1 / 50

RFID Privacy Issues and the ORCA System

r. 2. Steve Shafer, Microsoft Research. Working in ubiquitous computing a long timeWorking with RFID at MicrosoftMicrosoft RFID whitepaper on RFID PrivacyWas member of the CDT RFID Privacy Working GroupVice Chair of the Privacy Advisory Council of the NFC ForumPresented at UW in November 2006. r.

paprika
Download Presentation

RFID Privacy Issues and the ORCA System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. r 1 RFID Privacy Issues and the ORCA System Steve Shafer (stevensh@microsoft.com) Microsoft Research May 2007

    2. r 2 Steve Shafer, Microsoft Research Working in ubiquitous computing a long time Working with RFID at Microsoft Microsoft RFID whitepaper on RFID Privacy Was member of the CDT RFID Privacy Working Group Vice Chair of the Privacy Advisory Council of the NFC Forum Presented at UW in November 2006

    3. r 3 Today RFID privacy vocabulary & guidelines Privacy Survey: How ORCA measures up Note there are both RFID and non-RFID privacy issues in ORCA I am only qualified to address RFID issues

    4. r 4 Vocabulary – Personal Data Personal Data consists of Personal ID and Activity Records Personal ID is data that describes or gives access to a unique individual Subject An Activity Record associates a Pseudonym with data about activities, transactions, locations, things, or other people A Pseudonym is any unique data associated with a unique individual Subject Unique datum, or unique combination of non-unique data Unique value, or value drawn from a unique set of values

    5. r 5 Vocabulary – Privacy Violations Privacy Violations include Privacy Breaches and Tracking A Privacy Breach is a disclosure of Personal ID to an unauthorized party Tracking is a disclosure of Activity Records to an unauthorized party

    6. r 6 Vocabulary - Authorization In a Mandatory system, authorization is stipulated by the system operator In a Voluntary system, the User provides authorization through Informed Consent The User is the individual who presents a tag to the system Informed Consent includes Notice and Consent (as decribed in the guidelines)

    7. r 7 Vocabulary - Recap Personal Data Personal ID Privacy Breach Pseudonym & Activity Record Tracking Subject & User Authorized v. Unauthorized Mandatory Voluntary Informed Consent

    8. r 8 Guidelines – I – Principles The broadest relevant definition of Personal ID should be applied. How about index data? Non-actionable data? Personal ID should be Directional. Pseudonyms should be Directional … … but frequently they’re not.

    9. r 9 Guidelines – II – Informed Consent Informed Consent should be obtained before a User enrolls in the system. Notice should include the Personal Data, its purposes, retention & other policies, User actions. What about limitations on the “purposes”? Consent requires knowing, affirmative indication. Informed Consent should be obtained before any transaction or activity. Notice may be simply a logo. Consent may be simply the presentation of the tag.

    10. r 10 Guidelines – III – Security Personal Data should be made Directional both in storage and communication. Design security – Minimize Personal Data. Physical security – Keep the tag quiet electronically. Information security – Make the software smart.

    11. r 11 Guidelines – IV – Data Handling Personal Data should be handled nicely. Only use it for agreed-upon purposes. Have a policy for data expiration. Ensure integrity and quality of data. Provide Users with access to data about them. Provide Users with a complaint mechanism. Take responsibility when data is sent to third parties (details on next slide). Review policies and practices regularly.

    12. r 12 Guidelines – IVa – Onward Transfer 7f. Sending Personal Data to a third party: Tell the recipient what the data is authorized for. Take some steps to ensure the recipient uses the data only for authorized purposes. Take some steps to ensure the recipient abides by reasonable principles for data handling. If the User appeals your handling of the data, propagate that appeal to the recipient.

