context-aware computing network architectures, nca/eca, and a privacy protection technology emapp

64
1 National Institute of Informatics Context-Aware Computing Network Architectures, NCA/ECA, and a Privacy Protection Technology EMAPP ational Institute of Informatics (NII), Jap Shigeki Yamada and Eiji Kamioka {shigeki, kamioka}@nii.ac.jp http://www.nii.ac.jp/index.html

Upload: ewan

Post on 25-Jan-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Context-Aware Computing Network Architectures, NCA/ECA, and a Privacy Protection Technology EMAPP. National Institute of Informatics (NII), Japan Shigeki Yamada and Eiji Kamioka {shigeki, kamioka}@nii.ac.jp http://www.nii.ac.jp/index.html. National Institute of Informatics (NII) at a Glance. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

1National Institute of Informatics

Context-Aware Computing Network Architectures, NCA/ECA, and

a Privacy Protection Technology EMAPP

National Institute of Informatics (NII), JapanShigeki Yamada and Eiji Kamioka

{shigeki, kamioka}@nii.ac.jphttp://www.nii.ac.jp/index.html

Page 2: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

2

National Institute of Informatics (NII) at a Glance

Established in April, 2000 as one of the inter-university research institutes by the Ministry of Education, Culture, Sports, Science and Technology of Japanese Government

Became a new corporate body and affiliated with Research Organization of Information and Systems in April, 2004

Broad range of researches in informatics research areas from basic theories to applications: Foundations of Informatics, Infrastructure Systems,

Software, Multimedia Information, Intelligent Systems, Human and Social Information, and Information Research

Close cooperation with industries and universities to promote utilization of the outcomes of research in our society

Page 3: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

3

NII at a Glance (Contd.) Providing a scientific information

infrastructure in Japan SINET (Science Information Network) and

Super-SINET Inter-university library-related services

such as catalog information service (NACSIS-CAT) and electronic library service (NACSIS-ELS)

Started a PhD graduate school in 2002: currently 50 PhD candidates

Annual budget of 1 00 Million Dollars and 340 members, including 170 researchers

Page 4: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

4

Topics in this Presentation Our Activities of Research on Ubiquitous

Computing Networks Context-Aware Computing Network

Architectures NCA/ECA and their Preliminary Network Performance Evaluation

Privacy-Protection Technology, EMAPP (Encapsulated Mobile Agent-based Privacy Protection)

Page 5: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

5National Institute of Informatics

(1) Context-Aware Computing Network Architectures and their Preliminary Network Performance Evaluation

DefinitionService scenario examplesRequirementsFunctional modulesNetwork architecturePreliminary performance evaluationFuture work

Page 6: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

6

Ubiquitous Computing Next Generation Mobile Computing

Networks will evolve into ubiquitous computing networks

Concepts of Ubiquitous Computing Ubiquity: Everywhere Invisibility: Computers will disappear

below the threshold of our awareness. Invisibility requires computers to capture

and analyze the user’s context: Context-awareness

Page 7: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

7

Context-Aware Application Model

Implicit Input

http://lieber.www.media.mit.edu/people/lieber/Teaching/Context/

Out-of-Context-Paper/Out-of-Context.html

Page 8: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

8

Context-Aware Service Scenario 1

You are walking in Paris You ask your wearable computer how

to get to the Eiffel Tower The context-aware system

automatically captures your context: your voice (<- microphone) your location and direction (<-

GPS) analyzes and interprets the context retrieves the route information displays the information on your HMD

(Head Mount Display) nearest subway station, subway

fare and walking route on the map of Paris

Tour guide in Paris

I want to visit the Eiffel Tower!How can I get there?

Page 9: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

9

Context-Aware Service Scenario 2

You are sleeping in an airplane Your boss phones you at your office The context-aware system detects the call

and analyzes your context: your location your activity status available communication devices

understands you cannot answer the call as you are

asleep you have a headset-type device near

your seat stores the phone message in a voice mail

server sends a message to your handset device You read the message when you wake up

Personal communication

service

--- Context ---Location: on an airplaneActivity status: sleepingAvailable device: headset

Page 10: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

10

Previous Researches on Ubiquitous Computing

Most of the research efforts for the context-aware computing have been devoted to sensor devices, computer-human interactions, and context-aware application software

Few research works focus on the networking issues

Page 11: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

11

Our Approach on Ubiquitous Computing Networks

To spread context-aware services widely, we need a universal context-aware service network infrastructure

Context-aware services should be available anywhere but not restricted in local areas

