common

g g p p g

11/29/2007 Personal Privacy in Ubiquitous Computing 28

slide-29
SLIDE 29

More Privacy Through Less Security?

Shamir Tags Require No Consumer Effort Shamir Tags Require No Consumer Effort

Delay upon first use, but no

no passwords passwords to manage! Not useful for important“ items (passports e money)

Not useful for „important items (passports, e-money) Does not alleviate user concerns (tags remain active)

Building Block for Comprehensive Solution

Strong crypto for passports, drug-authenticity, … Clipping/killing for concerned consumers Unconcerned consumers get basic protection „for free“

11/29/2007 Personal Privacy in Ubiquitous Computing 29

slide-30
SLIDE 30

Shamir tag challenge [Lan2007b]

Range vs readability Range vs. readability

If read range is too long, easy to read long enough

Ideal very short range to force very close readout

Ideal: very short range to force very close readout

11/29/2007 30 Personal Privacy in Ubiquitous Computing

[Lan2007b [Lan2007b] Marc Langheinrich, Remo Marti: “RFID Privacy Using Spatially Distributed Shared Secrets.” Proc. of UCS 2007, Tokyo, Japan, November 26-28, 2007.

slide-31
SLIDE 31

Shamir tag challenge [Lan2007b]

Range vs readability Range vs. readability

If read range is too long, easy to read long enough

Ideal very short range to force very close readout

Ideal: very short range to force very close readout

B t h i th t l t d?

But where is the tag located?

Short range: tag hard to find

11/29/2007 31 Personal Privacy in Ubiquitous Computing

[Lan2007b [Lan2007b] Marc Langheinrich, Remo Marti: “RFID Privacy Using Spatially Distributed Shared Secrets.” Proc. of UCS 2007, Tokyo, Japan, November 26-28, 2007.

slide-32
SLIDE 32

Goal: make finding the (short range) tag easy

Idea: spread the Shamir shares across the item

E.g., woven into the garment No single locus of information

g

„Super-distributed RFID tag infrastructures“

[Bohn & Mattern 2004]

[Bohn & Mattern 2004]

Sweep reader across surface

Effort varies with spatial distribution Effort varies with spatial distribution,

# of different Shamir shares, Shamir threshold (shares needed) ( )

11/29/2007 32 Personal Privacy in Ubiquitous Computing

slide-33
SLIDE 33

Multi-item identification

Problem: multiple overlapping polynomials Problem: multiple overlapping polynomials

Item 1 Item?

Unable to differentiate Shamir shares from different items!

Item 2 Item?

11/29/2007 33 Personal Privacy in Ubiquitous Computing

Item 2

slide-34
SLIDE 34

Separating Shamir polynomials

Use prefix? Makes tags trivial to track! Use prefix? Makes tags trivial to track! Idea: cluster Shamir shares to keep items apart

All ti if h h h b d

Allows separation if enough shares have been read

11/29/2007 Personal Privacy in Ubiquitous Computing 34

slide-35
SLIDE 35

Separating Shamir polynomials

Use prefix? Makes tags trivial to track! Use prefix? Makes tags trivial to track! Idea: cluster Shamir shares to keep items apart

All ti if h h h b d

Allows separation if enough shares have been read

Lagrange interpolation

11/29/2007 35 Personal Privacy in Ubiquitous Computing

slide-36
SLIDE 36

Separating Shamir polynomials

Use prefix? Makes tags trivial to track! Use prefix? Makes tags trivial to track! Idea: cluster Shamir shares to keep items apart

All ti if h h h b d

Allows separation if enough shares have been read

Lagrange interpolation

11/29/2007 36 Personal Privacy in Ubiquitous Computing

slide-37
SLIDE 37

Cluster methods for Shamir shares

Ch d id di i Ch d “ l i i

Grid-based Grid-based Line-based Line-based

  • Choose random grid dimensions

and origin

  • Select grid subset & use points
  • Choose „random“ slope, origin
  • Use points within known width
  • To detect: begin with random

g p

  • To detect: Substractive Clustering

Algorithm [Chiu‘94] C lli i D t t l l t To detect: begin with random point and find line (8 directions)

  • Repeat until all points assigned
  • Collisions: Detect larger clusters
  • Collisions: Line crossings

11/29/2007 Personal Privacy in Ubiquitous Computing 37

slide-38
SLIDE 38

Evaluation

Unauthorized readout? Instant identification? Unauthorized readout? Instant identification? Traceability of bitwise released Shamir shares?

