A Scanner Darkly: Protecting User Privacy From Perceptual Applications

被引:76
|
作者
Jana, Suman [1 ]
Narayanan, Arvind [2 ]
Shmatikov, Vitaly [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
来源
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2013年
关键词
D O I
10.1109/SP.2013.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming platforms, household robots, and augmented-reality devices. This raises new privacy risks. We describe the design and implementation of DARKLY, a practical privacy protection system for the increasingly common scenario where an untrusted, third-party perceptual application is running on a trusted device. DARKLY is integrated with OpenCV, a popular computer vision library used by such applications to access visual inputs. It deploys multiple privacy protection mechanisms, including access control, algorithmic privacy transforms, and user audit. We evaluate DARKLY on 20 perceptual applications that perform diverse tasks such as image recognition, object tracking, security surveillance, and face detection. These applications run on DARKLY unmodified or with very few modifications and minimal performance overheads vs. native OpenCV. In most cases, privacy enforcement does not reduce the applications' functionality or accuracy. For the rest, we quantify the tradeoff between privacy and utility and demonstrate that utility remains acceptable even with strong privacy protection.
引用
收藏
页码:349 / 363
页数:15
相关论文
共 50 条
  • [31] Double Security Guarantee: Protecting User Privacy and Model Security in QoS Prediction
    Xu, Jianlong
    Xu, Zhuo
    Lin, Jian
    She, Weiwei
    2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 140 - 145
  • [32] Protecting user privacy in location-based services over road networks
    Aloui, Ahmed
    Kazar, Okba
    Bourekkache, Samir
    Chikh, Aymen
    JOURNAL OF LOCATION BASED SERVICES, 2022, 16 (02) : 77 - 118
  • [33] A privacy preserving graph neural networks framework by protecting user's attributes
    Zhou, Li
    Wang, Jing
    Fan, Dongmei
    Zhang, Haifeng
    Zhong, Kai
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 629
  • [34] User-Centered Evaluation of Privacy Models for Protecting Personal Medical Information
    Samsuri, Suhaila
    Ismail, Zuraini
    Ahmad, Rabiah
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 301 - +
  • [35] Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy
    Turk, Ata
    Varia, Mayank
    Kellaris, Georgios
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 1011 - 1016
  • [36] Protecting personal information online: A survey of user privacy concerns and control techniques
    Chen, KC
    Rea, AI
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2004, 44 (04) : 85 - 92
  • [37] Protecting user privacy for cloud computing by bivariate polynomial based secret sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    Fu, Zhangjie
    Journal of Computing and Information Technology, 2015, 23 (04) : 341 - 355
  • [38] VADER-RF: a novel scheme for protecting user privacy on android devices
    Verma, Manish
    Nand, Parma
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [39] Protecting Privacy: Towards a Visual Framework for Handling End-User Data
    Oliver, Ian
    Howse, John
    Stapleton, Gem
    2013 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING (VL/HCC 2013), 2013, : 67 - 74
  • [40] Digital health fiduciaries: protecting user privacy when sharing health data
    Arora, Chirag
    ETHICS AND INFORMATION TECHNOLOGY, 2019, 21 (03) : 181 - 196