Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...

30
Project Presentation Addressing Privacy and Societal Challenges from the Deployment of Emerging Biometrics and Data Protection Technologies Supervisors Name: Dr. Ajay Kumar Student Name: Au Ka Po Student Number: 10593042D

Transcript of Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf ·...

Page 1: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Project Presentation

Addressing Privacy and Societal Challenges

from the Deployment of Emerging Biometrics

and Data Protection Technologies

Supervisors Name: Dr. Ajay Kumar Student Name: Au Ka Po

Student Number: 10593042D

Page 2: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Contents

Introduction

Popular security technologies in Mainland China

Privacy issues in emerging technologies

Organization of Survey Studies

Survey and Analysis

Recommendations

Conclusions

2

Page 3: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Introduction

Background ◦ New challenges from technologies

◦ Potential privacy issues versus Benefits

◦ Smartphone and Internet access becomes popular,

malicious App also increases

Objectives 1. Investigate and evaluate the emerging privacy issues related

to technologies

2. Raise the awareness on privacy related challenges in the use popular technologies

3. Study the privacy concerns and attitude of general public about the use of Smartphone

3

Page 4: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Situation of using latest technologies

in China CCTV ◦ Beijing – cinema, supermarket, shopping mall

◦ Shanghai – 24 hours monitoring by 4000 people

◦ Chongqing – Total 3.1 hundred thousands

Biometrics – Fingerprint Identification ◦ Stored in identification card starts at Jan 2013

◦ Record foreigners who work or study in China

4

Page 5: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Situation of using latest technologies

in China Smartphone users : over 250 million

Penetration rate: over 67.7%

5

Page 6: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Introduction

Malware grew 163% in 2012

Infected 32.8M Android device

Infection Rate is the highest in

China

6

Page 7: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Privacy issues of using Smartphones

Privacy Invasion without consent

Modification of App – Wechat

◦ Connect with Trojan horse

◦ More than 160 versions of Wechat are modified

Advertisement pop up, costing money and stealing

password

◦ Download App from unofficial channel

◦ Apk files sent by IM Apps

7

Page 8: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Privacy issues of using Smartphone

Wechat App is suspected of monitoring chat history ◦ “Restricted words” pop up if users send the message

containing political content

◦ Hu Jia who is activist suspects

he was monitored when using it

Real personal information is required when ◦ Sign-up communication services or

◦ Publish blog or comment in blog or forum

8

Page 9: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Privacy issues of using technologies

Registering new account in Wechat

Hold ID card and take photo

9

Page 10: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Privacy issues of using technologies

Smartphone Vulnerabilities

Bypass password using system bugs

◦ iOS 6.1 - iphone

◦ Android 4.1.2 – Sony Xperia Z

Spoofing attack of biometrics

◦ Face recognition in Android 4.0.x

Photo and facemask of owners

10

Page 11: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Study using Survey

Online survey – 177 respondents Developed by PHP, MySQL

Managed by phpMyAdmin

Offline survey – 235 respondents Interview with people by face to face

Distribute to classmates

Privacy concerns - not willing to provide personal information

Entered the offline survey data to online system

All data was backed-up and secured

11

Page 12: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Study using Survey

phpmyAdmin

12

Page 13: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Study using Survey

Respondent background

Age

Gender

Education level

13

Page 14: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

IBM SPSS statistics 19

14

Page 15: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Two Stop Cluster

15

Page 16: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Distribution of Smartphone Platform

16

iOS

27%

Android

68%

Window

Phone

1%

Symbiam

2%

BlackBerry

1%

Not a

Smartphone

user

1%

Page 17: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

0

0.5

1

Survey & Analysis

Criteria of choosing Smartphone OS

1. More Apps

2. Trendy

3. User friendliness

Few users choose

security reason

17

Page 18: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Downloading App from unofficial ways

More Android device users do so

More iOS users think that it is not safe

18

0%

5%

10%

15%

20%

25%

30%

35% 32%

7% 9%

31%

5%

12%

4%

23%

15%

7%

25%

5%

20%

5%

iOS Android

Page 19: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Keep using App if real personal information is needed?

