SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Security and Privacy in
                        Emerging Aerospace Scenarios




                              Pierangela Samarati
                    Dipartimento di Tecnologie dell’Informazione
                           Università degli Studi di Milano
                             pierangela.samarati@unimi.it




                            ESTEL Conference presentation
                            Rome, Italy - December 21, 2011


c Pierangela Samarati                                              1/14
The modern Information Society

 • Computers, mobile smart devices, and space technology are at
   the basis of the modern Information Society for enhancing the
   quality of life
 • Space technology in ICT:
         ◦ provide communications
         ◦ provide broadcast services
         ◦ deliver services (e.g., e-learning, e-health, e-commerce) to remote
           regions
         ◦ observe the Earth (e.g., environmental monitoring, urban planning,
           disaster management)
         ◦ provide time and space localization (GPS)
         ◦ study near-Earth space and explore the solar system and the
           distant universe
         ◦ ...
c Pierangela Samarati                                                        2/14
Security in Aerospace Systems
Aerospace security

 • Guaranteeing security requires protecting the aerospace
   infrastructure (satellites, planes, ground stations),
   communications, and applications, to ensure:

         ◦ integrity of data and resources

         ◦ confidentiality of information (privacy)

         ◦ availability (no denial of services)




c Pierangela Samarati                                        4/14
Security techniques

 • Some protection can be achieved by applying classical
   techniques, e.g.:

         ◦ authentication of users and devices

         ◦ access control

         ◦ firewalls

         ◦ antiviruses and intrusion detection systems

         ◦ encryption for protecting data in storage and communications

 • In emerging scenarios there are new challenges, e.g.:

         ◦ integrity and privacy in data management

         ◦ privacy in location-based applications
c Pierangela Samarati                                                     5/14
Integrity and Privacy in Data Management
Integrity and privacy in data management

 • The evolution of technologies for data management applies also
   to satellite and aerospatial data stored and processed at base
   stations

 • Outsourcing data and services to external servers can provide

        + significant cost savings and service benefits

        + higher availability and more effective disaster protection than
          in-house operations
     =⇒ natural evolution to move to the cloud environment

 • In addition to classical challenges, a major problem is:
        − data are not under the data owner’s control


c Pierangela Samarati                                                       7/14
Privacy in outsourced and cloud environment

 • Some data can be sensitive and cannot be known by parties
   different than the owner (honest-but-curious servers)
     =⇒ need to identify what information is sensitive and protect it
        from the eyes of the storing and processing servers

         ◦ store and process data in encrypted form
                − manage encrypted data, indexing for query execution, access control
                  enforcement, protect confidentiality of accesses

         ◦ break sensitive associations by storing data in the form of non
           linkable fragments
                − e.g., association between an image taken by a satellite and the
                  corresponding location data




c Pierangela Samarati                                                               8/14
Integrity in outsourced and cloud environment

 • External lazy/malicious servers can misbehave
     =⇒ data in storage can be compromised (e.g., altered data,
        missed updates)

         ◦ digital signatures

         ◦ authenticated data structures

     =⇒ queries might be not performed properly returning an
        incorrect or incomplete result

         ◦ authenticated data structures (e.g., Merkle tree)

         ◦ probabilistic approaches (e.g., data replications, marker tuples)




c Pierangela Samarati                                                          9/14
Privacy in Location-based Applications
Location-based services in the Information Society

  • Location-based services are becoming part of our daily life

          ◦ positioning of objects and persons (e.g., car navigation via a GPS
            device)
          ◦ searching for information on objects or services on a map (e.g.,
            locating a specific supermarket)
          ◦ tagging resources with geographic information (e.g., geo-tags in
            Twitter)

      =⇒ may raise privacy concerns




c Pierangela Samarati                                                          11/14
Privacy issues in location services

  • GPS tracking devices may be used for safety and security reasons
    and for monitoring users’ activities

              used to allow parents to keep track of their children’s whereabouts
              used for monitoring aging parents with Alzheimer’s disease
         !    used for physical surveillance for gathering information needed for
              investigations
         !    used by car rental companies for tracking their cars and charging
              drivers in case of agreement infringements
         !    used by employers for tracking the vehicles driven by their
              employees
        −     exploited by marketing companies for providing location-based
              advertisements


c Pierangela Samarati                                                          12/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)


               protect the location of users (location privacy)
               =⇒ obfuscate the area so to
                   decrease its precision or
                   confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence


               protect the location path of users (trajectory privacy)

               =⇒ block tracking by mixing
                  trajectories
c Pierangela Samarati                                                    13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Privacy in location-based applications

   • Different aspects:
           ◦ protect the identity of users
             located in specific positions
             (identity privacy)
             =⇒ enlarge the area to include
                 at least other k-1 users
                 (k-anonymity)
           ◦ protect the location of users
             (location privacy)
             =⇒ obfuscate the area so to
                 decrease its precision or
                 confidence
           ◦ protect the location path of
             users (trajectory privacy)
             =⇒ block tracking by mixing
                 trajectories
c Pierangela Samarati                                     13/14
Conclusions

  • Space technology in ICT:

         + enable new services and applications enhancing the quality of life

         + promote social and economic development

          ◦ require addressing security and privacy issues to ensure
            correctness of applications and social acceptability




c Pierangela Samarati                                                       14/14

Contenu connexe

Similaire à Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati

IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
maitreya presentation.pdf
maitreya presentation.pdfmaitreya presentation.pdf
maitreya presentation.pdfRajJoshi19466
 
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...AugmentedWorldExpo
 
Conceptual framework for geospatial data security
Conceptual framework for geospatial data securityConceptual framework for geospatial data security
Conceptual framework for geospatial data securityijdms
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environmentpaperpublications3
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
Securing tenure in rangelands: How has it been achieved and benefits
Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits
Securing tenure in rangelands: How has it been achieved and benefits ILRI
 

Similaire à Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati (12)

IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
maitreya presentation.pdf
maitreya presentation.pdfmaitreya presentation.pdf
maitreya presentation.pdf
 
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
Christina Padron (Design Interactive, Inc.): Human Factors Approach to AR Nav...
 
