首页 > 最新文献

Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium最新文献

英文 中文
Personal information inference from voice recordings: User awareness and privacy concerns 从录音中推断个人信息:用户意识和隐私问题
Jacob Leon Kröger, L. Gellrich, Sebastian Pape, S.R. Brause, Stefan Ullrich
Abstract Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive attributes about a recorded speaker (e. g., geographical origin, health status, personality). We conducted a nationally representative survey in the UK (n = 683, 18–69 years) to investigate people’s awareness about the inferential power of voice and speech analysis. Our results show that – while awareness levels vary between different categories of inferred information – there is generally low awareness across all participant demographics, even among participants with professional experience in computer science, data mining, and IT security. For instance, only 18.7% of participants are at least somewhat aware that physical and mental health information can be inferred from voice recordings. Many participants have rarely (28.4%) or never (42.5%) even thought about the possibility of personal information being inferred from speech data. After a short educational video on the topic, participants express only moderate privacy concern. However, based on an analysis of open text responses, unconcerned reactions seem to be largely explained by knowledge gaps about possible data misuses. Watching the educational video lowered participants’ intention to use voice-enabled devices. In discussing the regulatory implications of our findings, we challenge the notion of “informed consent” to data processing. We also argue that inferences about individuals need to be legally recognized as personal data and protected accordingly.
摘要通过声音特征和表达方式,即使是看似温和的录音也可以揭示被录音者的敏感属性(如地理出身、健康状况、性格)。我们在英国(n=683,18-69岁)进行了一项具有全国代表性的调查,以调查人们对声音和言语分析的推理能力的认识。我们的研究结果表明,尽管不同类别的推断信息的意识水平各不相同,但所有参与者的意识普遍较低,即使是在具有计算机科学、数据挖掘和IT安全专业经验的参与者中也是如此。例如,只有18.7%的参与者至少在一定程度上意识到,可以从录音中推断出身体和心理健康信息。许多参与者很少(28.4%)或从未(42.5%)想过从语音数据推断个人信息的可能性。在关于这个话题的简短教育视频之后,参与者只表达了适度的隐私问题。然而,基于对开放文本反应的分析,不关心的反应似乎在很大程度上是由关于可能的数据滥用的知识差距所解释的。观看教育视频降低了参与者使用语音设备的意愿。在讨论我们的研究结果的监管影响时,我们对数据处理的“知情同意”概念提出了质疑。我们还认为,关于个人的推断需要被法律承认为个人数据,并得到相应的保护。
{"title":"Personal information inference from voice recordings: User awareness and privacy concerns","authors":"Jacob Leon Kröger, L. Gellrich, Sebastian Pape, S.R. Brause, Stefan Ullrich","doi":"10.2478/popets-2022-0002","DOIUrl":"https://doi.org/10.2478/popets-2022-0002","url":null,"abstract":"Abstract Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive attributes about a recorded speaker (e. g., geographical origin, health status, personality). We conducted a nationally representative survey in the UK (n = 683, 18–69 years) to investigate people’s awareness about the inferential power of voice and speech analysis. Our results show that – while awareness levels vary between different categories of inferred information – there is generally low awareness across all participant demographics, even among participants with professional experience in computer science, data mining, and IT security. For instance, only 18.7% of participants are at least somewhat aware that physical and mental health information can be inferred from voice recordings. Many participants have rarely (28.4%) or never (42.5%) even thought about the possibility of personal information being inferred from speech data. After a short educational video on the topic, participants express only moderate privacy concern. However, based on an analysis of open text responses, unconcerned reactions seem to be largely explained by knowledge gaps about possible data misuses. Watching the educational video lowered participants’ intention to use voice-enabled devices. In discussing the regulatory implications of our findings, we challenge the notion of “informed consent” to data processing. We also argue that inferences about individuals need to be legally recognized as personal data and protected accordingly.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"6 - 27"},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42251717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
(∈, δ)-Indistinguishable Mixing for Cryptocurrencies 加密货币的(∈,δ)-不可区分混合
Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, S. D. Gordon, Mayank Varia
Abstract We propose a new theoretical approach for building anonymous mixing mechanisms for cryptocurrencies. Rather than requiring a fully uniform permutation during mixing, we relax the requirement, insisting only that neighboring permutations are similarly likely. This is defined formally by borrowing from the definition of differential privacy. This relaxed privacy definition allows us to greatly reduce the amount of interaction and computation in the mixing protocol. Our construction achieves O(n·polylog(n)) computation time for mixing n addresses, whereas all other mixing schemes require O(n2) total computation across all parties. Additionally, we support a smooth tolerance of fail-stop adversaries and do not require any trusted setup. We analyze the security of our generic protocol under the UC framework, and under a stand-alone, game-based definition. We finally describe an instantiation using ring signatures and confidential transactions.