We should make use of the WAN’s capability of covering both the small and wide areas and enabling seamless network connection

Page 12: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

12

Functional Requirements of Context-Aware Services

Context-Awareness Captures,stores, and updates the user context

Information Binding interprets the user context and associates it

with the appropriate contents and services that the users wants

Information Provision Finds the location of contents and services,

makes an access to them, and converts them to be adapted to the information receiver’s communication environment if necessary

Provides the contents and services with the information receiver at the right timing

Page 13: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

13

Communication Receiver

Communication Sender

User Content

Server

Context-Aware Personal Communication Services

Context-Aware Information Delivery Services

Network

Network

Communication Context

User Contex

t

Media and

Services

Media and

Services

ContentsAnd

Services

Contents and

Services

Context Analysis,Conversio

n

Context Analysis,conversio

n

Context-Aware Service Category and Service Model

Communication Context

Page 14: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

14

Consideration on Context-Aware Network Architecture

Context-aware services must seamlessly be available indoor --- outdoor LANs --- WANs stationary --- mobile

Wide-area coverage and mobility management capabilities must be supported

Network Architecture that integrates a 3G network architecture with a wireless LAN (WLAN)

Page 15: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

15

Functional Modules for Context-Aware Services

Four functional modules for context-aware services to handle the user context and the relevant content

(1) UIN (Universal Information delivery Navigator) decision making module collects user context from user devices executes user authentication analyzes and interprets the context decides the content that the user needs refers to a directory server to obtain the location of

the content sends the content itself or the content location

information to the user

Page 16: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

16

Functional Modules for Context-Aware Services (Contd.)

(2) DA (Directory Agent) Manages the location of content servers connected to

the Internet Processes service discovery queries from the UIN Responds to the UIN with service replies including

the location of the content server (3) UMD (User Management Database)

Manages information about users (e.g., authentication information, preferences and user context information that users have sent in the past)

User context information is updated when user’s context changes

(4) MPS (Media Processing Server) Converts the contents and services provided by a

content server into an appropriate form, if necessary

Page 17: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

17

Access Network for Context-Aware Services

Integration of UMTS release 5 (all IP network architecture) and Wireless LAN

PS-CNRNCBSMT

IMS

I-CSCF

HSS

S-CSCF

SGSNUTRAN

P-CSCFGGSN

PSTN/ISDN

WLAN

MTISP Network

AP RR Internet

UMTS Release 5

Page 18: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

18

Disposition of Functional Modules in the Network

Disposition of the functional modules in a network plays a key part in the context-aware network architecture Content servers should be placed on the

end-user side in local area networks connected to the Internet

Two alternatives on the location where the four functional modules (UIN, DA, UMD, and MPS) should be placed

Page 19: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

19

Two Alternative Network Architectures

Network-Centric Architecture (NCA) stores, analyze, interprets the user

context in various functional components managed by the network operator and connects relevant functional components with SIP.

End-user-centric architecture (ECA) stores and interprets the user context in

the end-user’s functional components managed by end-users or service providers and connects relevant functional components with HTTP.

Page 20: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

20

PS-CN

RNCBSMT

IMS

SGSN

UTRAN

WLAN

MT R

ISP network

AP

Content

Server

InternetLAN

P-CSCF

R

I-CSCF S-CSCF

UMD

MPS

DA

(1)

(2)

(3)

(7)

[5,10]

(4,9)

[6](8)

(11)[12]

[13]

[14]

[15]

[16]

UIN

NCA (Network Centric Architecture)

GGSN

RHSS

User information is managed by the UMD through GGSN

Page 21: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

21

NCA Information Flow from Capturing User Context to

Displaying the ContentI-CSCF S-CSCFMT UMDUIN DAP-CSCF

REGISTER

REGISTER

REGISTER

OKOKOK

Content Server

HTTP GET

HTTP OK (download)

(1) (2)

(3)(4)

[5]

[6]

(7)

(8)(9)

[10]

(11)

[12]

[13]

[14][15][16]

SIP SIP

SIP

SIPSIPSIP

SLP

SLP

Based on the 3GPP specification

Response time

Referring topreference and past context

Referring topreference and past context

Getting location of

content server

Getting location of

content server

Authentication+

Getting S-CSCF

Authentication+

Getting S-CSCF

Page 22: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

22

PS-CN

RNCBSMT

IMS

SGSN

UTRAN

WLAN

MT R

ISP network

AP

Content

ServerInternet

LAN

R

R

UMD

DA

MPS

UIN

S-CSCF

HSS

GGSN

GWTI

R

P-CSCF

I-CSCF

ECA

ECA (End-User Centric Architecture)

