際際滷

際際滷Share a Scribd company logo
Privacy-friendlybut secureaccess control via mobile devices 
Bart De Decker 
KU Leuven, iMinds-DistriNetCelestijnenlaan 200A, 3001 Heverlee 
e-mail:Bart (DOT) DeDecker (AT) cs (DOT) kuleuven (DOT) be 
URL:mobcom.org
Overview 
Context: MobCom project 
Data minimization 
Objections 
Framework 
Evaluation 
Conclusion
Context
Context: Project goals 
Privacy 
Data minimization 
Unlinkability 
Assurance 
Trustworthiness of data 
Customization 
Less personal data 
Crime/abuse 
Prevention / detection / punishment
Data minimization 
Minimize disclosure of personal data 
Avoid traces 
Difficult to erase 
OfflineDigital/Online
Data minimization 
Authorized users Identified users 
Anonymous credentials 
Prove ownership 
Selective disclosure 
Unlinkable 
Examples: 
Idemix (IBM) 
U-Prove (MS) 
Name 
= 
Birth date 
= 1973/01/26 
Subscription= 31/12/2014
Data minimization 
Signed by XYZ 
Birthdate before 27/11/1996 
Subscription after 1/12/2014 
User to mobileauthentication
Objections 
Customization? 
Abuse? 
L看霞温鉛岳霞?
Objection I: Customization 
We need to know our customers 
Large profiles 
Protection 
Liabilities 
Data mining 
Monetizationof customer data
Solution I: Customization 
Local profiles 
Cover more 
User in control 
Avoid cold start 
If needed: Pseudonym
Objection II: Abuse 
Anonymity provokes abuse 
Abuse the infrastucture 
Money laundring 
...
Solution II: Anti-Abuse 
Prevention 
Pseudonymity 
Deanonymization
Objection III: Loyalty 
Reward recurrent behaviour ?
Solution III: uCentives 
= Micro-incentive 
Anonymous 
Bound to the users identity 
Redeem: Prove ownership 
Value 
Exp. date
Framework 
SW developers security/privacy experts 
Security/privacy often afterthought 
Framework 
Technology-agnostic 
Policy-driven 
[Context-aware] 
Separation of Concerns 
SW developer, Service provider, Technology provider, User
Framework
Evaluation 
inShopnito 
Shopping assistant 
avisPoll 
Anonymous but Verifiable, Internet Service POLL System
Invitation 
Hands-on session (PriMan Framework) 
When: Tue Dec 16, 13:30 17:00 
Where: KU Leuven, Dept. Computer Science 
URL: mobcom.org/announcements/priman-workshop 
Closing workshop MobCom & SecureApps 
When: Wed Dec 17, 9:45 17:30 
Where: Faculty Club, Leuven 
URL: mobcom.org/announcements/closing-workshop
Conclusion 
Mobile privacy-friendly AC is feasible 
Local profiles customization 
Combat Abuse 
Loyalty rewarded anonymously 
Framework allows for easy integration 
Separation of concerns 
Efficient
Q&A

More Related Content

What's hot (8)

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Shauna_Cox
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
FinTech Belgium
Invisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing TechnologiesInvisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing Technologies
Jane Alexander
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
Marlon Domingus
Blockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh TeamBlockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh Team
nazlitemu
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
krishnakumarkrishnak3
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Shauna_Cox
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
FinTech Belgium
Invisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing TechnologiesInvisible Architectures - Supporting Public-Facing Technologies
Invisible Architectures - Supporting Public-Facing Technologies
Jane Alexander
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
Marlon Domingus
Blockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh TeamBlockcircus Hackathon --> The Mesh Team
Blockcircus Hackathon --> The Mesh Team
nazlitemu

Similar to Mobile Convention Brussels 2014 - Paul Skeldon (20)

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
information security importance and use.ppt
information security importance and use.pptinformation security importance and use.ppt
information security importance and use.ppt
MuhammadAbdullah311866
Lecture15.ppt
Lecture15.pptLecture15.ppt
Lecture15.ppt
RamaNingaiah
formintroduction to ISF.ppt ination security fundamentals
formintroduction to ISF.ppt ination security fundamentalsformintroduction to ISF.ppt ination security fundamentals
formintroduction to ISF.ppt ination security fundamentals
arfatdell
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
Prakhyath Rai
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
Sergio Loureiro
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
Kevin Fisher
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
T. J. Saotome
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
i_scienceEU
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
Research on AI using Cyber Security and Forensics
Research on AI using Cyber Security and ForensicsResearch on AI using Cyber Security and Forensics
Research on AI using Cyber Security and Forensics
projob2412
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
information security importance and use.ppt
information security importance and use.pptinformation security importance and use.ppt
information security importance and use.ppt
MuhammadAbdullah311866
formintroduction to ISF.ppt ination security fundamentals
formintroduction to ISF.ppt ination security fundamentalsformintroduction to ISF.ppt ination security fundamentals
formintroduction to ISF.ppt ination security fundamentals
arfatdell
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
Prakhyath Rai
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
Sergio Loureiro
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
Kevin Fisher
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
T. J. Saotome
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
i_scienceEU
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
Research on AI using Cyber Security and Forensics
Research on AI using Cyber Security and ForensicsResearch on AI using Cyber Security and Forensics
Research on AI using Cyber Security and Forensics
projob2412