Conceptual framework for geospatial data security
Conceptual framework for geospatial data securityConceptual framework for geospatial data security
Conceptual framework for geospatial data security
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar18 Dec 2013 - CDE enduring challenge competition webinar
18 Dec 2013 - CDE enduring challenge competition webinar
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Securing tenure in rangelands: How has it been achieved and benefits
Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits Securing  tenure  in  rangelands:  How  has  it  been   achieved  and  benefits
Securing tenure in rangelands: How has it been achieved and benefits
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Security and Privacy in Emerging Aerospace Scenarios - Pierangela Samarati

  • 1. Security and Privacy in Emerging Aerospace Scenarios Pierangela Samarati Dipartimento di Tecnologie dell’Informazione Università degli Studi di Milano pierangela.samarati@unimi.it ESTEL Conference presentation Rome, Italy - December 21, 2011 c Pierangela Samarati 1/14
  • 2. The modern Information Society • Computers, mobile smart devices, and space technology are at the basis of the modern Information Society for enhancing the quality of life • Space technology in ICT: ◦ provide communications ◦ provide broadcast services ◦ deliver services (e.g., e-learning, e-health, e-commerce) to remote regions ◦ observe the Earth (e.g., environmental monitoring, urban planning, disaster management) ◦ provide time and space localization (GPS) ◦ study near-Earth space and explore the solar system and the distant universe ◦ ... c Pierangela Samarati 2/14
  • 4. Aerospace security • Guaranteeing security requires protecting the aerospace infrastructure (satellites, planes, ground stations), communications, and applications, to ensure: ◦ integrity of data and resources ◦ confidentiality of information (privacy) ◦ availability (no denial of services) c Pierangela Samarati 4/14
  • 5. Security techniques • Some protection can be achieved by applying classical techniques, e.g.: ◦ authentication of users and devices ◦ access control ◦ firewalls ◦ antiviruses and intrusion detection systems ◦ encryption for protecting data in storage and communications • In emerging scenarios there are new challenges, e.g.: ◦ integrity and privacy in data management ◦ privacy in location-based applications c Pierangela Samarati 5/14
  • 6. Integrity and Privacy in Data Management
  • 7. Integrity and privacy in data management • The evolution of technologies for data management applies also to satellite and aerospatial data stored and processed at base stations • Outsourcing data and services to external servers can provide + significant cost savings and service benefits + higher availability and more effective disaster protection than in-house operations =⇒ natural evolution to move to the cloud environment • In addition to classical challenges, a major problem is: − data are not under the data owner’s control c Pierangela Samarati 7/14
  • 8. Privacy in outsourced and cloud environment • Some data can be sensitive and cannot be known by parties different than the owner (honest-but-curious servers) =⇒ need to identify what information is sensitive and protect it from the eyes of the storing and processing servers ◦ store and process data in encrypted form − manage encrypted data, indexing for query execution, access control enforcement, protect confidentiality of accesses ◦ break sensitive associations by storing data in the form of non linkable fragments − e.g., association between an image taken by a satellite and the corresponding location data c Pierangela Samarati 8/14
  • 9. Integrity in outsourced and cloud environment • External lazy/malicious servers can misbehave =⇒ data in storage can be compromised (e.g., altered data, missed updates) ◦ digital signatures ◦ authenticated data structures =⇒ queries might be not performed properly returning an incorrect or incomplete result ◦ authenticated data structures (e.g., Merkle tree) ◦ probabilistic approaches (e.g., data replications, marker tuples) c Pierangela Samarati 9/14
  • 11. Location-based services in the Information Society • Location-based services are becoming part of our daily life ◦ positioning of objects and persons (e.g., car navigation via a GPS device) ◦ searching for information on objects or services on a map (e.g., locating a specific supermarket) ◦ tagging resources with geographic information (e.g., geo-tags in Twitter) =⇒ may raise privacy concerns c Pierangela Samarati 11/14
  • 12. Privacy issues in location services • GPS tracking devices may be used for safety and security reasons and for monitoring users’ activities used to allow parents to keep track of their children’s whereabouts used for monitoring aging parents with Alzheimer’s disease ! used for physical surveillance for gathering information needed for investigations ! used by car rental companies for tracking their cars and charging drivers in case of agreement infringements ! used by employers for tracking the vehicles driven by their employees − exploited by marketing companies for providing location-based advertisements c Pierangela Samarati 12/14
  • 13. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 14. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 15. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 16. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 17. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 18. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 19. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 20. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 21. Privacy in location-based applications • Different aspects: ◦ protect the identity of users located in specific positions (identity privacy) =⇒ enlarge the area to include at least other k-1 users (k-anonymity) ◦ protect the location of users (location privacy) =⇒ obfuscate the area so to decrease its precision or confidence ◦ protect the location path of users (trajectory privacy) =⇒ block tracking by mixing trajectories c Pierangela Samarati 13/14
  • 22. Conclusions • Space technology in ICT: + enable new services and applications enhancing the quality of life + promote social and economic development ◦ require addressing security and privacy issues to ensure correctness of applications and social acceptability c Pierangela Samarati 14/14