Page 23: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

23

SYN

SYN+ACK

ACK

HTTP PUT

ACK

HTTP OK

ACK

FIN

ACK

FIN

ACK

Request

ReplyProcessing time

Response time

MT UMDUIN DA Content Server

HTTP GET

HTTP OK (download)

Authentication

Get location of content

server

ECA Information Flow from Capturing User Context to Displaying the Content

Page 24: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

24

Preliminary Performance Evaluation of NCA and ECA

Need to evaluate the network architecture from various viewpoints and criteria Ease of deployment of new services, network cost,

network flexibility and scalability As a first step: comparison of overall network performance

of NCA and ECA Purpose:

Not to obtain precise or absolute network performance values

But to reveal the general characteristics of the two architectures

to clarify which design parameters have the most significant influence on performance

Performance model to measure the response time of the network

Page 25: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

25

Network Performance Evaluation The response time

The interval between the time when a user generates a user context and the time when the user receives the contents/services location information.

Mean and 95th percentile response times of the two architectures are obtained by queuing theory and simulation

Page 26: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

26

Performance Models The response time can be broken

down into three delay elements Processing delay for processing

SIP/UDP/IP, HTTP/TCP/IP, and SLP/UDP/IP packets

IP-network delay includes all of the network-layer, data link layer and physical layer delays

Wireless communication delay generated at wireless access sections

Page 27: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

27

Performance Simulation Parameters

Parameters Traffic Distribution

Values for Calculation and Simulation

Wireless-Related Delay either in MT, UTRAN and PS-CN or in MT,WLAN and ISP Network

Normal Distribution

10 msec. as an average3 msec. as a standard deviation

IP Network Delay in the IMS

Normal Distribution

10 and 20 msec. as averages3 and 4 msec. as standard deviations

Network Delay in the Internet

Normal Distribution

50 and 100 msec. as averages7 and 10 msec. as standard deviations

Processing Time in Application Servers

Exponential Distribution

10, and 50 msec. per IP packet

Utilization of Application Servers

Constant From 0.1 to 0.9 with the interval of 0.1

IP Packet Arrival Rate Poisson Distribution

Arrival rates are determined so as to satisfy the specified utilizations of application servers.

Processing Time in MT Constant 10 msec.

Page 28: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

28

Server-processing time of 50-ms and Network Delays of 10-ms for NCA and 50-ms for ECA

Response time of NCA and ECA models under server-processing time of 50ms and network delays of 10 ms (NCA model) and 50 ms (ECA model)

0.0

2.0

4.0

6.0

8.0

10.0

0 0.2 0.4 0.6 0.8 1

Server utilization

Res

pons

e ti

me

[s]

Mean values (NCA: 10ms)95th percentiles (NCA: 10ms)Mean values (ECA: 50ms)95th percentiles (ECA: 50ms)

Page 29: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

29

Server-processing time of 50-ms and Network Delays of 20-ms for NCA and 100-ms for ECA

Response time of NCA and ECA models under server-processing time of 50ms and network delays of 20 ms (NCA model) and 100 ms (ECA model)

0.0

2.0

4.0

6.0

8.0

10.0

0 0.2 0.4 0.6 0.8 1

Server utilization

Res

pons

e tim

e [s

]Mean values (NCA: 20ms)95th percentiles (NCA: 20ms)Mean values (ECA: 100ms)95th percentiles (ECA: 100ms)

Page 30: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

30

Analysis in Low-Performance Application Servers For Small Network Delays

ECA has smaller response times than NCA has

For Large Network Delays ECA has smaller response times than

NCA has except for the cases with low application-server utilization

For low performance application servers, ECA is better in the response time than NCA because server processing time is a dominant factor and NCA requires many traversals of application servers

Page 31: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

31

Server-processing time of 10-ms and Network Delays of 10-ms for NCA and 50-ms for ECA

Response time of NCA and ECA models under server-processing time of 10ms and network delays of 10 ms (NCA model) and 50 ms (ECA model)

0.0

0.5

1.0

1.5

2.0

2.5

0 0.2 0.4 0.6 0.8 1

Server utilization

Res

pon

se t

ime

[s]

Mean values (NCA: 10ms)95th percentiles (NCA: 10ms)Mean values (ECA: 50ms)95th percentiles (ECA: 50ms)

