Big Data: Privacy - SIUE Computer Science

advertisement
REPORT TO THE PRESIDENT
BIG DATA AND PRIVACY:
A TECHNOLOGICAL
PERSPECTIVE
President’s Council of Advisors on
Science and Technology
May 2014
PART TWO: PRIVACY
IS 376
OCTOBER 16, 2014
ENCRYPTION
NETWORKS ARE SET UP TO SEND MESSAGES RIGHT PAST
STATIONS THAT AREN’T AUTHORIZED TO READ THEM, BUT
WHAT’S TO PREVENT SUCH UNAUTHORIZED VIEWING?
message
from
to
message
from
to
THE MOST COMMON SOLUTION TO THIS PROBLEM IS
ENCRYPTION, WHERE THE MESSAGE IS CODED IN SUCH A WAY
THAT ONLY THE RECEIVING STATION CAN DECODE IT.
IS 376
OCTOBER 16, 2014
BIG DATA: PRIVACY
PAGE 2
PUBLIC-KEY ENCRYPTION
FIRE BAD!
FRIEND GOOD!
1.
CREATE
MESSAGE
XSJB2DHDKWB$XZDUND&H
SNQABI?DSJSG%
IS 376
OCTOBER 16, 2014
XSJB2DHDKWB$XZDUND&H
SNQABI?DSJSG%
2.
LOOK UP
RECIPIENT’S
PUBLIC KEY
3.
ENCRYPT MESSAGE
WITH RECIPIENT’S
PUBLIC KEY
FIRE BAD!
FRIEND GOOD!
5.
DECRYPT MESSAGE
WITH RECIPIENT’S
PRIVATE KEY
BIG DATA: PRIVACY
PAGE 3
AUTHENTICATION
HOW CAN A RECEIVING STATION BE SURE THAT A RECEIVED
MESSAGE CAME FROM THE SPECIFIED SOURCE?
message
from
to
THE MOST COMMON SOLUTION TO THIS PROBLEM IS
AUTHENTICATION, WHERE THE MESSAGE IS CODED IN A WAY
THAT ONLY THE REAL SENDING STATION COULD HAVE
ACCOMPLISHED.
IS 376
OCTOBER 16, 2014
BIG DATA: PRIVACY
PAGE 4
KEY-BASED AUTHENTICATION
MA3NDHVYR#BCJAQWPFQKG
UIORKFOHSKXI8VCE%FPGKJF
HIKFVDAMXXYEMFIDEYCHSSF
HSGDHAHDM$DLGLYN7BUCHS
O
BE CAREFUL WHEN YOU
REMOVE THOSE BANDAGES,
DUDE. THEY’LL RIP THE HAIR
RIGHT OFF YOUR SKIN!
2.
ENCRYPT MESSAGE WITH
SENDER’S PRIVATE KEY
1.
CREATE
MESSAGE
MA3NDHVYR#BCJAQWPFQKG
UIORKFOHSKXI8VCE%FPGKJF
HIKFVDAMXXYEMFIDEYCHSSF
HSGDHAHDM$DLGLYN7BUCHS
O
IS 376
OCTOBER 16, 2014
BE CAREFUL WHEN YOU
REMOVE THOSE BANDAGES,
DUDE. THEY’LL RIP THE HAIR
RIGHT OFF YOUR SKIN!
4.
DECRYPT MESSAGE
WITH SENDER’S
PUBLIC KEY
BIG DATA: PRIVACY
PAGE 5
SYMMETRIC CIPHERS
ENSURE PRIVACY AND AUTHENTICATION VIA DOUBLE
ENCRYPTION!
&SADBS1KFBADAA
&SADBS1KFBADAA
APRFDGH9SIJCHZJZ
J%NDMSDNDS4ZZP
IS 376
OCTOBER 16, 2014
I’M SHOPPING
FOR A DOLL FOR
MY YOUNGUNS!
TSG#DFJ4FUDBSZ
VDH?WGFDJED8S
DKJFI
1.
CREATE
MESSAGE
2.
ENCRYPT MESSAGE
WITH SENDER’S
PRIVATE KEY
APRFDGH9SIJCHZJZ
J%NDMSDNDS4ZZP
3.
ENCRYPT MESSAGE
WITH RECIPIENT’S
PUBLIC KEY
I’M SHOPPING
FOR A DOLL FOR
MY YOUNGUNS!
TSG#DFJ4FUDBSZ
VDH?WGFDJED8S
DKJFI
5.
DECRYPT MESSAGE
WITH RECIPIENT’S
PRIVATE KEY
6.
DECRYPT
MESSAGE WITH
SENDER’S
PUBLIC KEY
BIG DATA: PRIVACY
PAGE 6
NOTICE AND CONSENT
THE MOST COMMON
APPROACH TO
ENSURING PRIVACY
ON THE WEB, “NOTICE
AND CONSENT” GIVES
USERS “NOTICE” THAT
WHAT THEY ARE
ABOUT TO DO
(INSTALLING
SOFTWARE,
ACCESSING DATA,
ETC.) CONSTITUTES
THEIR “CONSENT”
THAT THEIR PRIVACY
BE VIOLATED.
IS 376
OCTOBER 16, 2014
BIG DATA: PRIVACY
PAGE 7
ANONYMIZATION
EFFORTS TO ANONYMIZE DATA BY EXCLUDING THOSE DATA
FIELDS THAT ARE CONSIDERED DIRECTLY TIED TO AN INDIVIDUAL
HAVE MET WITH QUESTIONABLE SUCCESS.
