Professional Documents
Culture Documents
Seminar Synopsis: Online Information Privacy Tools For Web Applications
Seminar Synopsis: Online Information Privacy Tools For Web Applications
Seminar Synopsis
5
10
Seminar Title: Online information privacy tools for web applications
20 Class: TE-A
25
Name of Department : Computer Engineering
35
40
45
15
INTRODUCTION
Every day, Internet users send ten billion text messages and make one billion posts. This sharing of
messages and post is said as “mass-self communication” by Manuel Castells [1]. This communication
contains personal information. Hence, along with protection of personal information, there is a strong need
20 to notify users about data collection, its use and what next happens to their data.
The developed privacy protection principles like W3C P3P, Privacy by Design, “Laws of Identity” from
Kim Cameron emphasis on notification of data collection, user control over data, minimum data disclosure
and user defined consent for data use. However, today user has no control over their personal information.
Service providers have already assigned a value to personal data. They apply it to build accurate customer
25 profiles, do target advertising, sell and sharing collected information or analyzed information to other
entities without user notification and consent. Personal data is becoming an integral voice of service use on
the network. The present business models focused less on user privacy. The current framework for the
protection of user privacy includes ENISA , OpenID , UMA focused on minimum data disclosure to have
fine-grained control. Data brokers make their revenue by selling user information to publishers and
30 advertisers. Hence, Big data is now the Big business. Practices of data brokers’ raise privacy issues. The end
users are unaware of the involvement of data brokers in the bargain. There is no notification to end user
about the user information collection, manipulation, and sharing. Besides, a recent study taken in
15
Tor:(Web Browser)
This Firefox-based browser that runs on the Tor network can be used with
20 Windows, Mac or Linux PCs. This browser is built on an entire infrastructure of ‘hidden' relay servers,
which means that you can use the internet with your IP and digital identity hidden. Unlike other browsers,
Tor is built for privacy only, so it does lack certain security features such as built-in antivirus and anti-
malware software.
25 Privacy Badger
30
MyPermission:
This is another online privacy protection tool from Online Permissions Technologies for
5 application and browsers. This tool provides real-timealerts to users as soon as any application gets
connected. The user is enabled to control over their data that are accessed by the applications. The single
interface will show the list of all service permissions. This app will give rise to other functionality like
revoke, trust when the user isonline.
10
15
LITERATURE SURVEY
Author Title of Paper Proposed method of Advantages Limitations
Name finding
solution tries to minimize the Even though individuals living in
Enhancing Privacy of User attribute determination such overhead of typical access and using the buildings from which
Information Brokering in Smart as gender, age, geo-location, and control solutions and is, the energy information is collected
Jukka Jalku therefore, suitable for cases
Districts by Adaptive prediction using SNS are not directly monitored, the
Pseudonymization (social network services). where large data streams are collected information may violate
analyzed in real-time. their privacy.
1. In order to improve data
security and availability, a On the one hand, some of these
An Effective Data Privacy PH_WT algorithm based on methods divided too much
Protection Algorithm Based on partitioned histogram data haar wavelet transform is histogram intervals, which violate
Yi Qiao Differential Privacy in Edge
Xi-Hua Ping
publishing algorithm based on proposed.. the ϵ -differential privacy. On the
Computing wavelet transform for other hand, because too many
Xi-Xi Mau 2.The results show that this
information security. algorithm is superior to other intervals are divided and too much
algorithms in privacy noise is added, adding noise to each
protection and data interval makes the data unusable..
availability.
1. The framework enables
a privacy preferences expression device administrators to
A User-Friendly Privacy
framework for BLE-based register their devices and
Shi-Cho Cha Framework for Users to Achieve
Kuo-Hui Yeh Consents With Nearby BLE applications named PrivacyBat. privacy polices. BLE pairing protocol is vulnerable
Zi-Jia Huang Devices The framework defines 2. The proposed framework to brute force attacks
Chunhua Su specifications for users to achieve also defines a standard means
agreements on privacy practices for users to notify BLE
with nearby BLE devices. devices of their privacy
preferences.
Yanqing Yao A Generalized Constraint of introduce α-mutual information It’s well known that entropies Shannon entropy is typically not the
Privacy: α -Mutual Information security via the Rényi entropy for are used to quantify the “right” notion of entropy for
Security a series of privacy schemes and randomness, uncertainty, or cryptography, because it is possible
aim to bridge the gap between diversity of a distribution. to define pathological distributions
statistical security and α-mutual that have high Shannon entropy but
information security. are useless to cryptographic
Dr. D. Y. Patil Institute Of Technology, Pimpri, Pune-18 5
Online information privacy tools for web applications
algorithms
Encryption-Free Framework of EnfPire successfully
propose a framework of privacy-
Privacy-Preserving Image degrades the server's spot-
preserving image recognition
Recognition for Photo-Based recognition accuracy from encryption cost is computationally
Kasuaki called EnfPire, in which the
Information Services 99.8% to 41.4% while high in general, which is
Nakamora server cannot uniquely determine
keeping 86.9% of the spot- undesirable for mobile devices.
the recognition result but client
recognition accuracy on the
users can do so.
user side.
OBJECTIVES
The Objectives are as follows :
To understand the most important privacy risks involved when the user communicates and access
5 variety of online services.As this research revolves around privacy awareness, so it’s vital to know the
understanding of the users towards privacy
To interpret and analyze the privacy and data policy set by the service providers.
To understand issues and challenges: To get better insights of privacy issues and challenges in privacy
this surveys useful. This survey will give more chances to identify the possible threats to the users’
15 information privacy
TOPIC DESCRIPTIPON
20 Information privacy is considered an important aspect of information sharing.
With the advancement of the digital age, personal information vulnerabilities have increased.
Information privacy may be applied in numerous ways, including encryption, authentication and data
masking - each attempting to ensure that information is available only to those with authorized access.
Internet privacy (online privacy): All personal data shared over the Internet is subject to privacy
5 issues. Most websites publish a privacy policy that details the website's intended use of collected
online and/or offline collected data.
Financial privacy: Financial information is particularly sensitive, as it may easily used to commit
online and/or offline fraud.
Medical privacy: All medical records are subject to stringent laws that address user access privileges.
10 By law, security and authentication systems are often required for individuals that process and store
medical records.
15 APPLICATIONS
These tools are used to enhance Privacy Enhancing Technologies(PET’s).
Tools help you in keeping your information private.
You can keep track of wich websites track you and what do they do with your personal data.
UMA(User Managed Access) tools allows you to choose how your data may be used or what
20 information to provide to certain websites.
Tools like TOSDr help you to avoid the hidden agreements which you may not read during agreeing the
conditions.
25
REFERENCES
3. A. Cavokian and D. Reed, “Big Privacy:Bridging Big Data andthe Personal Data Ecosystem
Through Privacy by Design,” 2013. [Online]. Available:
5 https://www.ipc.on.ca/images/Resources/pbd-big_privacy.pdf. [Accessed: 28-Jan-2017].
12. H. Olesen and S. Khajuria, “Accessing and Disclosing Protected Resources: A User-Centric
35 View,” in 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015, pp. 1–5.
13. “Sharing Information: A Day in Your Life, Fed. Trade Comm’n,.” [Online]. Available:
http://www.consumer.ftc.gov/media/video-0022-sharing-information-day-your-life.
[Accessed: 19-May-2016].
40
14. “Acxiom, Annual Report 2013.” [Online]. Available:
http://d3u9yejw7h244g.cloudfront.net/wp-content/uploads/2013/09/2013-Annual
Report.pdf.