Page 32: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

32

Server-processing of 10-ms and Network Delays of 20-ms for NCA and 100-ms for ECA

Response time of NCA and ECA models under server-processing time of 10ms and network delays of 20 ms (NCA model) and 100 ms (ECA model)

0.0

0.5

1.0

1.5

2.0

2.5

0 0.2 0.4 0.6 0.8 1

Server utilization

Res

pon

se t

ime

[s]

Mean values (NCA: 20ms)95th percentiles (NCA: 20ms)Mean values (ECA: 100ms)95th percentiles (ECA: 100ms)

Page 33: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

33

Analysis in High-Performance Application Servers

For Small Network Delays For Server utilization under 0.7, NCA has smaller

response times than ECA For Server utilization over 0.7, ECA has smaller response

times than NCA For Large Network Delays

Similar results are obtained The ECA response times suffers from much larger delays

while NCA response times are almost unchanged as in the cases of small network delays

For High-performance application servers, When the application servers are busy, NCA is better in

the response time than ECA When the application servers are not busy, ECA is better

than NCA This is because network delay is a dominant factor

and ECA suffers from large internet delays while NCA will have smaller network delays maintained by the network operator

Page 34: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

34

Summary of Performance Evaluation

Response times of NCA and ECA greatly changes depending upon given network parameter values

Average network delays will increase over time because of continuous network growth and geographical expansions

Application servers may enjoy higher performance over time, assuming continuous improvement of device technologies

This implies that NCA will be slightly advantageous in terms of response times because the NCA’s response times are mitigated by fast servers

Page 35: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

35

Future Work Detail component design Comparisons of the NCA and ECA from

other technical viewpoints such as network scalability and reliability

Distributed Allocation of Context-Aware Functional Components over the Network

Incorporation of Privacy and Security Mechanisms

Performance Simulation Considering User Mobility, Frequent Context Updates and Heterogeneous Network Topology

Page 36: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

36National Institute of Informatics

(2) Privacy-Protection in Ubiquitous Computing Environments : EMAPP:Encapsulated Mobile Agent-based Privacy Protection

BackgroundPrivacy model Features and problemsVerification by scenariosOverall ArchitectureFuture work

Page 37: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

37

Why is Privacy ProtectionImportant in Ubicomp Environments?

Two major concepts of ubiquitous computing Ubiquity Invisibility

Invisibility requires context-awareness that captures and interprets user context

User context includes privacy–sensitive personal data such as user’s location, activity status, and preferences

New privacy protection technologies are required for ubiquitous environments Dynamic changes of user’s computing and

communication environments

Page 38: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

38

Why Do We Need New Security and Privacy Technologies?

Two major concepts of ubiquitous computing1. Ubiquity

distributed and ad-hoc in nature devices are not always administered by the same entity every device becomes a potential gateway to leak

information across network perimeters

2. Invisibility requires context-awareness that captures and interprets

user context user context includes privacy–sensitive personal data

such as user’s location, activity status, and preferences New security and privacy protection technologies

are required for ubiquitous environments

Page 39: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

39

Privacy Invasions in Ubicomp Environments

Data Collection

Improper use of Alice’s personal data

Unauthorized use of Alice’s personal dataAlice

(Personal Data Owner)

Bob (Data Collector)

Carol (Data User)

Little control over how her data will be used

Data Copy

Page 40: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

40

Privacy Issues Where to store personal data?

End-User Centric Architecture (ECA) Into stationary servers and devices Into wearable servers and devices

Network- Centric Architecture (NCA) Who manages privacy?

User, Network Operator, or Service Provider How to protect privacy?

Existing Technologies:P3P and pawS system Our approach: EMAPP

Page 41: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

41

Context Data Storage Management : ECA

InternetWLAN

MT

ISP Network

AP

PS-CN

RNCBSMT SGSN

UTRAN

GGSNU I N

LAN

R R

Contents/

Services Server

R

LAN

DAR

(1)

(2) (9)(8)(7

)

(6)

(5)

(4)(3) (10)

(11)

(12)

(16) (15) (14) (13)

(17)(18)

(19)(20)

• User context data are stored in user facilities (UMD) and managed by users or service providers

• Users feel easy• User has all the responsibility

UMD

MPS

Page 42: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

42

WLAN

MT

ISP Network

AP

PS-CN

RNCBSMT

IMS

I-CSCF

UCN

S-CSCF

Contents/

Services Server

SGSN

RInternet

UTRAN

LAN

P-CSCFGGSN

R R

DA

(1)

(2)(3)