摘要我们提出了一种新的理论方法来构建加密货币的匿名混合机制。在混合过程中,我们没有要求完全一致的排列,而是放宽了这一要求,只坚持相邻排列的可能性相似。这是通过借用差异隐私的定义而正式定义的。这种宽松的隐私定义使我们能够大大减少混合协议中的交互和计算量。我们的构造实现了混合n个地址的O(n·polylog(n))计算时间,而所有其他混合方案都需要所有各方的O(n2)总计算。此外,我们支持对故障停止对手的平稳容忍,不需要任何可信的设置。我们在UC框架下以及在独立的、基于游戏的定义下分析了我们的通用协议的安全性。我们最后描述了一个使用环签名和机密事务的实例化。
{"title":"(∈, δ)-Indistinguishable Mixing for Cryptocurrencies","authors":"Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, S. D. Gordon, Mayank Varia","doi":"10.2478/popets-2022-0004","DOIUrl":"https://doi.org/10.2478/popets-2022-0004","url":null,"abstract":"Abstract We propose a new theoretical approach for building anonymous mixing mechanisms for cryptocurrencies. Rather than requiring a fully uniform permutation during mixing, we relax the requirement, insisting only that neighboring permutations are similarly likely. This is defined formally by borrowing from the definition of differential privacy. This relaxed privacy definition allows us to greatly reduce the amount of interaction and computation in the mixing protocol. Our construction achieves O(n·polylog(n)) computation time for mixing n addresses, whereas all other mixing schemes require O(n2) total computation across all parties. Additionally, we support a smooth tolerance of fail-stop adversaries and do not require any trusted setup. We analyze the security of our generic protocol under the UC framework, and under a stand-alone, game-based definition. We finally describe an instantiation using ring signatures and confidential transactions.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"49 - 74"},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49460475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers OmniCrawl:使用真实桌面和移动浏览器进行Web跟踪的综合测量
Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, H. Hsiao, Limin Jia, Timothy Libert
Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different non-emulated browsers simultaneously. We find that the third-party advertising and tracking ecosystem of mobile browsers is more similar to that of desktop browsers than previous findings suggested. We study privacy-focused browsers and find their protections differ significantly and in general are less for lower-ranked sites. Our findings also show that common methodological choices made by web measurement studies, such as the use of emulated mobile browsers and Selenium, can lead to website behavior that deviates from what actual users experience.
