A Scanner Darkly: Protecting User Privacy From Perceptual Applications

被引:76
|
作者
Jana, Suman [1 ]
Narayanan, Arvind [2 ]
Shmatikov, Vitaly [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
来源
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2013年
关键词
D O I
10.1109/SP.2013.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming platforms, household robots, and augmented-reality devices. This raises new privacy risks. We describe the design and implementation of DARKLY, a practical privacy protection system for the increasingly common scenario where an untrusted, third-party perceptual application is running on a trusted device. DARKLY is integrated with OpenCV, a popular computer vision library used by such applications to access visual inputs. It deploys multiple privacy protection mechanisms, including access control, algorithmic privacy transforms, and user audit. We evaluate DARKLY on 20 perceptual applications that perform diverse tasks such as image recognition, object tracking, security surveillance, and face detection. These applications run on DARKLY unmodified or with very few modifications and minimal performance overheads vs. native OpenCV. In most cases, privacy enforcement does not reduce the applications' functionality or accuracy. For the rest, we quantify the tradeoff between privacy and utility and demonstrate that utility remains acceptable even with strong privacy protection.
引用
收藏
页码:349 / 363
页数:15
相关论文
共 50 条
  • [41] A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy
    Lai, Sen-Tarng
    Leu, Fang-Yie
    Lin, Jeng-Wei
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 561 - 571
  • [42] A Cross-Cultural Framework for Protecting User Privacy in Online Social Media
    Ur, Blase
    Wang, Yang
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 755 - 762
  • [43] Digital health fiduciaries: protecting user privacy when sharing health data
    Chirag Arora
    Ethics and Information Technology, 2019, 21 : 181 - 196
  • [44] User privacy protection algorithm of perceptual recommendation system based on group recommendation
    Ding, Xuefeng
    Liu, Xuehong
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2020, 13 (02) : 135 - 150
  • [45] AUTONOMY AND PRIVACY - PROTECTING PATIENTS FROM THEIR PHYSICIANS
    BOBINSKI, MA
    UNIVERSITY OF PITTSBURGH LAW REVIEW, 1994, 55 (02) : 291 - 388
  • [46] A comprehensive investigation of user privacy leakage to Android applications
    Ge, Yuming
    Deng, Bo
    Sun, Yi
    Tang, Libo
    Sheng, Dajiang
    Zhao, Yantao
    Xie, Gaogang
    Salamatian, Kave
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [47] Preserving User Privacy from Third-party Applications in Online Social Networks
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 723 - 728
  • [48] PASSPHONE: Outsourcing Phone-Based Web Authentication While Protecting User Privacy
    Potthast, Martin
    Forler, Christian
    List, Eik
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 235 - 255
  • [49] A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications
    Albouq, Sami Saad
    Sen, Adnan Ahmed Abi
    Namoun, Abdallah
    Bahbouh, Nour Mahmoud
    Alkhodre, Ahmad B.
    Alshanqiti, Abdullah
    IEEE ACCESS, 2020, 8 : 129415 - 129431
  • [50] Advanced Perceptual User Interfaces: Applications for Disabled and Elderly People
    Perales Lopez, Francisco J.
    HUMAN-COMPUTER INTERACTION - INTERACT 2009, PT II, PROCEEDINGS, 2009, 5727 : 930 - 931