Cyber-Privacy: Securing Biometric Data

Post on 19-Jan-2017

194 views 7 download

Transcript of Cyber-Privacy: Securing Biometric Data

Cyber-Privacy: Securing Biometric Data

Arun RossAssociate Professor

Michigan State Universityrossarun@cse.msu.edu

http://www.cse.msu.edu/~rossarun/rossarun@cse.msu.edu

A large number of social, financial, business transactions are being conducted over the Internet

But Cyberspace is not just about data – it is also about individuals connected to the data

CyberSpace

Page: 2

Page: 3

Faces of Facebook: Privacy in the Age of Augmented Reality (Alessandro Acquisti et al)

Convergence of three technologies: face recognition, cloud computing, online social networks

They investigated whether combination of publicly available Web 2.0 data and off-the-shelf face recognition software may allow large-scale, automated, end-user individual re-identification

Started from an anonymous face in the street, and ended up with very sensitive information about that person, in a process of data "accretion”

Combined face recognition with the algorithms they developed in 2009 to predict SSNs from public data

Identifying People on the Web

Page: 4

Visual Cryptography: De-identifying Data

Actual Face

DATABASE 1

DATABASE 2

Ross and Othman, “Visual Cryptography for Biometrics Privacy”, TIFS 2011Page: 5

Preserving the privacy of a user’s stored biometric data Prevent cross-linking across applications Prevent gleaning additional information from

biometric data (e.g., medical ailment)

Privacy Enhancing Technology

Page: 6

Need to • Define Privacy Metrics• Guarantee Privacy• Develop Differential Privacy Schemes

CYBERSECURITY CV for MSU: http://goo.gl/forms/QcRqagFM9F