SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Security and Privacy in
                        Emerging Aerospace Scenarios




                              Pierangela Samarati
                    Dipartimento di Tecnologie dell’Informazione
                           Università degli Studi di Milano
                             pierangela.samarati@unimi.it




                            ESTEL Conference presentation
                            Rome, Italy - December 21, 2011


c Pierangela Samarati                                              1/14
The modern Information Society

 • Computers, mobile smart devices, and space technology are at
   the basis of the modern Information Society for enhancing the
   quality of life
 • Space technology in ICT:
         ◦ provide communications
         ◦ provide broadcast services
         ◦ deliver services (e.g., e-learning, e-health, e-commerce) to remote
           regions
         ◦ observe the Earth (e.g., environmental monitoring, urban planning,
           disaster management)
         ◦ provide time and space localization (GPS)
         ◦ study near-Earth space and explore the solar system and the
           distant universe
         ◦ ...
c Pierangela Samarati                                                        2/14
Security in Aerospace Systems
Aerospace security

 • Guaranteeing security requires protecting the aerospace
   infrastructure (satellites, planes, ground stations),
   communications, and applications, to ensure:

         ◦ integrity of data and resources

         ◦ confidentiality of information (privacy)

         ◦ availability (no denial of services)




c Pierangela Samarati                                        4/14
Security techniques

 • Some protection can be achieved by applying classical
   techniques, e.g.:

         ◦ authentication of users and devices

         ◦ access control

         ◦ firewalls

         ◦ antiviruses and intrusion detection systems

         ◦ encryption for protecting data in storage and communications

 • In emerging scenarios there are new challenges, e.g.:

         ◦ integrity and privacy in data management

         ◦ privacy in location-based applications
c Pierangela Samarati                                                     5/14
Integrity and Privacy in Data Management
Integrity and privacy in data management

 • The evolution of technologies for data management applies also
   to satellite and aerospatial data stored and processed at base
   stations

 • Outsourcing data and services to external servers can provide

        + significant cost savings and service benefits

        + higher availability and more effective disaster protection than
          in-house operations
     =⇒ natural evolution to move to the cloud environment

 • In addition to classical challenges, a major problem is:
        − data are not under the data owner’s control


c Pierangela Samarati                                                       7/14
Privacy in outsourced and cloud environment

 • Some data can be sensitive and cannot be known by parties
   different than the owner (honest-but-curious servers)
     =⇒ need to identify what information is sensitive and protect it
        from the eyes of the storing and processing servers

         ◦ store and process data in encrypted form
                − manage encrypted data, indexing for query execution, access control
                  enforcement, protect confidentiality of accesses

         ◦ break sensitive associations by storing data in the form of non
           linkable fragments
                − e.g., association between an image taken by a satellite and the
                  corresponding location data




c Pierangela Samarati                                                               8/14
Integrity in outsourced and cloud environment

 • External lazy/malicious servers can misbehave
     =⇒ data in storage can be compromised (e.g., altered data,
        missed updates)

         ◦ digital signatures

         ◦ authenticated data structures

     =⇒ queries might be not performed properly returning an
        incorrect or incomplete result

         ◦ authenticated data structures (e.g., Merkle tree)

         ◦ probabilistic approaches (e.g., data replications, marker tuples)




c Pierangela Samarati                                                          9/14
Privacy in Location-based Applications
Location-based services in the Information Society

  • Location-based services are becoming part of our daily life

          ◦ positioning of objects and persons (e.g., car navigation via a GPS
            device)
          ◦ searching for information on objects or services on a map (e.g.,
            locating a specific supermarket)
          ◦ tagging resources with geographic information (e.g., geo-tags in
            Twitter)

      =⇒ may raise privacy concerns




c Pierangela Samarati                                                          11/14
Privacy issues in location services

  • GPS tracking devices may be used for safety and security reasons
    and for monitoring users’ activities

              used to allow parents to keep track of their children’s whereabouts
              used for monitoring aging parents with Alzheimer’s disease
         !    used for physical surveillance for gathering information needed for
              investigations
         !    used by car rental companies for tracking their cars and charging
              drivers in case of agreement infringements
         !    used by employers for tracking the vehicles driven by their
              employees
        −     exploited by marketing companies for providing location-based
              advertisements


c Pierangela Samarati                                                          12/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Conclusions

  • Space technology in ICT:

         + enable new services and applications enhancing the quality of life

         + promote social and economic development

          ◦ require addressing security and privacy issues to ensure
            correctness of applications and social acceptability




c Pierangela Samarati                                                       14/14

Más contenido relacionado

Similar a Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati

Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
 

Similar a Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati (12)

IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
maitreya presentation.pdf
maitreya presentation.pdfmaitreya presentation.pdf
maitreya presentation.pdf
 
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
 
Conceptual framework for geospatial data security
Conceptual framework for geospatial data securityConceptual framework for geospatial data security
Conceptual framework for geospatial data security
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Securing tenure in rangelands: How has it been achieved and benefits
Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits
Securing tenure in rangelands: How has it been achieved and benefits
 

Último

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati

  • 1. Security and Privacy in Emerging Aerospace Scenarios Pierangela Samarati Dipartimento di Tecnologie dell’Informazione Università degli Studi di Milano pierangela.samarati@unimi.it ESTEL Conference presentation Rome, Italy - December 21, 2011 c Pierangela Samarati 1/14
  • 2. The modern Information Society • Computers, mobile smart devices, and space technology are at the basis of the modern Information Society for enhancing the quality of life • Space technology in ICT: ◦ provide communications ◦ provide broadcast services ◦ deliver services (e.g., e-learning, e-health, e-commerce) to remote regions ◦ observe the Earth (e.g., environmental monitoring, urban planning, disaster management) ◦ provide time and space localization (GPS) ◦ study near-Earth space and explore the solar system and the distant universe ◦ ... c Pierangela Samarati 2/14
  • 4. Aerospace security • Guaranteeing security requires protecting the aerospace infrastructure (satellites, planes, ground stations), communications, and applications, to ensure: ◦ integrity of data and resources ◦ confidentiality of information (privacy) ◦ availability (no denial of services) c Pierangela Samarati 4/14
  • 5. Security techniques • Some protection can be achieved by applying classical techniques, e.g.: ◦ authentication of users and devices ◦ access control ◦ firewalls ◦ antiviruses and intrusion detection systems ◦ encryption for protecting data in storage and communications • In emerging scenarios there are new challenges, e.g.: ◦ integrity and privacy in data management ◦ privacy in location-based applications c Pierangela Samarati 5/14
  • 6. Integrity and Privacy in Data Management
  • 7. Integrity and privacy in data management • The evolution of technologies for data management applies also to satellite and aerospatial data stored and processed at base stations • Outsourcing data and services to external servers can provide + significant cost savings and service benefits + higher availability and more effective disaster protection than in-house operations =⇒ natural evolution to move to the cloud environment • In addition to classical challenges, a major problem is: − data are not under the data owner’s control c Pierangela Samarati 7/14
  • 8. Privacy in outsourced and cloud environment • Some data can be sensitive and cannot be known by parties different than the owner (honest-but-curious servers) =⇒ need to identify what information is sensitive and protect it from the eyes of the storing and processing servers ◦ store and process data in encrypted form − manage encrypted data, indexing for query execution, access control enforcement, protect confidentiality of accesses ◦ break sensitive associations by storing data in the form of non linkable fragments − e.g., association between an image taken by a satellite and the corresponding location data c Pierangela Samarati 8/14
  • 9. Integrity in outsourced and cloud environment • External lazy/malicious servers can misbehave =⇒ data in storage can be compromised (e.g., altered data, missed updates) ◦ digital signatures ◦ authenticated data structures =⇒ queries might be not performed properly returning an incorrect or incomplete result ◦ authenticated data structures (e.g., Merkle tree) ◦ probabilistic approaches (e.g., data replications, marker tuples) c Pierangela Samarati 9/14
  • 11. Location-based services in the Information Society • Location-based services are becoming part of our daily life ◦ positioning of objects and persons (e.g., car navigation via a GPS device) ◦ searching for information on objects or services on a map (e.g., locating a specific supermarket) ◦ tagging resources with geographic information (e.g., geo-tags in Twitter) =⇒ may raise privacy concerns c Pierangela Samarati 11/14
  • 12. Privacy issues in location services • GPS tracking devices may be used for safety and security reasons and for monitoring users’ activities used to allow parents to keep track of their children’s whereabouts used for monitoring aging parents with Alzheimer’s disease ! used for physical surveillance for gathering information needed for investigations ! used by car rental companies for tracking their cars and charging drivers in case of agreement infringements ! used by employers for tracking the vehicles driven by their employees − exploited by marketing companies for providing location-based advertisements c Pierangela Samarati 12/14
  • 13. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 14. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 15. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 16. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 17. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 18. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 19. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 20. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 21. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 22. Conclusions • Space technology in ICT: + enable new services and applications enhancing the quality of life + promote social and economic development ◦ require addressing security and privacy issues to ensure correctness of applications and social acceptability c Pierangela Samarati 14/14