现在超过一半的网站访问都是在移动浏览器中进行的,然而大多数网络隐私研究都采用桌面浏览器的优势,使用模拟的移动浏览器,或者只关注单一的移动浏览器。在本文中,我们提出了一个全面的网络跟踪测量研究的移动浏览器和隐私为重点的移动浏览器。我们的研究利用了一种新的网络测量基础设施——OmniCrawl,它是我们开发的,用于驱动位于两大洲的台式电脑和智能手机上的浏览器。我们同时使用42种不同的非模拟浏览器捕获网络跟踪测量。我们发现,移动浏览器的第三方广告和跟踪生态系统与桌面浏览器的生态系统比之前的研究结果更相似。我们研究了以隐私为重点的浏览器,发现它们的保护措施差别很大,通常对排名较低的网站的保护程度较低。我们的研究结果还表明,网络测量研究中常见的方法选择,如使用模拟移动浏览器和Selenium,可能导致网站行为偏离实际用户体验。
{"title":"OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers","authors":"Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, H. Hsiao, Limin Jia, Timothy Libert","doi":"10.2478/popets-2022-0012","DOIUrl":"https://doi.org/10.2478/popets-2022-0012","url":null,"abstract":"Abstract Over half of all visits to websites now take place in a mobile browser, yet the majority of web privacy studies take the vantage point of desktop browsers, use emulated mobile browsers, or focus on just a single mobile browser instead. In this paper, we present a comprehensive web-tracking measurement study on mobile browsers and privacy-focused mobile browsers. Our study leverages a new web measurement infrastructure, OmniCrawl, which we develop to drive browsers on desktop computers and smartphones located on two continents. We capture web tracking measurements using 42 different non-emulated browsers simultaneously. We find that the third-party advertising and tracking ecosystem of mobile browsers is more similar to that of desktop browsers than previous findings suggested. We study privacy-focused browsers and find their protections differ significantly and in general are less for lower-ranked sites. Our findings also show that common methodological choices made by web measurement studies, such as the use of emulated mobile browsers and Selenium, can lead to website behavior that deviates from what actual users experience.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"227 - 252"},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48612817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
User Perceptions of Gmail’s Confidential Mode 用户对Gmail保密模式的认知
E. A. Qahtani, Yousra Javed, Mohamed Shehab
Abstract Gmail’s confidential mode enables a user to send confidential emails and control access to their content through setting an expiration time and passcode, pre-expiry access revocation, and prevention of email forwarding, downloading, and printing. This paper aims to understand user perceptions and motivations for using Gmail’s confidential mode (GCM). Our structured interviews with 19 Gmail users at UNC Charlotte show that users utilize this mode to share their private documents with recipients and perceive that this mode encrypts their emails and attachments. The most commonly used feature of this mode is the default time expiration of one week, and the least used feature is the pre-expiry access revocation. Our analysis suggests several design improvements.
bgmail的保密模式允许用户发送保密邮件,并通过设置邮件的过期时间和密码、过期前撤销访问、防止邮件转发、下载和打印等方式控制对邮件内容的访问。本文旨在了解用户使用bgmail保密模式(GCM)的感知和动机。我们对北卡罗来纳大学夏洛特分校19名bgmail用户的结构化访谈表明,用户利用这种模式与收件人共享他们的私人文档,并认为这种模式加密了他们的电子邮件和附件。该模式最常用的特性是默认时间过期一周,使用最少的特性是过期前撤销访问。我们的分析提出了几项设计改进。
{"title":"User Perceptions of Gmail’s Confidential Mode","authors":"E. A. Qahtani, Yousra Javed, Mohamed Shehab","doi":"10.2478/popets-2022-0010","DOIUrl":"https://doi.org/10.2478/popets-2022-0010","url":null,"abstract":"Abstract Gmail’s confidential mode enables a user to send confidential emails and control access to their content through setting an expiration time and passcode, pre-expiry access revocation, and prevention of email forwarding, downloading, and printing. This paper aims to understand user perceptions and motivations for using Gmail’s confidential mode (GCM). Our structured interviews with 19 Gmail users at UNC Charlotte show that users utilize this mode to share their private documents with recipients and perceive that this mode encrypts their emails and attachments. The most commonly used feature of this mode is the default time expiration of one week, and the least used feature is the pre-expiry access revocation. Our analysis suggests several design improvements.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"187 - 206"},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42215257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge Cross-Distillation for Membership Privacy 面向成员隐私的知识交叉蒸馏
R. Chourasia, Batnyam Enkhtaivan, Kunihiro Ito, Junki Mori, Isamu Teranishi, Hikaru Tsuchida
Abstract A membership inference attack (MIA) poses privacy risks for the training data of a machine learning model. With an MIA, an attacker guesses if the target data are a member of the training dataset. The state-of-the-art defense against MIAs, distillation for membership privacy (DMP), requires not only private data for protection but a large amount of unlabeled public data. However, in certain privacy-sensitive domains, such as medicine and finance, the availability of public data is not guaranteed. Moreover, a trivial method for generating public data by using generative adversarial networks significantly decreases the model accuracy, as reported by the authors of DMP. To overcome this problem, we propose a novel defense against MIAs that uses knowledge distillation without requiring public data. Our experiments show that the privacy protection and accuracy of our defense are comparable to those of DMP for the benchmark tabular datasets used in MIA research, Purchase100 and Texas100, and our defense has a much better privacy-utility trade-off than those of the existing defenses that also do not use public data for the image dataset CIFAR10.
