首页 > 最新文献

Proceedings of the 2017 on Multimedia Privacy and Security最新文献

英文 中文
Approximate Thumbnail Preserving Encryption 近似缩略图保留加密
Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137621
Byron Marohn, C. V. Wright, W. Feng, Mike Rosulek, R. Bobba
Thumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext image that has roughly the same thumbnail as well as retaining the original image format. At the same time, TPE allows users to take advantage of much of the functionality of online photo management tools, while still providing some level of privacy against the service provider. In this work we present two new approximate TPE encryption schemes. In our schemes, ciphertexts and plaintexts have perceptually similar, but not identical, thumbnails. Our constructions are the first TPE schemes designed to work well with JPEG compression. In addition, we show that they also have provable security guarantees that characterize precisely what information about the plaintext is leaked by the ciphertext image. We empirically evaluate our schemes according to the similarity of plaintext & ciphertext thumbnails, increase in file size under JPEG compression, preservation of perceptual image hashes, among other aspects. We also show how approximate TPE can be an effective tool to thwart inference attacks by machine-learning image classifiers, which have shown to be effective against other image obfuscation techniques.
缩略图保存加密(TPE)是Wright等人[信息隐藏与多媒体安全研讨会2015]提出的,作为一种平衡在线图像共享的隐私和可用性的方法。其思想是将明文图像加密为具有大致相同缩略图并保留原始图像格式的密文图像。与此同时,TPE允许用户利用在线照片管理工具的大部分功能,同时仍然提供一定程度的隐私,不受服务提供商的侵犯。在这项工作中,我们提出了两种新的近似TPE加密方案。在我们的方案中,密文和明文具有感知上相似但不相同的缩略图。我们的结构是第一个设计用于JPEG压缩的TPE方案。此外,我们还展示了它们还具有可证明的安全保证,可以精确地描述密文图像泄露的明文信息。我们根据明文和密文缩略图的相似性、JPEG压缩下文件大小的增加、感知图像哈希的保存等方面对我们的方案进行了经验评估。我们还展示了近似TPE如何成为阻止机器学习图像分类器推理攻击的有效工具,机器学习图像分类器已被证明对其他图像混淆技术有效。
{"title":"Approximate Thumbnail Preserving Encryption","authors":"Byron Marohn, C. V. Wright, W. Feng, Mike Rosulek, R. Bobba","doi":"10.1145/3137616.3137621","DOIUrl":"https://doi.org/10.1145/3137616.3137621","url":null,"abstract":"Thumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext image that has roughly the same thumbnail as well as retaining the original image format. At the same time, TPE allows users to take advantage of much of the functionality of online photo management tools, while still providing some level of privacy against the service provider. In this work we present two new approximate TPE encryption schemes. In our schemes, ciphertexts and plaintexts have perceptually similar, but not identical, thumbnails. Our constructions are the first TPE schemes designed to work well with JPEG compression. In addition, we show that they also have provable security guarantees that characterize precisely what information about the plaintext is leaked by the ciphertext image. We empirically evaluate our schemes according to the similarity of plaintext & ciphertext thumbnails, increase in file size under JPEG compression, preservation of perceptual image hashes, among other aspects. We also show how approximate TPE can be an effective tool to thwart inference attacks by machine-learning image classifiers, which have shown to be effective against other image obfuscation techniques.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An NSF View of Multimedia Privacy and Security: Extended Abstract 多媒体隐私与安全的NSF观点:扩展摘要
Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137622
J. Epstein
Multimedia introduces whole new worlds of opportunities and challenges for security and privacy. The NSF Secure and Trustworthy Cyberspace (SaTC) program funds a wide range of research in the area, and welcomes proposals for additional areas. This extended abstract identifies some of the topic areas that have been funded in the past and are of interest for the future.
