39
Personal Security and Privacy in Personal Security and Privacy in Ubiquitous Computing Marc Langheinrich Institute for Pervasive Computing Institute for Pervasive Computing ETH Zurich, Switzerland

Personal Security and Privacy inPersonal Security and Privacy

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Personal Security and Privacy inPersonal Security and Privacy

Personal Security and Privacy inPersonal Security and Privacy in Ubiquitous Computing

Marc LangheinrichInstitute for Pervasive ComputingInstitute for Pervasive ComputingETH Zurich, Switzerland

Page 2: Personal Security and Privacy inPersonal Security and Privacy

Approaches to Security & Privacy in UbicompDisappearing Computer Troubadour Project (10/02 05/03)Disappearing Computer Troubadour Project (10/02 - 05/03)

Promote Absence of Protection as User EmpowermentPromote Absence of Protection as User Empowerment„ It's maybe about letting them find their own ways of cheating”

Make it Someone Elses Problem„For [my colleague] it is more appropriate to think about [security and privacy] issues. It’s not really the case in my case”

Insist that “Good Security” will Fix It„All you need is really good firewalls“

C l d it i I tibl ith Ubi it C tiConclude it is Incompatible with Ubiquitous Computing„I think you can't think of privacy... it's impossible, because if I do it, I have troubles with finding [a] Ubicomp future”

Personal Security and Privacy in Ubiquitous Computing 2

I have troubles with finding [a] Ubicomp future

19.11.2007

Page 3: Personal Security and Privacy inPersonal Security and Privacy

Today‘s Topics

What is Privacy and Why Should We Want It?What is Privacy and Why Should We Want It?

H d F t S t E i t Ch llHow do Future Smart Environments Challenge Existing Solutions?

How Less Security Can (Sometimes) Increase yPrivacy

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 3

Page 4: Personal Security and Privacy inPersonal Security and Privacy

The Vision of Ubiquitous Computing„The most profound technologies are those that disappear. They weave themselves into the fabric of everyday lif til th i di ti i h bllife until they are indistinguishable from it.“

Mark Weiser (1952 – 1999), XEROX PARC

Basic Motivation of Ubiquitous ComputingThe computer as a tool for the everydayThings are aware of each other and the environmentIntegrating computers with intuitive user interfaces

Personal Security and Privacy in Ubiquitous Computing 419.11.2007

Page 5: Personal Security and Privacy inPersonal Security and Privacy

Energy-Efficient Heating

Sensors Inside and OutsideSensors Inside and OutsideTakes Weather Forecast into Account„Conspires“ with Car of Owner & E-Agenda to know Time of Arrivalknow Time of Arrival

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 5

Page 6: Personal Security and Privacy inPersonal Security and Privacy

Instead of „World inside the Computer“...

Not like this! World inside Computer would be Virtual Reality

Personal Security and Privacy in Ubiquitous Computing 619.11.2007

Page 7: Personal Security and Privacy inPersonal Security and Privacy

„Computer in the World“

!!

Personal Security and Privacy in Ubiquitous Computing 719.11.2007

Page 8: Personal Security and Privacy inPersonal Security and Privacy

Is Technology a Good Predictor?

Past PredictionsPast Predictions…

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 8

Page 9: Personal Security and Privacy inPersonal Security and Privacy

Societal Trends (Ubicomp Drivers)

Higher EfficiencyHigher EfficiencyLean production (Overproduction, Out-of-Stock)Targeted Sales (1-1 Marketing)Targeted Sales (1 1 Marketing)

More ConvenienceFinding your way (e g travel assistants)Finding your way (e.g., travel assistants)Lower TCO (“total cost of ownership”) w/ pay-per-use

Increased SafetyIncreased SafetyHomeland security (terrorism, drug trafficking, etc.)Road safety & health (e.g., black box for cars)

Personal Security and Privacy in Ubiquitous Computing 9

y & ( g , )

19.11.2007

Page 10: Personal Security and Privacy inPersonal Security and Privacy

So what does this mean for personal privacy?So what does this mean for personal privacy?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 10

Page 11: Personal Security and Privacy inPersonal Security and Privacy

What is Privacy?

The right to be let alone “„The right to be let alone.Louis Brandeis, 1890 (Harvard Law Review)h d i f l t h f l Louis D Brandeis 1856 - 1941„The desire of people to choose freely

under what circumstances and to what t t th ill th l

Louis D. Brandeis, 1856 1941

extent they will expose themselves, their attitude and their behavior to

th “others.“Alan Westin („Privacy And Freedom“, 1967)Prof Emeritus Columbia University Alan Westin

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 11

Prof. Emeritus, Columbia University

Page 12: Personal Security and Privacy inPersonal Security and Privacy

Why Privacy?

