Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Aquilis: Using Contextual Integrity for Privacy Protection on Mobile Devices

Published: 18 December 2020 Publication History

Abstract

Smartphones are nowadays the dominant end-user device. As a result, they have become gateways to all users' communications, including sensitive personal data. In this paper, we present Aquilis, a privacy-preserving system for mobile platforms following the principles of contextual integrity to define the appropriateness of an information flow. Aquilis takes the form of a keyboard that reminds users of potential privacy leakages through a simple three-colour code. Aquilis considers the instantaneous privacy risk related to posting information (Local Sensitivity), the risk induced by repeating information over time (Longitudinal Sensitivity) and on different platforms (Cross-platform Sensitivity). Considering 50% of Aquilis warnings decreases the proportion of inappropriate information by up to 30%. Repeating information over time or in a broader exposure context increases the risk by 340% in a one-to-one context. We develop our own labeled privacy dataset of over 1000 input texts to evaluate Aquilis' accuracy. Aquilis significantly outperforms other state-of-the-art methods (F-1-0.76). Finally, we perform a user study with 35 highly privacy-aware participants. Aquilis privacy metric is close to users' privacy preferences (average divergence of 1.28/5). Users found Aquilis useful (4.41/5), easy to use (4.4/5), and agreed that Aquilis improves their online privacy awareness (4.04/5).