More from Mobile Convention (20)

Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile Convention
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisThe Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
Mobile Convention
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
Mobile Convention
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Mobile Convention
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Mobile Convention
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobile Convention
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Mobile Convention
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Mobile Convention
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip GosseleMobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention
Mobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention Brussels 2014 - St辿phane CorubleMobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris HeilmannMobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen LemaireMobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention
Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile First Will Not Be Enough | Forrester at Mobile Convention Paris
Mobile Convention
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisThe Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
Mobile Convention
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016F**ck the change | Stefanie Palomino at Mobile Convention London 2016
F**ck the change | Stefanie Palomino at Mobile Convention London 2016
Mobile Convention
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Size Doesn't Matter | Twitter at Mobile Convention London 2016
Size Doesn't Matter | Twitter at Mobile Convention London 2016
Mobile Convention
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...
Mobile Convention
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobility Past, Present & Future - A personal journey through time | Mobile Co...
Mobile Convention
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...
Mobile Convention
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...
Mobile Convention
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention Brussels 2014 - InBeacon - Remco Bron
Mobile Convention
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch
Mobile Convention
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.com
Mobile Convention
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention Brussels 2014 - Filip Nuytemans Uber
Mobile Convention
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention Brussels 2014 - Benjamin Tysebaert
Mobile Convention
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention Brussels 2014 - Tom van den Broek
Mobile Convention
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip GosseleMobile Convention Brussels 2014 - Filip Gossele
Mobile Convention Brussels 2014 - Filip Gossele
Mobile Convention
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo QuaintanceMobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention Brussels 2014 - Kimo Quaintance
Mobile Convention
Mobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention Brussels 2014 - St辿phane CorubleMobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention Brussels 2014 - St辿phane Coruble
Mobile Convention
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris HeilmannMobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention Brussels 2014 - Chris Heilmann
Mobile Convention
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen LemaireMobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention Brussels 2014 - Jeroen Lemaire
Mobile Convention

Mobile Convention Brussels 2014 - Paul Skeldon

  • 1. Privacy-friendlybut secureaccess control via mobile devices Bart De Decker KU Leuven, iMinds-DistriNetCelestijnenlaan 200A, 3001 Heverlee e-mail:Bart (DOT) DeDecker (AT) cs (DOT) kuleuven (DOT) be URL:mobcom.org
  • 2. Overview Context: MobCom project Data minimization Objections Framework Evaluation Conclusion
  • 4. Context: Project goals Privacy Data minimization Unlinkability Assurance Trustworthiness of data Customization Less personal data Crime/abuse Prevention / detection / punishment
  • 5. Data minimization Minimize disclosure of personal data Avoid traces Difficult to erase OfflineDigital/Online
  • 6. Data minimization Authorized users Identified users Anonymous credentials Prove ownership Selective disclosure Unlinkable Examples: Idemix (IBM) U-Prove (MS) Name = Birth date = 1973/01/26 Subscription= 31/12/2014
  • 7. Data minimization Signed by XYZ Birthdate before 27/11/1996 Subscription after 1/12/2014 User to mobileauthentication
  • 8. Objections Customization? Abuse? L看霞温鉛岳霞?
  • 9. Objection I: Customization We need to know our customers Large profiles Protection Liabilities Data mining Monetizationof customer data
  • 10. Solution I: Customization Local profiles Cover more User in control Avoid cold start If needed: Pseudonym
  • 11. Objection II: Abuse Anonymity provokes abuse Abuse the infrastucture Money laundring ...
  • 12. Solution II: Anti-Abuse Prevention Pseudonymity Deanonymization
  • 13. Objection III: Loyalty Reward recurrent behaviour ?
  • 14. Solution III: uCentives = Micro-incentive Anonymous Bound to the users identity Redeem: Prove ownership Value Exp. date
  • 15. Framework SW developers security/privacy experts Security/privacy often afterthought Framework Technology-agnostic Policy-driven [Context-aware] Separation of Concerns SW developer, Service provider, Technology provider, User
  • 17. Evaluation inShopnito Shopping assistant avisPoll Anonymous but Verifiable, Internet Service POLL System
  • 18. Invitation Hands-on session (PriMan Framework) When: Tue Dec 16, 13:30 17:00 Where: KU Leuven, Dept. Computer Science URL: mobcom.org/announcements/priman-workshop Closing workshop MobCom & SecureApps When: Wed Dec 17, 9:45 17:30 Where: Faculty Club, Leuven URL: mobcom.org/announcements/closing-workshop
  • 19. Conclusion Mobile privacy-friendly AC is feasible Local profiles customization Combat Abuse Loyalty rewarded anonymously Framework allows for easy integration Separation of concerns Efficient
  • 20. Q&A