隶属关系推理攻击(MIA)会给机器学习模型的训练数据带来隐私风险。使用MIA,攻击者可以猜测目标数据是否是训练数据集的成员。针对mia的最先进的防御,即成员隐私蒸馏(DMP),不仅需要保护私人数据,还需要大量未标记的公共数据。然而,在某些隐私敏感的领域,如医药和金融,公共数据的可用性得不到保证。此外,正如DMP的作者所报道的那样,使用生成式对抗网络生成公共数据的一种简单方法显着降低了模型的准确性。为了克服这个问题,我们提出了一种新的防御MIAs的方法,该方法使用知识蒸馏而不需要公共数据。我们的实验表明,对于MIA研究、Purchase100和Texas100中使用的基准表格数据集,我们的防御的隐私保护和准确性与DMP相当,并且我们的防御比现有的防御具有更好的隐私-效用权衡,这些防御也不使用图像数据集CIFAR10的公共数据。
{"title":"Knowledge Cross-Distillation for Membership Privacy","authors":"R. Chourasia, Batnyam Enkhtaivan, Kunihiro Ito, Junki Mori, Isamu Teranishi, Hikaru Tsuchida","doi":"10.2478/popets-2022-0050","DOIUrl":"https://doi.org/10.2478/popets-2022-0050","url":null,"abstract":"Abstract A membership inference attack (MIA) poses privacy risks for the training data of a machine learning model. With an MIA, an attacker guesses if the target data are a member of the training dataset. The state-of-the-art defense against MIAs, distillation for membership privacy (DMP), requires not only private data for protection but a large amount of unlabeled public data. However, in certain privacy-sensitive domains, such as medicine and finance, the availability of public data is not guaranteed. Moreover, a trivial method for generating public data by using generative adversarial networks significantly decreases the model accuracy, as reported by the authors of DMP. To overcome this problem, we propose a novel defense against MIAs that uses knowledge distillation without requiring public data. Our experiments show that the privacy protection and accuracy of our defense are comparable to those of DMP for the benchmark tabular datasets used in MIA research, Purchase100 and Texas100, and our defense has a much better privacy-utility trade-off than those of the existing defenses that also do not use public data for the image dataset CIFAR10.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"362 - 377"},"PeriodicalIF":0.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42799863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains Satoshi区块链上的不可审查、匿名和私人访问
Ruben Recabarren, Bogdan Carbunar
Abstract Providing unrestricted access to sensitive content such as news and software is difficult in the presence of adaptive and resourceful surveillance and censoring adversaries. In this paper we leverage the distributed and resilient nature of commercial Satoshi blockchains to develop the first provably secure, censorship resistant, cost-efficient storage system with anonymous and private access, built on top of commercial cryptocurrency transactions. We introduce max-rate transactions, a practical construct to persist data of arbitrary size entirely in a Satoshi blockchain. We leverage max-rate transactions to develop UWeb, a blockchain-based storage system that charges publishers to self-sustain its decentralized infrastructure. UWeb organizes blockchain-stored content for easy retrieval, and enables clients to store and access content with provable anonymity, privacy and censorship resistance properties. We present results from UWeb experiments with writing 268.21 MB of data into the live Litecoin blockchain, including 4.5 months of live-feed BBC articles, and 41 censorship resistant tools. The max-rate writing throughput (183 KB/s) and blockchain utilization (88%) exceed those of state-of-the-art solutions by 2-3 orders of magnitude and broke Litecoin’s record of the daily average block size. Our simulations with up to 3,000 concurrent UWeb writers confirm that UWeb does not impact the confirmation delays of financial transactions.