S [L ] f d t il b th

See [Lan2007a] for details on both

Here: how well does item discrimination work? And: how does clustering affect traceability?

g y

[ ]

11/29/2007 38 Personal Privacy in Ubiquitous Computing

[Lan2007a Lan2007a] Marc Langheinrich, Remo Marti: “Practical Minimalist Cryptography for RFID Privacy.” IEEE Systems Journal, Special Issue on RFID Technology, 1(1), December 2007.

slide-39
SLIDE 39

Detection rates (item discrimination)

Using simulator we ran 100 iterations of Using simulator, we ran 100 iterations of

Generate 1-10 items with 400-800 tags each (Shamir

threshold of 40-80% of tags) threshold of 40 80% of tags)

Read 80-100% of all tags Run clustering algorithm Run clustering algorithm

& note identification rates

11/29/2007 39 Personal Privacy in Ubiquitous Computing

slide-40
SLIDE 40

Detection rates (simulation, 1-10 items)

8 % 100.00% 94 00% 96.00% 98.00% rate 90 00% 92.00% 94.00% grid line etection 86.00% 88.00% 90.00% D 86.00% 100% 90% 80% Percentage of Shamir shares read

11/29/2007 Personal Privacy in Ubiquitous Computing 40

Percentage of Shamir shares read

slide-41
SLIDE 41

Detection rates (simulation, 1-20 items)

8 % 100.00% rate 94 00% 96.00% 98.00% etection 90 00% 92.00% 94.00% grid line D 86.00% 88.00% 90.00% Percentage of Shamir shares read 86.00% 100% 90% 80%

11/29/2007 Personal Privacy in Ubiquitous Computing 41

Percentage of Shamir shares read

slide-42
SLIDE 42

Traceability (qualitative)

„Short“ readouts do not make clusters visible

Example below: ~45 shares, 15 items, ~800 shares each

Large „p x n“ space facilitates grid-based tracing

Large „p x n space facilitates grid based tracing

The „emptier“ the space, the easier grid to spot Line-based method more robust

11/29/2007 42 Personal Privacy in Ubiquitous Computing

slide-43
SLIDE 43

Summing Up! Summing Up!

11/29/2007 Personal Privacy in Ubiquitous Computing 43

slide-44
SLIDE 44

Take Home Message(s)

Privacy is more than just „good security“

Privacy is more than just „good security

It‘s about sharing and control

Smart environments pose new challenges

p g

Novel data types, increased # of incidents, implicit

interactions

i d i b bl b f l!

Security and privacy must be usable to be useful!

Almost never primary goals, get easily „in the way“

Goal: security/privacy mechanisms that „just work“

Shamir Tags: protection from unauthorized readouts Shamir Tags: protection from unauthorized readouts

11/29/2007 Personal Privacy in Ubiquitous Computing 44

slide-45
SLIDE 45

SPMU’08: Security & Privacy I i M bil Ph U Issues in Mobile Phone Use

Secure payment/ticketing and authentication systems

Secure payment/ticketing and authentication systems

Usability issues in mobile phone security/privacy Public perception legal and social issues

Public perception, legal, and social issues

Digital rights management on mobile phones Options for using mobile phones in law enforcement Options for using mobile phones in law enforcement Organized by:

See: www.vs.inf.ethz.ch/events/spmu08/

Organized by:

Rene Mayrhofer (Lancaster University, UK) Marc Langheinrich (ETH Zurich, Switzerland)

g ( u , )

Alexander De Luca (LMU Munich, Germany)

11/29/2007 Personal Privacy in Ubiquitous Computing 45