Privacy Aspects Of Securing Business Applications In Us Final Nl
Cyber-Privacy: Securing Biometric Data
-
Upload
michigan-state-university-research -
Category
Engineering
-
view
194 -
download
7
Transcript of Cyber-Privacy: Securing Biometric Data
Cyber-Privacy: Securing Biometric Data
Arun RossAssociate Professor
Michigan State [email protected]
http://www.cse.msu.edu/~rossarun/[email protected]
A large number of social, financial, business transactions are being conducted over the Internet
But Cyberspace is not just about data – it is also about individuals connected to the data
CyberSpace
Page: 2
Page: 3
Faces of Facebook: Privacy in the Age of Augmented Reality (Alessandro Acquisti et al)
Convergence of three technologies: face recognition, cloud computing, online social networks
They investigated whether combination of publicly available Web 2.0 data and off-the-shelf face recognition software may allow large-scale, automated, end-user individual re-identification
Started from an anonymous face in the street, and ended up with very sensitive information about that person, in a process of data "accretion”
Combined face recognition with the algorithms they developed in 2009 to predict SSNs from public data
Identifying People on the Web
Page: 4
Visual Cryptography: De-identifying Data
Actual Face
DATABASE 1
DATABASE 2
Ross and Othman, “Visual Cryptography for Biometrics Privacy”, TIFS 2011Page: 5
Preserving the privacy of a user’s stored biometric data Prevent cross-linking across applications Prevent gleaning additional information from
biometric data (e.g., medical ailment)
Privacy Enhancing Technology
Page: 6
Need to • Define Privacy Metrics• Guarantee Privacy• Develop Differential Privacy Schemes
CYBERSECURITY CV for MSU: http://goo.gl/forms/QcRqagFM9F