Male are not willing to use

19

0%

10%

20%

30%

40%

50%

60%

70%

Yes No Not sure

Male

Female

Page 20: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Altitude towards using privacy invasion App

20

0%

10%

20%

30%

40%

50%

60%

Whatsapp Line Wechat

Yes

No

Use carefully

Page 21: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

21

Checking permissions of App before downloading

• Half of iOS users

do not check

• None of Symbian users

will check

0%

10%

20%

30%

40%

50%

60%

Yes No Sometimes Not support this

function

16%

47%

33%

4%

16%

40% 41%

3% 0%

60%

20% 20%

iOS Android Symbiam

Page 22: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Sharing location via Smartphone

1. Do not share

2. Restaurant

3. Travel Attractions

22

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50% 47%

10% 9%

15%

1%

7%

11%

40%

16%

7%

11%

4% 6%

16%

Male Female

Page 23: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

23

Security lock preferred

1. Password

2. Simple

3. Fingerprint

0%

5%

10%

15%

20%

25%

30%

35%

40%

Simple

screen/key lock

Password Pattern Face

Recognition

Fingerprint

Identification

Iris Recognition Finger knuckle

25% 25%

0%

25%

0%

25%

0%

24%

11%

16%

11%

38%

0% 0%

28% 26%

29%

3%

12%

1% 1%

34%

38%

19%

5% 2%

0% 2%

Primary Secondary College or University Above University

Page 24: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Reason of choosing biometrics lock

General - more secure

Primary & University

Not want to use

24

Page 25: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Survey & Analysis

Install Anti-virus App or not?

More Android users intalled

84% iOS users

do not install

25

Page 26: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Conclusions

Most Popular Reason for Selecting Smartphone OS mainly because of numbers of available Apps

More than half of the people do not delete the data in previous Smartphone after they have purchased a new Smartphone More chance of privacy violations

People with secondary education level prefer using Biometrics security lock for their Smartphone People with higher education may have

more concerns on Biometrics Privacy

26

Page 27: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Conclusions

20% of people do download App from

unofficial avenues and which gain the

privileged control of the phone

More Vulnerable !

26% of people do not enable any security

lock on the phone

More Vulnerable!

27

Page 28: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Recommendations

Apply Security Lock

Backup data regularly

Check update regularly to fix system bugs

Avoid modification of system unnecessarily

Carefully read the permission right of suspected Apps before downloading them

Download Apps from official avenues

◦ If not, make sure to install anti-virus App

Turn off unnecessary networking functions

◦ NFC, GPS, location services

28

Page 29: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

References 1. “comScore Releases the ‘2012 Mobile Future in Focus’ Report - comScore, Inc.”[Online]. Available:

http://www.comscore.com/Insights/Press_Releases/2012/2/comScore_Releases_the_2012_Mobile_Future_in_Focus_Report. [Accessed: 25-April-2013].

2. “Social Media and Mobile in China: Smartphone users in China already exceeded 250 million people.” [Online]. Available: http://socialmediainasia.blogspot.hk/2012/06/smartphone-users-in-china-already.html. [Accessed: 16-March-2013].

3.

4. “Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says | TechCrunch.” [Online]. Available: http://techcrunch.com/2013/04/15/malware-on-mobile-grew-163-in-2012-infecting-around-32-8m-android-devices-report-says/. [Accessed: 23-April-2013].

5.

6. “Jailbreak! New Rules Allow Unapproved iPhone Apps | Fox News.” [Online]. Available: http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/. [Accessed: 07-April-2013].

7.

8. “Hack your Android like a pro: Rooting and ROMs explained | Android Atlas - CNET Reviews.” [Online]. Available: http://reviews.cnet.com/8301-19736_7-57578709-251/hack-your-android-like-a-pro-rooting-and-roms-explained/. [Accessed: 11-April-2013].

9.

10. “Custom ROMs For Android Explained - Here Is Why You Want Them.” [Online]. Available: http://www.androidpolice.com/2010/05/01/custom-roms-for-android-explained-and-why-you-want-them/. [Accessed: 19-April-2013].

29

Page 30: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus

Q & A section

Thank You!

30