References

[1]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 2, Article Article 59 (July 2018), 23 pages. https://doi.org/10.1145/3214262
[2]
Ero Balsa, Carmela Troncoso, and Claudia Diaz. 2012. OB-PWS: Obfuscation-based private web search. In 2012 IEEE Symposium on Security and Privacy. IEEE, 491--505. https://doi.org/10.1109/SP.2012.36
[3]
Adam Barth, Anupam Datta, John C Mitchell, and Helen Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. In 2006 IEEE Symposium on Security and Privacy (S&P'06). IEEE, 15-pp. https://doi.org/10.1109/SP.2006.32
[4]
Joanna Biega, Ida Mele, and Gerhard Weikum. 2014. Probabilistic prediction of privacy risks in user search histories. In Proceedings of the First International Workshop on Privacy and Secuirty of Big Data. ACM, 29--36. https://doi.org/10.1145/2663715.2669609
[5]
Joanna Asia Biega, Krishna P Gummadi, Ida Mele, Dragan Milchevski, Christos Tryfonopoulos, and Gerhard Weikum. 2016. R-susceptibility: An ir-centric approach to assessing privacy risks for users in online communities. In Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval. ACM, 365--374. https://doi.org/10.1145/2911451.2911533
[6]
Simone Browne. 2015. Dark matters: On the surveillance of blackness. Duke University Press. https://doi.org/10.1215/9780822375302
[7]
Prima Chairunnanda, Nam Pham, and Urs Hengartner. 2011. Privacy: Gone with the typing! identifying web users by their typing patterns. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. IEEE, 974--980. https://doi.org/10.1109/PASSAT/SocialCom.2011.197
[8]
Richard Chow and Philippe Golle. 2009. Faking contextual data for fun, profit, and privacy. In Proceedings of the 8th ACM workshop on Privacy in the electronic society. ACM, 105--108. https://doi.org/10.1145/1655188.1655204
[9]
Rudi L Cilibrasi and Paul MB Vitanyi. 2007. The google similarity distance. IEEE Transactions on knowledge and data engineering 19, 3 (2007), 370--383. https://doi.org/10.1109/TKDE.2007.48
[10]
Danielle Keats Citron. 2014. Hate crimes in cyberspace. Harvard University Press. https://doi.org/10.4159/harvard.9780674735613
[11]
Natalia Criado and Jose M. Such. 2015. Implicit Contextual Integrity in Online Social Networks. Information Sciences 325, C (Dec. 2015), 48--69. https://doi.org/10.1016/j.ins.2015.07.013
[12]
Josep Domingo-Ferrer, Agusti Solanas, and Jordi Castellà-Roca. 2009. h (k)-Private information retrieval from privacy-uncooperative queryable databases. Online Information Review 33, 4 (2009), 720--744. https://doi.org/10.1108/14684520910985693
[13]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 393--407. http://dl.acm.org/citation.cfm?id=1924943.1924971
[14]
Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, and Vincent Lenders. 2014. Quantifying web-search privacy. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 966--977. https://doi.org/10.1145/2660267.2660367
[15]
Tyler Giallanza, Travis Siems, Elena Smith, Erik Gabrielsen, Ian Johnson, Mitchell A. Thornton, and Eric C. Larson. 2019. Keyboard Snooping from Mobile Phone Arrays with Mixed Convolutional and Recurrent Neural Networks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 2 (June 2019), 45:1-45:22. https://doi.org/10.1145/3328916
[16]
Qingyuan Gong, Yang Chen, Jiyao Hu, Qiang Cao, Pan Hui, and Xin Wang. 2018. Understanding Cross-Site Linking in Online Social Networks. ACM Transactions on the Web 12, 4, Article 25 (Sept. 2018), 29 pages. https://doi.org/10.1145/3213898
[17]
Saul Hansell. 2006. AOL Removes Search Data on Group of Web Users. The New York Times. https://www.nytimes.com/2006/08/08/business/media/08aol.html Accessed: 26-10-2020.
[18]
Alireza Heravi, Sameera Mubarak, and Kim-Kwang Raymond Choo. 2018. Information privacy in online social networks: Uses and gratification perspective. Computers in Human Behavior 84 (2018), 441--459. https://doi.org/10.1016/j.chb.2018.03.016
[19]
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 977--992. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/huang
[20]
Rui-zhang Huang, Guan Yu, Zhaojun Wang, Jun Zhang, and Liangxing Shi. 2013. Dirichlet Process Mixture Model for Document Clustering with Feature Partition. IEEE Trans. Knowl. Data Eng. 25, 8 (2013), 1748--1759. https://doi.org/10.1109/TKDE.2012.27
[21]
Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, and Jason I. Hong. 2018. Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 4 (Dec. 2018), 173:1-173:27. https://doi.org/10.1145/3287051
[22]
Allen St. John. 2018. How Facebook Tracks You, Even When You're Not on Facebook. Consumer Reports. https://www.consumerreports.org/privacy/how-facebook-tracks-you-even-when-youre-not-on-facebook/
[23]
Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Randy Tandriansyah, and Hoong Chuin Lau. 2018. Obfuscation At-Source: Privacy in Context-Aware Mobile Crowd-Sourcing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 1, Article Article 16 (March 2018), 24 pages. https://doi.org/10.1145/3191748
[24]
Martin Kenney and Bryan Pon. 2011. Structuring the smartphone industry: is the mobile internet OS platform the key? Journal of industry, competition and trade 11, 3 (2011), 239--261. https://doi.org/10.1007/s10842-011-0105-6
[25]
Young D. Kwon, Reza Hadi Mogavi, Ehsan Ul Haq, Youngjin Kwon, Xiaojuan Ma, and Pan Hui. 2019. Effects of Ego Networks and Communities on Self-Disclosure in an Online Social Network. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '19). ACM, New York, NY, USA, 17--24. https://doi.org/10.1145/3341161.3342881
[26]
J. Richard Landis and Gary G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (1977), 159--174. http://www.jstor.org/stable/2529310
[27]
Rahat Masood, Dinusha Vatsalan, Muhammad Ikram, and Mohamed Ali Kaafar. 2018. Incognito: A Method for Obfuscating Web Data. In Proceedings of the 2018 World Wide Web Conference (WWW '18). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 267--276. https://doi.org/10.1145/3178876.3186093
[28]
Betsy McLeod. 2018. 75+ Mobile Marketing Statistics for 2019 and Beyond. Blue Corona. https://www.bluecorona.com/blog/mobile-marketing-statistics
[29]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In 1st International Conference on Learning Representations, ICLR 2013, Scottsdale, Arizona, USA, May 2-4, 2013, Workshop Track Proceedings. http://arxiv.org/abs/1301.3781
[30]
Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2016. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 287--299. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/mondal
[31]
Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2017. Longitudinal Privacy Management in Social Media: The Need for Better Controls. IEEE Internet Computing 21, 3 (2017), 48--55. https://doi.org/10.1109/MIC.2017.76
[32]
Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and XiaoFeng Wang. 2015. UIPicker: User-Input Privacy Identification in Mobile Applications. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 993--1008. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan
[33]
Dat Quoc Nguyen. 2018. jLDADMM: A Java package for the LDA and DMM topic models. CoRR abs/1808.03835 (2018). arXiv:1808.03835 http://arxiv.org/abs/1808.03835
[34]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 1 (2004), 119--157.
[35]
Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, CA, USA. https://doi.org/10.1515/9780804772891
[36]
Helen Nissenbaum and Howe Daniel. 2009. TrackMeNot: Resisting surveillance in web search. In Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, Ian Kerr, Ian R Kerr, Valerie M Steeves, and Carole Lucock (Eds.). Oxford University Press, Oxford, Chapter 23, 417--436. https://ssrn.com/abstract=2567412
[37]
Sai Peddinti and Nitesh Saxena. 2010. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. In Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings (Lecture Notes in Computer Science), Mikhail Atallah and Nicholas Hopper (Eds.), Vol. 6205. Springer, 19--37. https://doi.org/10.1007/978-3-642-14527-8_2
[38]
Alex Pentland. 2015. Social Physics:How Social Networks Can Make Us Smarter. Penguin Books. https://books.google.fi/books?id=wBHcoAEACAAJ
[39]
Swadhin Pradhan, Wei Sun, Ghufran Baig, and Lili Qiu. 2019. Combating Replay Attacks Against Voice Assistants. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 3, 3 (Sept. 2019), 100:1-100:26. https://doi.org/10.1145/3351258
[40]
David Sánchez and Montserrat Batet. 2016. C-sanitized: A Privacy Model for Document Redaction and Sanitization. Journal of the Association for Information Science and Technology 67, 1 (Jan. 2016), 148--163. https://doi.org/10.1002/asi.23363
[41]
David Sánchez, Montserrat Batet, Aïda Valls, and Karina Gibert. 2010. Ontology-driven web-based semantic similarity. Journal of Intelligent Information Systems 35, 3 (2010), 383--413. https://doi.org/10.1007/s10844-009-0103-x
[42]
David Sánchez, Montserrat Batet, and Alexandre Viejo. 2012. Detecting Sensitive Information from Textual Documents: An Information-Theoretic Approach. In Modeling Decisions for Artificial Intelligence - 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedings (Lecture Notes in Computer Science), Vicenç Torra, Yasuo Narukawa, Beatriz López, and Mateu Villaret (Eds.), Vol. 7647. Springer, 173--184. https://doi.org/10.1007/978-3-642-34620-0_17
[43]
Awanthika Senarath, Marthie Grobler, and Nalin A. G. Arachchilage. 2019. A Model for System Developers to Measure the Privacy Risk of Data. In 52nd Hawaii International Conference on System Sciences, HICSS 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019. University of Hawaii at Manoa, 6135--6144. https://doi.org/10.24251/HICSS.2019.738
[44]
Bracha Shapira, Yuval Elovici, Adlay Meshiach, and Tsvi Kuflik. 2005. PRAW - A PRivAcy model for the Web. Journal of the American Society for Information Science and Technology 56, 2 (2005), 159--172. https://doi.org/10.1002/asi.20107
[45]
Jitesh Shetty and J. Adibi. 2004. The Enron Email Dataset Database Schema and Brief Statistical Report. Information sciences institute technical report, University of Southern California 4 (2004), 120--128.
[46]
Yan Shvartzshnaider, Zvonimir Pavlinovic, Ananth Balashankar, Thomas Wies, Lakshminarayanan Subramanian, Helen Nissenbaum, and Prateek Mittal. 2019. VACCINE: Using Contextual Integrity For Data Leakage Detection. In The World Wide Web Conference (WWW '19). ACM, New York, NY, USA, 1702--1712. https://doi.org/10.1145/3308558.3313655
[47]
Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, and Prateek Mittal. 2016. Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms. In Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, HCOMP 2016, 30 October - 3 November, 2016, Austin, Texas, USA, Arpita Ghosh and Matthew Lease (Eds.). AAAI Press, 209--218. http://aaai.org/ocs/index.php/HCOMP/HCOMP16/paper/view/14025
[48]
Daniel J Solove. 2011. Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press. https://books.google.fi/books?id=UUdQi4FxRxAC
[49]
Jessica Su, Ansh Shukla, Sharad Goel, and Arvind Narayanan. 2017. De-Anonymizing Web Browsing Data with Social Networks. In Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 1261--1269. https://doi.org/10.1145/3038912.3052714
[50]
Virpi Kristiina Tuunainen, Olli Pitkänen, and Marjaana Hovi. 2009. Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook. In 22nd Bled eConference: eEnablement-Facilitating an Open, Effective and Representative eSociety, Bled, Slovenia, June 14-17, 2009. Association for Information Systems, 42. http://aisel.aisnet.org/bled2009/42
[51]
Xiaolei Wang, Andrea Continella, Yuexiang Yang, Yongzhong He, and Sencun Zhu. 2019. LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 3, 1 (March 2019), 28:1-28:25. https://doi.org/10.1145/3314415
[52]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. "I Regretted the Minute I Pressed Share": A Qualitative Study of Regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). ACM, New York, NY, USA, Article 10, 16 pages. https://doi.org/10.1145/2078827.2078841
[53]
Mark Warr. 2014. We Sacrifice Freedom for Safety, and We Need Not Do So. UT News. https://news.utexas.edu/2014/04/21/we-sacrifice-freedom-for-safety-and-we-need-not-do-so/ Accessed: 26-10-2020.
[54]
Mengwei Xu, Feng Qian, Qiaozhu Mei, Kang Huang, and Xuanzhe Liu. 2018. DeepType: On-Device Deep Learning for Input Personalization Service with Minimal Privacy Concern. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 4, Article Article 197 (Dec. 2018), 26 pages. https://doi.org/10.1145/3287075
[55]
Jianhua Yin and Jianyong Wang. 2014. A Dirichlet Multinomial Mixture Model-based Approach for Short Text Clustering. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14). ACM, New York, NY, USA, 233--242. https://doi.org/10.1145/2623330.2623715