    13. r 13 Apply These Guidelines to ORCA Some noteworthy points: Transit users can elect to pay cash or use ORCA cards without creating an account Accounts are for replenishment or for institutions Institutional use may be Mandatory Personal ID is not on the card … but many Pseudonyms are there Should U-Pass # itself considered Personal ID? In fact, Personal Data is on the card, in the form of an Activity Record (“ride history” of your last 10 trips [for each agency])

    14. r 14 Apply These Guidelines to ORCA Some more noteworthy points: In theory, 14443 tags can be operated up to 10cm. But they can be skimmed at 20-50cm, eavesdropped at 10m, and detected at 20m. In ORCA, the Contract Administrator can authorize additional uses for the data!!! Cohabiting applications may access ORCA data if authorized by the Contract Admin.!! ORCA data is to be encrypted by a key. But where will the key live? One key per tag? Agency? User?

    15. r 15 Apply These Guidelines to ORCA Some more noteworthy points: ORCA requires card serial numbers. It also requires that they be linkable to Personal ID. (non-RFID) ORCA mandates Personal ID at central database Is this really required for the stated purposes, i.e. replenishment & linkage? (non-RFID) ORCA mandates history of at least the last 20 fare payments & transfers in database Is this really required for the stated purposes?

    16. r 16

    17. r 17 Stuff I Presented in November 2006 to the UW Law School by Steve Shafer, Microsoft Corp.

    18. r 18

    19. r 19 Worthwhile Web Links http://www.cephas-library.com/nwo/nwo_the_year_of_rfid_legislation.html http://www.retail-leaders.org/new/resources/RFID_Bill_Summaries_2005_08-31-05.pdf http://info.sen.ca.gov/pub/05-06/bill/sen/sb_0651-0700/sb_682_bill_20050815_amended_asm.html http://info.sen.ca.gov/pub/05-06/bill/sen/sb_0651-0700/sb_682_bill_20060807_amended_asm.html http://info.sen.ca.gov/pub/05-06/bill/sen/sb_0751-0800/sb_768_bill_20050902_amended_asm.html http://www.cr80news.com/news/2006/10/02/governor-schwarzenegger-vetoes-controversial-antirfid-legislation/ http://www.retail-leaders.org/new/rlGovAffairs.aspx?section=GOVEIS&id=5&cid=16 http://www.cdt.org/privacy/20060501rfid-best-practices.php

    20. r 20 Issues to Consider What is Privacy? What is RFID? What are the key initiatives of public interest? What are the privacy risks from RFID? What is happening with RFID privacy policy today? What are key issues for policymakers?

    21. r 21 What is Privacy? One definition: “Giving consumers control over the collection and use of personal data”

    22. r 22 The Privacy Community

    23. r 23 Key RFID Technology Variations

    24. r 24 Key Privacy-Sensitive Forms of RFID EPCglobal: ID number, 20-foot range For supply chain (pallets and cases) What if individual goods are labeled? RealID (state drivers licences) is similar to this NFC: Lots of data, security, 2-inch range Payment cards, cell phones Personal data can be involved e-Passport uses NFC, also credit card companies Active RFID: Idiosyncratic, 300-foot range Person-tracking by employers License plate tracking in UK

    25. r 25 What is Personal Data? Personal Identification Details about an individual person Primarily in ID documents / badges / cards Privacy violation is “Breach” Activity Records Accumulated based on pseudonym Primarily in consumer goods Privacy violation is “Tracking”

    26. r 26 PII = Personally Identifiable Information Primary category of data protected by “privacy” in US practice Many different definitions, here’s one: “any piece of information which can potentially be used to uniquely identify, contact, or locate a single person” Wikipedia says it includes name (if not common), govt. ID #, phone #, street address, email address, vehicle plate #, face / biometric, IP address (sometimes) Fairly loose and squishy definition Different sources have different definitions EU “Personal Identification” includes more

    27. r 27 RFID Privacy Breaches Leak of information through radio Collecting information not authorized Retaining information not authorized Using information in ways not authorized Sending information to third parties who are not authorized These apply to all IT systems, not just RFID

    28. r 28 RFID Radio Security Security is to protect data from access by unauthorized parties Types of attack: Not all systems have adequate security designed in

    29. r 29 Tracking Activity Records based on pseudonym Non-PII Data About Individual New technologies e.g. RFID, cell phone produce data about things in the world You may leave a “trail of breadcrumbs” Based on pseudonym, not personal ID But the object is yours! Actually “trail” ? “mountains” These data mountains are not considered PII

    30. r 30 “Helen Wears a Hat” Helen buys a hat at store A. The hat contains an RFID tag with a unique ID number. (Even if encrypted it is unique.) (The store might record purchase information about Helen, but we will assume they keep it private.) Helen keeps the RFID tag in the hat because she has a “smart closet”.