Reasons for PrivacyReasons for PrivacyFree from NuisanceIntimacyIntimacyFree to Decide for Oneself

B A th NBy Another Name...Data Protection Informational Self-Determination

Privacy isn‘t just about keeping secrets –

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 12

y j p gdata exchange and transparency are key issues!

Page 13: Personal Security and Privacy inPersonal Security and Privacy

“But I’ve Got Nothing to Hide!”Do you?

Arson Near Youth House NiederwangenArson Near Youth House NiederwangenAt scene of crime: Migros-toolsCourt ordered disclosure of all 133Court ordered disclosure of all 133consumers who bought items on their supermarket loyalty card (8/2004)their supermarket loyalty card (8/2004)

(Arsonist not yet found)“Give me six lines written by the mostGive me six lines written by the most honorable of men, and I will find an excuse in them to hang him” d d l 8 6

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 13

excuse in them to hang him Armand Jean du Plessis, 1585-1642 (a.k.a. Cardinal de Richelieu)

Page 14: Personal Security and Privacy inPersonal Security and Privacy

Ubicomp Privacy Implications

Data CollectionData CollectionScale (everywhere, anytime)Manner (inconspicuous invisible)Manner (inconspicuous, invisible)Motivation (context!)

D t TData TypesObservational instead of factual data

Data Access“The Internet of Things”

Personal Security and Privacy in Ubiquitous Computing 1419.11.2007

Page 15: Personal Security and Privacy inPersonal Security and Privacy

How do we achieve privacy?How do we achieve privacy?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 15

Page 16: Personal Security and Privacy inPersonal Security and Privacy

Privacy – Not Just a Recent Fad

Justices Of The Peace Act (England 1361)Justices Of The Peace Act (England, 1361)Sentences for Eavesdropping and Peeping Toms

The poorest man may in his cottage bid defiance to all„The poorest man may in his cottage bid defiance to all the force of the crown. It may be frail; its roof may shake; … – but the king of England cannot enter; all his forces… but the king of England cannot enter; all his forces dare not cross the threshold of the ruined tenement“

William Pitt the Elder (1708-1778)( 7 77 )

First Data Protection Law in the World in Hesse1970

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 16

Page 17: Personal Security and Privacy inPersonal Security and Privacy

The Fair Information Principles (FIP)

Drawn up by the OECD 1980Drawn up by the OECD, 1980“Organisation for economic cooperation and development”Voluntary guidelines for member statesy gGoal: ease transborder flow of goods (and information!)

Five Principles (simplified)

1. Openness2. Data access and control

4. Collection Limitation5. Data subject’s consent

Core principles of most modern privacy laws

3. Data security

Personal Security and Privacy in Ubiquitous Computing 17

Implication: Technical solutions must support FIP

19.11.2007

Page 18: Personal Security and Privacy inPersonal Security and Privacy

1. Challenge: Openness

No Hidden Data Collection!No Hidden Data Collection!Legal requirement in many countries

Established Means: Privacy PoliciesEstablished Means: Privacy PoliciesWho, what, why, how long, etc. ...

How to Publish Policies in Smart Environments?How to Publish Policies in Smart Environments?Is a poster enough? A paragraph of fine print?

Too Many Transactions?Too Many Transactions?Countless announcements an annoyance

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 18

Page 19: Personal Security and Privacy inPersonal Security and Privacy

2. Challenge: Access & Control

Identifiable Data Must be AccessibleIdentifiable Data Must be AccessibleUsers can review, change, sometimes delete

C ll t M t b A t blCollectors Must be AccountablePrivacy-aware storage technology

When Does Sensor Data Become Identifiable?Even anonymized data can identify people (AOL case)

Who to Ask? How to Verify? How to Display?Who was reading me when? Is this really my trace?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 19

g y y

Page 20: Personal Security and Privacy inPersonal Security and Privacy

3. Challenge: Data Security

Traditional Approach: Centralistic AuthenticationTraditional Approach: Centralistic AuthenticationPowerful centralized system with known user listPlan for worst case scenario (powerful attacker)

Numerous, Spontaneous InteractionsHow do I know who I communicate with, who to trust?

h d “b ” k ?How much extra time does “being secure” take?Complex Real-World Situations

Access to my medical data in case of emergency?Access to my medical data in case of emergency?Context-Dependent Security?