(4) (5)

(6)(7) (8)

(9)

(10)

(11) (12)

(13)

(14)

(15)(16)(18)(19)(20) (17)

(21)

(26)

(25) (24)

(23)

(22)

Context Data Storage Management : NCA

(Network Centric Architecture)

• User context data are stored inside the 3GPP All Network (UMD) managed by Network Operators

• Secure and uniform management • Users may feel uneasy

UMD

MPS

Page 43: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

43

Design Space for Privacy Protection

Data Collection

PreventionAvoidanceDetection

Access

Second Use

Personal Data Owner

Data Collector (Service Provider or web site)

Data User

PreventionAvoidanceDetection

PreventionAvoidanceDetection

Page 44: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

44

Classification of Privacy Protection Technologies (by X. Jiang (UCB))

Prevention

Avoidance

Detection Collection Acces

sSecond use

RBAC

Location Support

Wearables

AnonymizationPseudonymizatio

n

P3P

User Interfaces for Feedback, Notification, and Consent

Privacy Millers

Page 45: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

45

pawS: a Privacy Protection System (ETH)

Privacy Proxy Service Proxy

Privacy Beacon

(2) Personal Data & Service Name

(1) Service Announcement

(3) Privacy Policy Download

(4) Comparison of Privacy Policy with User Preferences

Privacy Assistant

(5)Personal Data

Page 46: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

46

• Most of Existing Privacy Models: “Outgoing Data” model– Once an access is authorized, personal data may

flow out or may be copied from the original database

– This may cause improper use of personal data by service providers and data collectors

• EMAPP Privacy Model: “Incoming Agent” model– does not move personal data from the database,

but move programs (mobile agents) into the location where the personal data are stored

– Personal data are referred to by mobile agents only inside a secure space (privacy capsule)

– Personal data are prohibited to directly flow out from the privacy capsule: they must be wrapped in the mobile agent that migrates to another location if necessary

Encapsulated Mobile Agent-based Privacy Protection: EMAPP

Page 47: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

47

EMAPP Privacy Model

User’s Preferences

Personal Data Mobile Agent

Privacy Capsule

Execution Results

Privacy Proxy

Privacy Policy

Download

Migration

Personal data are referred to by mobile agents only inside the privacy capsule and prohibited to flow out from the privacy capsule

Page 48: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

48

• Advantages• Prevents personal data from being copied and

used improperly• Provides a preventive mechanism to prevent

undesirable use of personal data• Provide an avoidance mechanism in the data

collection phase, combined with P3P technology• Problems

• Can the EMAPP model be applied to a wide variety of applications?

• How can the EMAPP model be implemented?• Performance overhead

Features of EMAPP

Page 49: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

49

Our Approach Assumes a general secure mobile agent

execution environment and PKI (Public Key infrastructure)

Adds privacy protecting mechanisms to the above secure environment

Classifies the patterns of mobile agent behaviors Sets the discipline of mobile agent behaviors Verifies the discipline from various service

scenarios Provides the mechanism to enforce the discipline Builds up a privacy protection architecture

Page 50: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

50

Mobile Agent (MA) Behavior Patterns

(2) Migration with Personal Data

Personal Data(PD1)

MA

Service Provider/ User’s Privacy Capsule

PD1

Personal data(PD2)

MA

PD1

Personal data(PD1)

MA

PD1

(1) MA Erase

MAErase

MA

PD1

(4) Personal Data Takeover to Other MA

(5) Other Device/ MA Control

Device

Service Provider/ User’s Privacy Capsule

(3) Message Communication with Personal Data

Page 51: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

51

Mobile Agent Behavior Disciplines for Protecting Privacy

Erase Personal Data Once a mobile agent takes in the personal data, they should be erased by

the erase or suicide of the mobile agent after the personal data become unnecessary

Use Migration but not Message Communication If personal data or the computed results must be referred to in another

host, they should be wrapped in the mobile agent and the mobile agent including the personal data should migrate into another host. Message communication that includes personal data or the computed results should not be used to avoid data copying.

Allow only Internal Takeover of Personal Data or Computed Results

If the personal data themselves must be taken over to another mobile agent, the handover between different mobile agents should be carried out inside the same host. No handover between different hosts is allowed.