摘要在存在自适应和足智多谋的监视和审查对手的情况下,很难不受限制地访问新闻和软件等敏感内容。在本文中,我们利用商业Satoshi区块链的分布式和弹性,在商业加密货币交易的基础上开发了第一个可证明安全、抗审查、具有成本效益的匿名和私人访问的存储系统。我们引入了最大速率交易,这是一种在Satoshi区块链中完全保持任意大小数据的实用结构。我们利用最高利率交易开发UWeb,这是一个基于区块链的存储系统,向出版商收取费用,以自行维持其去中心化基础设施。UWeb组织区块链存储的内容以便于检索,并使客户能够存储和访问具有可证明的匿名性、隐私性和审查阻力的内容。我们展示了UWeb实验的结果,将268.21MB的数据写入实时Litecoin区块链,包括4.5个月的BBC直播文章和41个抵制审查的工具。最大写入吞吐量(183KB/s)和区块链利用率(88%)超过了最先进的解决方案2-3个数量级,并打破了莱特币的日均区块大小记录。我们对多达3000名并发UWeb作者的模拟证实,UWeb不会影响金融交易的确认延迟。
{"title":"Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains","authors":"Ruben Recabarren, Bogdan Carbunar","doi":"10.2478/popets-2022-0011","DOIUrl":"https://doi.org/10.2478/popets-2022-0011","url":null,"abstract":"Abstract Providing unrestricted access to sensitive content such as news and software is difficult in the presence of adaptive and resourceful surveillance and censoring adversaries. In this paper we leverage the distributed and resilient nature of commercial Satoshi blockchains to develop the first provably secure, censorship resistant, cost-efficient storage system with anonymous and private access, built on top of commercial cryptocurrency transactions. We introduce max-rate transactions, a practical construct to persist data of arbitrary size entirely in a Satoshi blockchain. We leverage max-rate transactions to develop UWeb, a blockchain-based storage system that charges publishers to self-sustain its decentralized infrastructure. UWeb organizes blockchain-stored content for easy retrieval, and enables clients to store and access content with provable anonymity, privacy and censorship resistance properties. We present results from UWeb experiments with writing 268.21 MB of data into the live Litecoin blockchain, including 4.5 months of live-feed BBC articles, and 41 censorship resistant tools. The max-rate writing throughput (183 KB/s) and blockchain utilization (88%) exceed those of state-of-the-art solutions by 2-3 orders of magnitude and broke Litecoin’s record of the daily average block size. Our simulations with up to 3,000 concurrent UWeb writers confirm that UWeb does not impact the confirmation delays of financial transactions.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"207 - 226"},"PeriodicalIF":0.0,"publicationDate":"2021-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45992563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps iphone真的更保护隐私吗?iOS和Android应用程序的比较研究
Konrad Kollnig, A. Shuba, Reuben Binns, M. V. Kleek, N. Shadbolt
Abstract While many studies have looked at privacy properties of the Android and Google Play app ecosystem, comparatively much less is known about iOS and the Apple App Store, the most widely used ecosystem in the US. At the same time, there is increasing competition around privacy between these smartphone operating system providers. In this paper, we present a study of 24k Android and iOS apps from 2020 along several dimensions relating to user privacy. We find that third-party tracking and the sharing of unique user identifiers was widespread in apps from both ecosystems, even in apps aimed at children. In the children’s category, iOS apps tended to use fewer advertising-related tracking than their Android counterparts, but could more often access children’s location. Across all studied apps, our study highlights widespread potential violations of US, EU and UK privacy law, including 1) the use of third-party tracking without user consent, 2) the lack of parental consent before sharing personally identifiable information (PII) with third-parties in children’s apps, 3) the non-data-minimising configuration of tracking libraries, 4) the sending of personal data to countries without an adequate level of data protection, and 5) the continued absence of transparency around tracking, partly due to design decisions by Apple and Google. Overall, we find that neither platform is clearly better than the other for privacy across the dimensions we studied.