Based on battery power data type location situation

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 20

Based on battery power, data type, location, situation

Page 21: Personal Security and Privacy inPersonal Security and Privacy

4. Challenge: Data Minimization

Only collect as much information as neededOnly collect as much information as neededNo in-advance data collection for future uses

B t / d d tBest: use anonymous/pseudonymous dataNo consent, security, access needed

How much data is needed for becoming “smart”?No useless data in smart environments (context!)

Sometimes one cannot hide!Sensor data (biometrics) hard to anonymize

Slide 21

( ) y

19.11.2007 Personal Security and Privacy in Ubiquitous Computing

Page 22: Personal Security and Privacy inPersonal Security and Privacy

5. Challenge: Consent

Participation Requires Explicit ConsentParticipation Requires Explicit ConsentUsually a signature or pressing a button

True Consent Requires True ChoiceTrue Consent Requires True ChoiceMore than „take it or leave it“, needs alternatives

How to Ask “On The Fly”?How to Ask On The Fly ?The mobile phone as a background agent (legal issues?)

Consenting to What?Consenting to What?Do I understand the implications?D I h ti ?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 22

Do I have options?

Page 23: Personal Security and Privacy inPersonal Security and Privacy

Ubicomp Challenges to Security & Privacy

1 How to inform subjects about data1. How to inform subjects about datacollections?

2 How to provide access to stored data?2. How to provide access to stored data?3. How to ensure confidentiality, integrity,

d h i i ( li i )?and authenticity (w/o alienating user)?4. How to minimize data collection?5. How to obtain consent from data subjects?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 23

Page 24: Personal Security and Privacy inPersonal Security and Privacy

Public Concern over Unauthorized RFID Access

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 24

Page 25: Personal Security and Privacy inPersonal Security and Privacy

Unauthorized RFID Access – Implications Passport:Name: John DoeNationality: USA

Visa for: Isreal

WigModell #2342

Material: Polyester

Visa for: Isreal

ator

ies

Juel

s, RS

A La

bora

Tiger Tanga: Manufacturer: Woolworth

Washed: 736

ork (

c) 2

006

Ari J

Wallet:Contents: 370 Euro

Viagra: Manufacturer: Pfitzer

RFID

-Man

” Art

wo

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 25

:Contents: 370 EuroDisability Card: #2845Extra Large Package

Orig

inal

“R

Page 26: Personal Security and Privacy inPersonal Security and Privacy

Securing RFID Access

General Principle: Lock/Unlock ID With PasswordGeneral Principle: Lock/Unlock ID With PasswordTag only replies if correct password/secret is sent

Requires RFID-Owner to Know Secretd b f d h k ( h )Password must be transferred at checkout (where to?)

Requires Owner to Know Which Secret to UseRequires Owner to Know Which Secret to UseChicken And Egg Problem: If you don‘t know what tag it is how do you know what password to use?it is, how do you know what password to use?

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 26

Page 27: Personal Security and Privacy inPersonal Security and Privacy

Deactivation and Password Management…

Does Your Solution Work Here?19.11.2007 Personal Security and Privacy in Ubiquitous Computing 27

Page 28: Personal Security and Privacy inPersonal Security and Privacy

Alternative: Shamir TagsA E l f Z M t P i P t tiAn Example for Zero-Managament Privacy Protection

Default: Tags Take Long Time To Read OutDefault: Tags Take Long Time To Read OutComplicates Tracking & Unauthorized IdentificationBitwise release short range (e g one random bit/sec)Bitwise release, short range (e.g., one random bit/sec)Intermediate results meaningless, since encryptedDecryption requires all bits being readDecryption requires all bits being read

But: Known Tags Can be Directly IdentifiedAllows owner to use tags without apparent restrictionsInitial partial release of bits enough for instant id tifi ti f li it d t f k tidentification from a limited set of known tags

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 28

Page 29: Personal Security and Privacy inPersonal Security and Privacy

Secret Shares (Shamir 1979)

Polynomial of degree n can be described using at least n+1 points

P2

P1

P3

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 29

Page 30: Personal Security and Privacy inPersonal Security and Privacy

Secret Shares (Shamir 1979)

P2

P1

P3

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 30

Page 31: Personal Security and Privacy inPersonal Security and Privacy

96 bit EPC C d

011010111…1101 Secret s96‐bit EPC‐Code

106‐bit Shamir Share

111000011…101101 101101101…110111 101010011…101101 Shares hi

111000011101010001010111010101101010100…1010101110101 Shamir Tag318‐bit Shamir Tag