多媒体为安全和隐私带来了全新的机遇和挑战。NSF安全和可信网络空间(SaTC)项目资助该领域的广泛研究,并欢迎其他领域的建议。这个扩展的摘要确定了过去已经资助的一些主题领域,并对未来感兴趣。
{"title":"An NSF View of Multimedia Privacy and Security: Extended Abstract","authors":"J. Epstein","doi":"10.1145/3137616.3137622","DOIUrl":"https://doi.org/10.1145/3137616.3137622","url":null,"abstract":"Multimedia introduces whole new worlds of opportunities and challenges for security and privacy. The NSF Secure and Trustworthy Cyberspace (SaTC) program funds a wide range of research in the area, and welcomes proposals for additional areas. This extended abstract identifies some of the topic areas that have been funded in the past and are of interest for the future.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4: Intrusion Detection and Prevention 会话详细信息:会话4:入侵检测和防御
Pub Date : 2017-10-30 DOI: 10.1145/3252985
K. Rohloff
{"title":"Session details: Session 4: Intrusion Detection and Prevention","authors":"K. Rohloff","doi":"10.1145/3252985","DOIUrl":"https://doi.org/10.1145/3252985","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2: Invited Talk: Mr. Jeremy Epstein, National Science Foundation 第二部分:特邀演讲:Jeremy Epstein先生,美国国家科学基金会
Pub Date : 2017-10-30 DOI: 10.1145/3252983
Roger A. Hallman
{"title":"Session details: Session 2: Invited Talk: Mr. Jeremy Epstein, National Science Foundation","authors":"Roger A. Hallman","doi":"10.1145/3252983","DOIUrl":"https://doi.org/10.1145/3252983","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: Privacy 会话详细信息:会话1:隐私
Pub Date : 2017-10-30 DOI: 10.1145/3252982
K. Rohloff
{"title":"Session details: Session 1: Privacy","authors":"K. Rohloff","doi":"10.1145/3252982","DOIUrl":"https://doi.org/10.1145/3252982","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2017 on Multimedia Privacy and Security 2017多媒体隐私与安全论文集
Pub Date : 2017-10-30 DOI: 10.1145/3137616
Roger A. Hallman, K. Rohloff, Victor Chang
It is our great pleasure to welcome you to the 1st International Workshop on Multimedia Privacy and Security - MPS 2017. We are pleased to present this newly-established workshop that brings together researchers and practitioners in the fields of multimedia, data privacy, and cybersecurity. MPS 2017 highlights the important intersection of these fields that has been brought about by the emergence and widespread adoption of social media, Internet of Things (IoT), and other ubiquitous computing platforms. Indeed, with the rise of social media, mobile technologies, cloud services, and IoT, massive quantities of multimedia content are created and disseminated as users post updates that include personal information, video and audio data, and other analytical information. Multimedia has arguably expanded well beyond the scope of its original definition. Our call for papers attracted submissions from North America, Central America, Asia, and Europe. We received seven submissions, of which three were selected as Full Papers (42%) and two were accepted as Short Papers after a double-blind review by our program committee. In addition to these presentations, we will feature an invited keynote address and discussion panel: An NSF View of Multimedia Privacy and Security, Mr. Jeremy Epstein (Deputy Division Director, Computer and Network Systems, National Science Foundation) Multimedia Security and Privacy with IoT and Social Networks, moderated by Kurt Rohloff and Roger Hallman
我们非常高兴欢迎您参加第一届多媒体隐私与安全国际研讨会- MPS 2017。我们很高兴地介绍这个新成立的研讨会,它汇集了多媒体、数据隐私和网络安全领域的研究人员和实践者。MPS 2017强调了社交媒体、物联网(IoT)和其他无处不在的计算平台的出现和广泛采用所带来的这些领域的重要交集。事实上,随着社交媒体、移动技术、云服务和物联网的兴起,大量的多媒体内容被创建和传播,因为用户发布更新,包括个人信息、视频和音频数据以及其他分析信息。多媒体可以说已经远远超出了它最初定义的范围。我们的论文征集活动吸引了来自北美、中美洲、亚洲和欧洲的投稿。我们收到了7篇投稿,其中3篇(42%)被项目委员会双盲评审为全文,2篇为短文。除了这些演讲,我们还将邀请主题演讲和讨论小组:美国国家科学基金会对多媒体隐私和安全的看法,Jeremy Epstein先生(美国国家科学基金会计算机和网络系统副主任)与物联网和社交网络的多媒体安全和隐私,由Kurt Rohloff和Roger Hallman主持
{"title":"Proceedings of the 2017 on Multimedia Privacy and Security","authors":"Roger A. Hallman, K. Rohloff, Victor Chang","doi":"10.1145/3137616","DOIUrl":"https://doi.org/10.1145/3137616","url":null,"abstract":"It is our great pleasure to welcome you to the 1st International Workshop on Multimedia Privacy and Security - MPS 2017. We are pleased to present this newly-established workshop that brings together researchers and practitioners in the fields of multimedia, data privacy, and cybersecurity. MPS 2017 highlights the important intersection of these fields that has been brought about by the emergence and widespread adoption of social media, Internet of Things (IoT), and other ubiquitous computing platforms. Indeed, with the rise of social media, mobile technologies, cloud services, and IoT, massive quantities of multimedia content are created and disseminated as users post updates that include personal information, video and audio data, and other analytical information. Multimedia has arguably expanded well beyond the scope of its original definition. \u0000 \u0000Our call for papers attracted submissions from North America, Central America, Asia, and Europe. We received seven submissions, of which three were selected as Full Papers (42%) and two were accepted as Short Papers after a double-blind review by our program committee. In addition to these presentations, we will feature an invited keynote address and discussion panel: \u0000An NSF View of Multimedia Privacy and Security, Mr. Jeremy Epstein (Deputy Division Director, Computer and Network Systems, National Science Foundation) \u0000Multimedia Security and Privacy with IoT and Social Networks, moderated by Kurt Rohloff and Roger Hallman","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 3: Image and Video Security 会议详情:会议3:图像和视频安全
Pub Date : 2017-10-30 DOI: 10.1145/3252984
Roger A. Hallman
{"title":"Session details: Session 3: Image and Video Security","authors":"Roger A. Hallman","doi":"10.1145/3252984","DOIUrl":"https://doi.org/10.1145/3252984","url":null,"abstract":"","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures 基于自编码器的wifi位置数据擦除重构方法研究
Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137620
Tetsushi Ohki, Akira Otsuka
Anonymization is one of the major processes to protect location-based services (LBS) from privacy leakage. However, there are many discussions about de-anonymization attacks to LBS and whether anonymization processing is a sufficient countermeasure for privacy leakage. In this paper, we proposed a novel method to reconstruct the location of user considering the time series using the Markov Transition Field (MTF) and Denoising Auto Encoder (DAE). We also focused on Wi-Fi location data including many erasures errors. We conducted an evaluation of de-anonymization attack using our reconstruction method to the Wi-Fi location dataset that was consisted of 10000 devices / four weeks in the four wards of Tokyo. We confirmed that the successful attack rate (SAR) was 24% when the number of candidate devices was 100 and 6% when that was 10000 devices.