Cited By

View all
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)Assessing the relationship between mobile devices usage, self-efficacy and online information seeking behavior: a demographic analysis in academic rural contextAslib Journal of Information Management10.1108/AJIM-10-2023-0446Online publication date: 21-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 4
December 2020
1356 pages
EISSN:2474-9567
DOI:10.1145/3444864
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2020
Published in IMWUT Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Contextual Integrity
  2. Mobile Device
  3. Privacy

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)132
  • Downloads (Last 6 weeks)12
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)Assessing the relationship between mobile devices usage, self-efficacy and online information seeking behavior: a demographic analysis in academic rural contextAslib Journal of Information Management10.1108/AJIM-10-2023-0446Online publication date: 21-Jun-2024
  • (2023)PARROTProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808807:1(1-37)Online publication date: 28-Mar-2023
  • (2022)Implementing GDPR for mobile and ubiquitous computingProceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications10.1145/3508396.3512880(88-94)Online publication date: 9-Mar-2022
  • (2022)Stepping Into the Next Decade of Ubiquitous and Pervasive Computing: UbiComp and ISWC 2021IEEE Pervasive Computing10.1109/MPRV.2022.316006321:2(87-99)Online publication date: 1-Apr-2022
  • (2021)HoneysuckleProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34780975:3(1-27)Online publication date: 14-Sep-2021
  • (2021)TheophanyProceedings of the 29th ACM International Conference on Multimedia10.1145/3474085.3475507(2056-2064)Online publication date: 17-Oct-2021

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media