10‐bit x‐value 96‐bit y‐value

g

P2

P1

P3

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 31

Page 32: Personal Security and Privacy inPersonal Security and Privacy

96 bit EPC C d

011010111…1101 Secret s96‐bit EPC‐Code

106‐bit Shamir Share

111000011…101101 101101101…110111 101010011…101101 Shares hi

111000011101010001010111010101101010100…1010101110101 Shamir Tag318‐bit Shamir Tag

10‐bit x‐value 96‐bit y‐value

g

111000011101010001010111010101101010100…1010101110101 Initial Reply16‐bit Reply

Instant identificationof known items

Time

+1 bit

111000011101010001010111010101101010100…1010101110101+1 bit

of known items

osure Over T

+1 bit

111000011101010001010111010101101010100…1010101110101+1 bit

111000011101010001010111010101101010100…1010101110101+1 bit

Bit D

isclo

111000011101010001010111010101101010100…1010101110101+1 bit

+1 bit

111000011101010001010111010101101010100…1010101110101

Unknown tags willeventually be identified

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 32

Page 33: Personal Security and Privacy inPersonal Security and Privacy

Preventing Tracking

000101111010101111101011010100011011010 0110111101001

Tag 3

Readout 3

111000011101010001010111010101101010100…1010101110101

Tag 1

000101111010101111101011010100011011010…0110111101001

Original Readout

Readout 3

Tag 2

111000011101010001010111010101101010100…1010101110101

Tag 1

Readout 1

Readout 2

010100111000110101010110010100001010101…1010100001100Tag 2

Subsequent readouts receive only substring of bitsSubsequent readouts receive only substring of bitsInsufficient data to track tag repeatedlyE.g., tag population of 109 over 3 million tag have 5 bits in commong g p p g

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 33

Page 34: Personal Security and Privacy inPersonal Security and Privacy

# of Overlapping Bits Between 2 Readouts

ator

ies

Juel

s, RS

A La

bora

E.g., a 0.12% chance that the same 5 bit positions are read from >=2 tags

ork (

c) 2

006

Ari J E.g., a 0.12% chance that the same 5 bit positions are read from  2 tags

RFID

-Man

” Art

wo

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 34

Orig

inal

“R

t1 t2

Page 35: Personal Security and Privacy inPersonal Security and Privacy

More Privacy Through Less Security?

Shamir Tags Require No Consumer EffortShamir Tags Require No Consumer EffortDelay upon first use, but no passwords to manage!Not useful for important“ items (passports e money)Not useful for „important items (passports, e-money)Does not alleviate user concerns (tags remain active)

Building Block for Comprehensive SolutionStrong crypto for passports, drug-authenticity, …Clipping/killing for concerned consumersUnconcerned consumers get basic protection „for free“

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 35

Page 36: Personal Security and Privacy inPersonal Security and Privacy

Summing Up!Summing Up!

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 36

Page 37: Personal Security and Privacy inPersonal Security and Privacy

Take Home Message(s)

Privacy is more than just „good security“Privacy is more than just „good securityIt‘s about sharing and control

Smart environments pose new challengesp gNovel data types, increased # of incidents, implicitinteractions

i d i b bl b f l!Security and privacy must be usable to be useful!Almost never primary goals, get easily „in the way“

Goal: security/privacy mechanisms that „just work“Shamir Tags: protection from unauthorized readoutsShamir Tags: protection from unauthorized readouts

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 37

Page 38: Personal Security and Privacy inPersonal Security and Privacy

SPMU’08: Security & Privacy I i M bil Ph UIssues in Mobile Phone Use

Secure payment/ticketing and authentication systemsSecure payment/ticketing and authentication systemsUsability issues in mobile phone security/privacyPublic perception legal and social issuesPublic perception, legal, and social issuesDigital rights management on mobile phonesOptions for using mobile phones in law enforcementOptions for using mobile phones in law enforcement

Organized by:Workshop call soon on: www.pervasive2008.org

Organized by: Rene Mayrhofer (Lancaster University, UK)Marc Langheinrich (ETH Zurich, Switzerland)g ( u , )Alexander De Luca (LMU Munich, Germany)

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 38

Page 39: Personal Security and Privacy inPersonal Security and Privacy

Take Home Message(s) & Thank You!

Privacy is more than just „good security“Privacy is more than just „good securityIt‘s about sharing and control

Smart environments pose new challengesp gNovel data types, increased # of incidents, implicitinteractions

i d i b bl b f l!Security and privacy must be usable to be useful!Almost never primary goals, get easily „in the way“

Goal: security/privacy mechanisms that „just work“E g Shamir Tags: protection from unauthorized readoutsE.g., Shamir Tags: protection from unauthorized readouts

19.11.2007 Personal Security and Privacy in Ubiquitous Computing 39