A Scanner Darkly: Protecting User Privacy From Perceptual Applications

被引:76
|
作者
Jana, Suman [1 ]
Narayanan, Arvind [2 ]
Shmatikov, Vitaly [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
关键词
D O I
10.1109/SP.2013.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming platforms, household robots, and augmented-reality devices. This raises new privacy risks. We describe the design and implementation of DARKLY, a practical privacy protection system for the increasingly common scenario where an untrusted, third-party perceptual application is running on a trusted device. DARKLY is integrated with OpenCV, a popular computer vision library used by such applications to access visual inputs. It deploys multiple privacy protection mechanisms, including access control, algorithmic privacy transforms, and user audit. We evaluate DARKLY on 20 perceptual applications that perform diverse tasks such as image recognition, object tracking, security surveillance, and face detection. These applications run on DARKLY unmodified or with very few modifications and minimal performance overheads vs. native OpenCV. In most cases, privacy enforcement does not reduce the applications' functionality or accuracy. For the rest, we quantify the tradeoff between privacy and utility and demonstrate that utility remains acceptable even with strong privacy protection.
引用
收藏
页码:349 / 363
页数:15
相关论文
共 50 条
  • [1] From microscope to multiplex - An MRI scanner darkly
    John Whitfield
    Nature, 2006, 441 : 922 - 924
  • [2] Enhancing Front-End Security: Protecting User Data and Privacy in Web Applications
    Tkachenko, Oleksandr
    Goncharov, Vadim
    Jatkiewicz, Przemyslaw
    COMPUTER ANIMATION AND VIRTUAL WORLDS, 2024, 35 (06)
  • [3] Protecting User Privacy in WiFi Sharing Networks
    Elsner, Till
    Luetke-Wiesmann, Denis
    Scheuermann, Bjoern
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1979 - 1983
  • [4] The Cost of Protecting Privacy in Multimedia Applications
    El-Khatib, Khalil
    Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 51 - 54
  • [5] Privacy Protection for Perceptual Applications on Smartphones
    Zhao, Kao
    Zou, Deqing
    Jin, Hai
    Tian, Zhangbiaoge
    Qiang, Weizhong
    Dai, Weiqi
    2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 174 - 181
  • [6] Protecting Privacy in Trajectories with a User-Centric Approach
    Romero-Tris, Cristina
    Megias, David
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2018, 12 (06)
  • [7] Protecting trajectory privacy: A user-centric analysis
    Shen, Hang
    Bai, Guangwei
    Yang, Mei
    Wang, Zhonghui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 128 - 139
  • [8] User Feedback on Physical Marker Interfaces for Protecting Visual Privacy from Mobile Robots
    Rueben, Matthew
    Bernieri, Frank J.
    Grimm, Cindy M.
    Smart, William D.
    ELEVENTH ACM/IEEE INTERNATIONAL CONFERENCE ON HUMAN ROBOT INTERACTION (HRI'16), 2016, : 507 - 508
  • [9] Protecting the press from privacy
    Fuson, JH
    UNIVERSITY OF PENNSYLVANIA LAW REVIEW, 1999, 148 (02) : 629 - 671
  • [10] User Privacy Leakages from Federated Learning in NILM Applications
    Shi, Yunchuan
    Li, Wei
    Chang, Xiaomin
    Zomaya, Albert Y.
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 212 - 213