Page 52: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

52

User’s PreferencesPersonal Data

Privacy Proxy

Mobile Agent

Privacy Policy

Mobile Agent

Service Proxy

EMAPP System for Nearby-Shop Advertisement Service

Privacy BeaconPrivacy Assistant

(1)

(2)

(5) Execution Results

(3) Policy Download(4) Agent Migration

(6)

Privacy Capsule

Page 53: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

53

Shop(Service Provider)

User’s Privacy ProxyUser PDA

Personal Data

Nearby-Shop Advertisement Service Control Flow

MA: Mobile Agent Policy Download

Generate MAMA Migration

Policy/ PreferenceMatching

AgeAdvertisement Information

User Detection

Migration with Age Information

Erase MA

Page 54: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

54

EMAPP System for a Phone Answering Service

Privacy Policy

Mobile Agent

Service Proxy

Answering Machine

User’s PreferencesPersonal Data

Bob’s Privacy Proxy

Mobile Agent

User’s PreferencesPersonal Data

Mobile Agent

Bob’s Personal Assistant

Alice’s Personal Assistant

Privacy Capsule

Alice’s Privacy Proxy

Page 55: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

55

Service ProviderPrivacy capsule AUser A

Personal Data A(Location Info.)

User B

Phone Answering Service Control Flow

Generate three MAs

Set an answering phone

Go out MA-1MA-2

Mediating MA (MA-3)

MA-1

MA-2

Privacy capsule B Personal

Data B(Location Info.)

Go out

Migration with Go-out information

Migration with Go-out information

Internal Takeover of Go-out Info.

Page 56: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

56

E-Commerce SiteUser’s Privacy ProxyUser

Personal Data

Credit Card Accounts Service Control Flow

MA: Mobile Agent Policy Download

Generate MAsMA Migration

Policy/ PreferenceMatching

Credit card number

Notice to user

Request accounts

Transaction MA

Authentication MA

Migration with credit card information

Erase MA

Internal takeover of credit card information

Page 57: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

57

Three Types of Privacy Violation Sources

Malicious Service Provider may send a malicious mobile agents to

the user Malicious User

may employ a malicious host or platform for mobile agents

Malicious Third Parties Other than Service Provider and User

Page 58: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

58

Countermeasures to Malicious Service Providers

Guarantees the correct behavior of Mobile Agents

Service Provider (Sender Host) The Agent Analyzer in the Certificate Authority

analyzes its mobile agent and generates the Computed Privacy Profile to prove the correctness of the mobile agent behavior disciplines

The mobile Agents and the Computed Privacy Profile are sent with a digital signature to the user host

User Host (Receiver Host) During the mobile agent execution, the Host

Checker monitors the host behaviors

Page 59: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

59

Countermeasures to Malicious Service Providers (Contd.)

Certificate Authority

Agent Analyzer

Service ProviderMobile Agent

User Host

Analyzed Privacy Profile

(3) Digital Signature

(5) Mobile AgentPersonal Data

(1) Analyze

(2) Generate

(4) Computed Privacy Profile

Page 60: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

60

Countermeasures to Malicious Users

Monitors the mobile agent to detect unauthorized access to personal data in the mobile agent

Service Provider (Sender Host) The Agent Analyzer in the Certificate Authority analyzes its mobile agent and generates the Host Checker to detect malicious behaviors of receiver

hosts The mobile Agents and the Host Checker are sent

with a digital signature to the user host User Host (Receiver Host)

During the mobile agent execution, the Host Checker monitors the host behaviors

Page 61: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

61

Countermeasures to Malicious Users (Contd.)

Certificate Authority

Agent Analyzer

Service ProviderMobile Agent

User Host

(3) Digital Signature

(5) Mobile Agent

Host Checker

Host Checker

Personal Data

(1) Analyze

(2) Generate

(6)

Page 62: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

62

Countermeasures to Malicious Third Parties

May use PKI and cryptography to prevent spoofing, eavesdropping and man-in-the-middle attacks

For Further Study

Page 63: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

63

Overall Architecture of EMAPP System

Certificate Authority

Agent Analyzer

Service ProviderMobile Agent

User Host

Analyzed Privacy Profile

(3) Digital Signature

(5) Mobile Agent

Host Checker

Host Checker

Personal Data

(1) Analyze

(2) Generate

(4)

Computed Privacy Profile

(6)

Page 64: Context-Aware Computing Network Architectures, NCA/ECA, and  a Privacy Protection Technology EMAPP

NII

64

Future Work Algorithm for the Agent Analyzer to generate

the Computed Privacy Profile and Host Checker

Algorithm to verify the content of the Computed Privacy Profile

Algorithm of the Host Checker to detect unauthorized access to personal data

Prototype Implementation and Performance Evaluation