THE PERSONAL GENOME
PROJECT (PGP) WAS DESIGNED
TO ACCUMULATE AND
PUBLICLY DISPLAY DNA
INFORMATION, BEHAVIORAL
TRAITS, MEDICAL CONDITIONS,
PHYSICAL CHARACTERISTICS,
AND ENVIRONMENTAL
FACTORS OF THOUSANDS OF
VOLUNTEERS IN AN EFFORT TO
AID RESEARCHERS IN
ESTABLISHING CORRELATIONS
BETWEEN CERTAIN TRAITS
AND TREATMENTS IN
PERSONALIZED MEDICINE.
IS 376
OCTOBER 16, 2014
PGP Data
Medications
Name
Birth
Date
Gender
Diagnoses
Procedures
Zip
Code
Address
Party
Affiliation
Voter
Registration
Data
Date
Registered
WHEN CROSS-CHECKED AGAINST VOTER REGISTRATION
RECORDS, ANONYMIZED PGP VOLUNTEERS WERE
CORRECTLY IDENTIFIED 84% OF THE TIME.
BIG DATA: PRIVACY
PAGE 8
NON-RETENTION
ONE MECHANISM FOR ENSURING PRIVACY HAS BEEN TO DELETE DATA AFTER A
CERTAIN PERIOD OF TIME, BUT SUCH RESTRICTIONS ARE INCREASINGLY
DIFFICULT TO ENFORCE TECHNOLOGICALLY.
SNAPCHAT IS A PHOTO
MESSAGING APPLICATION
DESIGNED TO ALLOW
USERS TO SEND PHOTOS
THAT WILL ONLY BE
AVAILABLE TO RECIPIENTS
FOR A FEW SECONDS.
IS 376
OCTOBER 16, 2014
TO HELP ENSURE
PRIVACY, SNAPCHAT
NOTIFIES THE USER
WHEN A RECIPIENT
TAKES A SCREENSHOT OF
THE RECEIVED IMAGE.
BIG DATA: PRIVACY
VARIOUS NEW
APPLICATIONS (SUCH AS
SNAP-SAVE) HAVE BECOME
AVAILABLE THAT PERMIT
RECIPIENTS TO SAVE SNAPS
PERMANENTLY WITHOUT
INFORMING THE SENDER.
PAGE 9
CONTEXT & USE
THE PRESIDENT’S COUNCIL OF ADVISORS ON SCIENCE AND
TECHNOLOGY ADVOCATE LESS EMPHASIS ON RESTRICTING THE
COLLECTION OF DATA AND MORE ON RESTRICTING ITS USE.
Virtru allows users
to send encrypted
e-mail and
attachments.
IS 376
OCTOBER 16, 2014
Users may revoke
messages, restrict
forwarding, and add
expirations.
BIG DATA: PRIVACY
Administrative functions
allow the sender to see
how and where
information has traveled.
PAGE 10
ACCOUNTABILITY
AS AN EXAMPLE OF RESTRICTING DATA USE RATHER THAN DATA
COLLECTION, THE FAIR CREDIT REPORTING ACT IS A FEDERAL
LAW THAT REGULATES THE USE OF CONSUMER CREDIT
INFORMATION.
•
•
CREDIT BUREAUS ARE
REQUIRED TO PROVIDE
CONSUMERS WITH ANY
INFORMATION THEY
HAVE ABOUT THE
CONSUMERS AND TO
VERIFY THE ACCURACY
OF INFORMATION
DISPUTED BY A
CONSUMER.
UNDER AN
AMENDMENT TO THE
FCRA, CONSUMERS
ARE ABLE TO RECEIVE
ONE FREE CREDIT
REPORT PER YEAR.
IS 376
OCTOBER 16, 2014
•
CREDIT BUREAUS MAY
NOT RETAIN NEGATIVE
INFORMATION FOR AN
EXCESSIVE PERIOD OF
TIME, SEVEN YEARS FOR
LATE PAYMENTS AND
TEN YEARS FOR
BANKRUPTCIES.
BIG DATA: PRIVACY
•
CREDIT BUREAUS MAY
PROVIDE INFORMATION
ONLY TO THOSE WITH A
LEGITIMATE NEED, SUCH
AS WHEN THE
CONSUMER HAS MADE
AN APPLICATION TO A
CREDITOR, A LANDLORD,
OR AN INSURER.
•
CREDIT BUREAUS MAY NOT
GIVE OUT INFORMATION
TO AN EMPLOYER OR A
POTENTIAL EMPLOYER
WITHOUT THE
CONSUMER’S WRITTEN
CONSENT.
PAGE 11
CONSUMER PRIVACY BILL OF RIGHTS
The purpose of the Consumer Privacy
Bill of Rights is to deter Internet
companies from indiscriminate
collection of personal information for
targeted ads.
In response, Internet companies such as
Mozilla, Google, Microsoft, Yahoo!, and
AOL promised to provide a "do not
track" mechanism so that customers can
choose whether they want to participate
in online behavioral advertising.
The Obama Administration encouraged
Congress to grant the Federal Trade
Commission the authority to enforce
each element of the Consumer Privacy
Bill of Rights.
IS 376
OCTOBER 16, 2014
BIG DATA: PRIVACY
PAGE 12
Download