虽然许多研究都关注Android和b谷歌Play应用生态系统的隐私属性,但相对而言,对iOS和苹果应用商店(美国使用最广泛的生态系统)的了解却很少。与此同时,这些智能手机操作系统供应商之间围绕隐私的竞争也越来越激烈。在本文中,我们对2020年以来的24k Android和iOS应用程序进行了一项研究,涉及与用户隐私相关的几个维度。我们发现第三方跟踪和共享唯一用户标识符在两个生态系统的应用程序中都很普遍,甚至在针对儿童的应用程序中也是如此。在儿童类别中,iOS应用往往比Android应用使用更少的广告相关跟踪,但可以更频繁地访问儿童的位置。在所有被研究的应用程序中,我们的研究强调了普遍存在的违反美国、欧盟和英国隐私法的潜在行为,包括1)未经用户同意使用第三方跟踪,2)在儿童应用程序中与第三方共享个人身份信息(PII)之前缺乏父母同意,3)非数据最小化的跟踪库配置,4)将个人数据发送到没有足够数据保护水平的国家。5)追踪方面持续缺乏透明度,部分原因是苹果和b谷歌的设计决策。总的来说,我们发现在我们研究的各个维度上,这两个平台都没有明显优于另一个平台。
{"title":"Are iPhones Really Better for Privacy? A Comparative Study of iOS and Android Apps","authors":"Konrad Kollnig, A. Shuba, Reuben Binns, M. V. Kleek, N. Shadbolt","doi":"10.2478/popets-2022-0033","DOIUrl":"https://doi.org/10.2478/popets-2022-0033","url":null,"abstract":"Abstract While many studies have looked at privacy properties of the Android and Google Play app ecosystem, comparatively much less is known about iOS and the Apple App Store, the most widely used ecosystem in the US. At the same time, there is increasing competition around privacy between these smartphone operating system providers. In this paper, we present a study of 24k Android and iOS apps from 2020 along several dimensions relating to user privacy. We find that third-party tracking and the sharing of unique user identifiers was widespread in apps from both ecosystems, even in apps aimed at children. In the children’s category, iOS apps tended to use fewer advertising-related tracking than their Android counterparts, but could more often access children’s location. Across all studied apps, our study highlights widespread potential violations of US, EU and UK privacy law, including 1) the use of third-party tracking without user consent, 2) the lack of parental consent before sharing personally identifiable information (PII) with third-parties in children’s apps, 3) the non-data-minimising configuration of tracking libraries, 4) the sending of personal data to countries without an adequate level of data protection, and 5) the continued absence of transparency around tracking, partly due to design decisions by Apple and Google. Overall, we find that neither platform is clearly better than the other for privacy across the dimensions we studied.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"6 - 24"},"PeriodicalIF":0.0,"publicationDate":"2021-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47344369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
SoK: Cryptographic Confidentiality of Data on Mobile Devices 移动设备上数据的加密机密性
Maximilian Zinkus, Tushar M. Jois, M. Green
Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.
摘要移动设备已成为现代生活中不可或缺的组成部分。它们的高存储容量使这些设备能够存储大量敏感的个人数据,这使它们成为一个高价值的目标:这些设备经常被犯罪分子窃取数据,执法机构越来越将其视为法医数据的宝贵来源。在过去的几年里,提供商部署了许多高级加密功能,旨在保护移动设备上的数据,即使在攻击者可以物理访问设备的强大环境中也是如此。这些技术中的许多都来自研究文献,但已经适应了这种全新的问题设置。这涉及到许多新颖的挑战,这些挑战在文献中没有得到完全解决。在这项工作中,我们概述了这些挑战,并将已知的保护用户数据免受提取攻击的方法系统化。我们的工作提出了一种方法,研究人员可以使用该方法来分析移动设备的加密数据机密性。我们评估了现有的文献,以保护设备免受具有强大功能的数据提取对手的攻击,包括访问设备和他们所依赖的云服务。然后,我们分析了现有的移动设备保密措施,以确定尚未得到社区适当关注的研究领域,并为未来的研究提供了机会。
{"title":"SoK: Cryptographic Confidentiality of Data on Mobile Devices","authors":"Maximilian Zinkus, Tushar M. Jois, M. Green","doi":"10.2478/popets-2022-0029","DOIUrl":"https://doi.org/10.2478/popets-2022-0029","url":null,"abstract":"Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"586 - 607"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43161457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making the Most of Parallel Composition in Differential Privacy 充分利用差异隐私中的平行作文
Joshua Smith, H. Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, P. Tyler
Abstract We show that the ‘optimal’ use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that ‘overlap’ on the data domain, a quantity we call the maximum overlap of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is possible to use graph-theoretic algorithms, such as finding the maximum clique, to approximate query sensitivity. In this paper, we consider a significant generalization of the aforementioned instance which encompasses both a wider range of differentially private mechanisms and a broader class of queries. We show that for a particular class of predicate queries, determining if they are disjoint can be done in time polynomial in the number of attributes. For this class, we show that the maximum overlap problem remains NP-hard as a function of the number of queries. However, we show that efficient approximate solutions exist by relating maximum overlap to the clique and chromatic numbers of a certain graph determined by the queries. The link to chromatic number allows us to use more efficient approximate algorithms, which cannot be done for the clique number as it may underestimate the privacy budget. Our approach is defined in the general setting of f-differential privacy, which subsumes standard pure differential privacy and Gaussian differential privacy. We prove the parallel composition theorem for f-differential privacy. We evaluate our approach on synthetic and real-world data sets of queries. We show that the approach can scale to large domain sizes (up to 1020000), and that its application can reduce the noise added to query answers by up to 60%.