匿名化是保护基于位置的服务(LBS)免受隐私泄露的主要过程之一。然而,对于LBS的去匿名化攻击,以及匿名化处理是否足以作为隐私泄露的对策,有很多讨论。本文提出了一种基于马尔可夫过渡场(MTF)和去噪自动编码器(DAE)的时间序列重构用户位置的新方法。我们还关注Wi-Fi位置数据,包括许多擦除错误。我们使用我们的重建方法对东京四个区由10000台设备/四周组成的Wi-Fi位置数据集进行了去匿名化攻击评估。我们确认,当候选设备数量为100时,成功攻击率(SAR)为24%,当候选设备数量为10000时,成功攻击率为6%。
{"title":"A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures","authors":"Tetsushi Ohki, Akira Otsuka","doi":"10.1145/3137616.3137620","DOIUrl":"https://doi.org/10.1145/3137616.3137620","url":null,"abstract":"Anonymization is one of the major processes to protect location-based services (LBS) from privacy leakage. However, there are many discussions about de-anonymization attacks to LBS and whether anonymization processing is a sufficient countermeasure for privacy leakage. In this paper, we proposed a novel method to reconstruct the location of user considering the time series using the Markov Transition Field (MTF) and Denoising Auto Encoder (DAE). We also focused on Wi-Fi location data including many erasures errors. We conducted an evaluation of de-anonymization attack using our reconstruction method to the Wi-Fi location dataset that was consisted of 10000 devices / four weeks in the four wards of Tokyo. We confirmed that the successful attack rate (SAR) was 24% when the number of candidate devices was 100 and 6% when that was 10000 devices.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"949 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Spying and Fraud Browser Extensions: Short Paper 检测间谍和欺诈浏览器扩展:短论文
Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137619
G. Varshney, M. Misra, P. Atrey
Due to the flaws in policy followed by web browsers for granting permissions to browser extensions and due to a lack of effective static and dynamic detection systems for identifying malicious extensions uploaded on the web stores, malicious browser extensions have become the easiest way to carry out phishing, spying, fraud and other kinds of advanced attacks. This paper identifies and analyzes a subset of these attacks which can be performed with the use of malicious browser extensions (using Google Chrome) and discusses the research gaps of the existing prevention and detection schemes to adequately defend against these attacks. An initial set of malicious signatures responsible for cyber fraud and spying is identified during the study. We use this set of signatures to develop a lightweight malicious extension detection system which can alert users of suspected spying or fraud extensions installed on the Chrome browser on a PC. Results show that the proposed detection system performs better than known malicious extension detectors such as Chrome Cleanup tool and Chrome safeguard tool.
