Upload
trantuyen
View
220
Download
4
Embed Size (px)
Citation preview
Privacy Research Paradigms in
Computer ScienceSeda Gürses
MCC / ILI/ ISTC Social Computing
NYU
1Thursday, February 5, 15
2
2Thursday, February 5, 15
solutions from privacy research
3
storage privacy anonymous
communications database anonymization
IDMS
differential Privacy
privacy policy languages
Feedback and Awareness
Systems
attribute based credentials
discrimination aware data mining
private information
retrieval
3Thursday, February 5, 15
privacy research paradigms
privacy as
confidentiality
the right to be let alone. Warren & Brandeis (1890)
concealing information and/or identity (by default)
anonymous communications
storage privacy
4
differential privacy
private information
retrieval
attribute based credentials
4Thursday, February 5, 15
privacy research paradigms
privacy as
confidentiality
the right to be let alone. Warren & Brandeis (1890)
concealing information and/or identity (by default)
5
distributed trust model: avoid single point of failure
data minimization: every bit counts
open source: it takes a village to keep it secure
5Thursday, February 5, 15
privacy research paradigms
privacy as
confidentiality
the right to be let alone. Warren & Brandeis (1890)
concealing information and identity
privacy as control
personal information, FIPPs, transparency
right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)
6
6Thursday, February 5, 15
privacy research paradigms
privacy as control
FIPPs, organizational compliance, data subject participation
right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)
IDMS
Privacy Policy Languages
Privacy Settings
Purpose Based Access
Control
7
database anonymization
Privacy Labels/Signals
7Thursday, February 5, 15
privacy research paradigms
privacy as control
right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)
8
transparency
individual participation
data minimization (diff. trust model)
(DHS) FIPPsFIPPs, organizational compliance, data subject participation
8Thursday, February 5, 15
identity management
9
9Thursday, February 5, 15
privacy policies
10
10Thursday, February 5, 15
privacy research paradigms
privacy as practice
the freedom from unreasonable constraints on the construction of
one’s own identity (Agre, 1999)transparency and feedback
Feedback and Awareness
Systems Discrimination aware data mining
privacy nudges
11
11Thursday, February 5, 15
privacy research paradigms
privacy as practice
the freedom from unreasonable constraints on the construction of
one’s own identity (Agre, 1999)transparency and feedback
12
aid in privacy decision making and nudges
salient controls according to user expectations
support collective practices throughout time
12Thursday, February 5, 15
13Thursday, February 5, 15
14Thursday, February 5, 15
15Thursday, February 5, 15
16Thursday, February 5, 15
privacy research paradigms
privacy as practice
the freedom from unreasonable constraints on the construction of
one’s own identity (Agre, 1999)transparency and feedback
privacy as
confidentiality
the right to be let alone. Warren & Brandeis (1890)
concealing information and identity
privacy as control separation of
identities, FIPPs
right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)
17
17Thursday, February 5, 15
18
service provider implements part: private information retrievalattribute based credentials
autonomous applications: pgpghostery
collaborative applications: distributed SNSTORmulti-party computationopen standards?
dependent solely on service provider:privacy settings on social networkinfo privacy
legislation
priv
acy
func
tiona
lity
depe
nden
cy o
n se
rvic
e pr
ovid
er
18Thursday, February 5, 15
19
people-centric
familyfriendscommunitiescitizensconsumers
infrastructure/techno-centricstandard protocolsbrowsersmobile phones
organization-centricCRMFacebook (as platform and app)Hospital Management System
19Thursday, February 5, 15
Thank you!
20
20Thursday, February 5, 15