我们证明了并行组合定理的“最佳”使用对应于找到在数据域上“重叠”的查询的最大子集的大小,我们称之为查询的最大重叠量。以前已经表明,这个问题的某个实例(根据确定查询的灵敏度来表述)是np困难的,但也可以使用图论算法,例如找到最大团,来近似查询灵敏度。在本文中,我们考虑了上述实例的一个重要概括,它包含了更广泛的差异私有机制和更广泛的查询类别。我们表明,对于一类特定的谓词查询,确定它们是否不相交可以在属性数量的时间多项式中完成。对于这个类,我们证明了最大重叠问题仍然是NP-hard,作为查询数量的函数。然而,我们通过将最大重叠与查询确定的某个图的团数和色数联系起来,证明存在有效的近似解。与色数的联系使我们能够使用更有效的近似算法,而对于团数不能这样做,因为它可能低估了隐私预算。我们的方法是在f-微分隐私的一般设置下定义的,它包括标准纯微分隐私和高斯微分隐私。证明了f微分隐私的平行复合定理。我们在合成和真实世界的查询数据集上评估我们的方法。我们表明,该方法可以扩展到大的域大小(高达1020000),并且它的应用可以减少查询答案中添加的噪声高达60%。
{"title":"Making the Most of Parallel Composition in Differential Privacy","authors":"Joshua Smith, H. Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, P. Tyler","doi":"10.2478/popets-2022-0013","DOIUrl":"https://doi.org/10.2478/popets-2022-0013","url":null,"abstract":"Abstract We show that the ‘optimal’ use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that ‘overlap’ on the data domain, a quantity we call the maximum overlap of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is possible to use graph-theoretic algorithms, such as finding the maximum clique, to approximate query sensitivity. In this paper, we consider a significant generalization of the aforementioned instance which encompasses both a wider range of differentially private mechanisms and a broader class of queries. We show that for a particular class of predicate queries, determining if they are disjoint can be done in time polynomial in the number of attributes. For this class, we show that the maximum overlap problem remains NP-hard as a function of the number of queries. However, we show that efficient approximate solutions exist by relating maximum overlap to the clique and chromatic numbers of a certain graph determined by the queries. The link to chromatic number allows us to use more efficient approximate algorithms, which cannot be done for the clique number as it may underestimate the privacy budget. Our approach is defined in the general setting of f-differential privacy, which subsumes standard pure differential privacy and Gaussian differential privacy. We prove the parallel composition theorem for f-differential privacy. We evaluate our approach on synthetic and real-world data sets of queries. We show that the approach can scale to large domain sizes (up to 1020000), and that its application can reduce the noise added to query answers by up to 60%.","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2022 1","pages":"253 - 273"},"PeriodicalIF":0.0,"publicationDate":"2021-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47515001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Editors’ Introduction 编辑简介
Aaron Johnson, F. Kerschbaum
{"title":"Editors’ Introduction","authors":"Aaron Johnson, F. Kerschbaum","doi":"10.2478/popets-2021-0057","DOIUrl":"https://doi.org/10.2478/popets-2021-0057","url":null,"abstract":"","PeriodicalId":74556,"journal":{"name":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2021 1","pages":"1 - 5"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48551257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1