由于web浏览器授予浏览器扩展权限的策略存在缺陷,并且由于缺乏有效的静态和动态检测系统来识别上传到web商店的恶意扩展,恶意浏览器扩展已成为进行网络钓鱼,间谍,欺诈和其他类型高级攻击的最简单方法。本文识别并分析了这些攻击的一个子集,这些攻击可以通过使用恶意浏览器扩展(使用谷歌Chrome)来执行,并讨论了现有预防和检测方案的研究差距,以充分防御这些攻击。在研究期间,确定了一组负责网络欺诈和间谍活动的初始恶意签名。我们使用这组签名来开发一个轻量级的恶意扩展检测系统,该系统可以提醒用户在PC上安装在Chrome浏览器上的可疑间谍或欺诈扩展。结果表明,该检测系统的性能优于已知的恶意扩展检测工具,如Chrome Cleanup工具和Chrome safeguard工具。
{"title":"Detecting Spying and Fraud Browser Extensions: Short Paper","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1145/3137616.3137619","DOIUrl":"https://doi.org/10.1145/3137616.3137619","url":null,"abstract":"Due to the flaws in policy followed by web browsers for granting permissions to browser extensions and due to a lack of effective static and dynamic detection systems for identifying malicious extensions uploaded on the web stores, malicious browser extensions have become the easiest way to carry out phishing, spying, fraud and other kinds of advanced attacks. This paper identifies and analyzes a subset of these attacks which can be performed with the use of malicious browser extensions (using Google Chrome) and discusses the research gaps of the existing prevention and detection schemes to adequately defend against these attacks. An initial set of malicious signatures responsible for cyber fraud and spying is identified during the study. We use this set of signatures to develop a lightweight malicious extension detection system which can alert users of suspected spying or fraud extensions installed on the Chrome browser on a PC. Results show that the proposed detection system performs better than known malicious extension detectors such as Chrome Cleanup tool and Chrome safeguard tool.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks 解开阿里阿德涅的身份线索:健身追踪器和在线社交网络的隐私风险
Pub Date : 2017-10-30 DOI: 10.1145/3137616.3137617
Angeliki Aktypi, Jason R. C. Nurse, M. Goldsmith
The recent expansion of Internet of Things (IoT) and the grow- ing trends towards a healthier lifestyle, have been followed by a proliferation in the use of tness-trackers in our daily life. These wearable IoT devices combined with the extensive use by individu- als of Online Social Networks (OSNs) have raised many security and privacy concerns. Individuals enrich the content of their online posts with their physical performance and attendance at sporting events, without considering the plausible risks that this may result in. This paper aims to examine the potential exposure of users- identity that is caused by information that they share online and personal data that are stored by their tness-trackers. We approach the privacy concerns that arise by building an interactive tool. This tool models online information shared by individuals and elaborates on how they might be exposed to the unwanted leakage of further personal data. The tool also illustrates the privacy risks that arise from information that people expose, which could be exploited by malicious parties such as fraudsters, stalkers and other online and o ine criminals. To understand the level of users-awareness con- cerning their identity exposure when engaging with such devices and online services, we also have conducted a qualitative analysis and present our ndings here.
最近物联网(IoT)的扩展和健康生活方式的增长趋势,已经在我们的日常生活中使用了大量的健身追踪器。这些可穿戴物联网设备与个人在线社交网络(osn)的广泛使用相结合,引发了许多安全和隐私问题。个人用他们的身体表现和参加体育赛事来丰富他们在线帖子的内容,而不考虑这可能导致的貌似合理的风险。本文旨在研究用户的潜在暴露——由他们在网上分享的信息和由他们的身份跟踪器存储的个人数据引起的身份暴露。我们通过构建一个交互式工具来解决隐私问题。该工具对个人共享的在线信息进行建模,并详细说明他们可能如何暴露于不必要的进一步个人数据泄露。该工具还说明了人们暴露的信息所带来的隐私风险,这些信息可能被骗子、跟踪者和其他在线和网络犯罪分子等恶意方利用。为了了解用户在使用这些设备和在线服务时对自己身份暴露的意识程度,我们还进行了定性分析,并在这里展示了我们的结论。
{"title":"Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks","authors":"Angeliki Aktypi, Jason R. C. Nurse, M. Goldsmith","doi":"10.1145/3137616.3137617","DOIUrl":"https://doi.org/10.1145/3137616.3137617","url":null,"abstract":"The recent expansion of Internet of Things (IoT) and the grow- ing trends towards a healthier lifestyle, have been followed by a proliferation in the use of tness-trackers in our daily life. These wearable IoT devices combined with the extensive use by individu- als of Online Social Networks (OSNs) have raised many security and privacy concerns. Individuals enrich the content of their online posts with their physical performance and attendance at sporting events, without considering the plausible risks that this may result in. This paper aims to examine the potential exposure of users- identity that is caused by information that they share online and personal data that are stored by their tness-trackers. We approach the privacy concerns that arise by building an interactive tool. This tool models online information shared by individuals and elaborates on how they might be exposed to the unwanted leakage of further personal data. The tool also illustrates the privacy risks that arise from information that people expose, which could be exploited by malicious parties such as fraudsters, stalkers and other online and o ine criminals. To understand the level of users-awareness con- cerning their identity exposure when engaging with such devices and online services, we also have conducted a qualitative analysis and present our ndings here.","PeriodicalId":198787,"journal":{"name":"Proceedings of the 2017 on Multimedia Privacy and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
Proceedings of the 2017 on Multimedia Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1