    31. r 31 “Helen Wears a Hat” – Chapter 2 Helen visits store B wearing her hat. Store B detects it at the door. Helen visits stores C, D, and E, and has lunch with her friend Suzie who has a new sweater.

    32. r 32 “Helen Wears a Hat” – Chapter 3 These stores all sell their data to marketer X, who assembles it and looks for patterns. This information is available to businesses, and is discoverable in legal proceedings. Helen’s name and personal data do not appear in the records. The usual “privacy policies” and regulations do not apply to this data!

    33. r 33 Privacy Breach + Tracking Privacy Breach and Tracking have interactions: Breach makes it possible to track Tracking + physical presence can lead to a breach More tracking makes it easier to mine to create a breach Tracking makes the consequences of a breach more serious

    34. r 34 Protecting Personal Data Who does what with your personal data? Sanctioned: User’s Understanding Authorized Use “Authorization Creep” “Third-Party Freedom” Miscreants: “Opportunistic” “Professional” “Conspiratorial” (= “Organized”) That Which Must Not Be Named

    35. r 35 Best Practice Guidelines Most experts agree that the primary basis for RFID Privacy policy should be Fair Information Practices Many variants e.g. “Safe Harbor” Notice, Choice, Consent, Security, … This addresses authorized users Not always honored by government Identity documents, license plates, etc. Unclear meaning, e.g. what is “consent”? Unclear decision-making process

    36. r 36 Privacy Policy for PII: Safe Harbor Notice Choice & Consent Onward Transfer Access Security Data Integrity & Quality Enforcement & Remedy Good reference: Privacy Best Practices for Deployment of RFID Technology, Center for Democracy and Technology, 2006. http://www.cdt.org/privacy/20060501rfid-best-practices.php

    37. r 37 Security Mechanisms Information Security Encryption, Authorization, Dynamic IDs, … Physical Security On/off switches, Foil covers, Short range, Multiple modalities, … Design Security Opt-in v. opt-out, Default settings, No PII on tags, …

    38. r 38 Resistance to Tracking Proposed “privacy” measures: Clipping (IBM): shorten antenna after purchase Killing (EPC): deactivate tag on command Erase the Serial Number: leave the SKU intact Blocker (RSA): device pretends to be every tag Dynamic ID is a new trend in the RFID literature: tag presents apparently random ID Cryptographic techniques for generating a sequence of ID numbers that cannot be inverted All of the above have major shortcomings!

    39. r 39 Where is the Action Today? Guidelines: Industry organizations, standards bodies, privacy advocates Center for Democracy and Technology State legislatures in the US CA, IL, WA, NH, AL, … EU, Japan, …

    40. r 40 Common Pitfalls in Proposed RFID Privacy Regulations & Laws Overbroad definition of “RFID” includes cell phones, laptops, etc. Example: “RFID means electronic devices that broadcast identification number by radio” Regulating technology without limiting data or its use RFID in 2006, what will it be in 2016? Ban on technology (reduces innovation) “No RFID until 2010”

    41. r 41 Policy Recommendations “Trustworthy Computing is Good Business” Get good technical guidance! Encourage technology development Regulate data and its use, not technology Foster responsible use Codify best practices based on FIP Don’t lock in current technologies Sensitive applications need careful planning

    42. r 42 Issues in RFID Privacy What is Privacy? What is RFID? What are the key initiatives of public interest? What are the privacy risks from RFID? What is happening with RFID privacy policy today? What are key issues for policymakers?

    43. r 43 Additional Material

    44. r 44 Solove’s Taxonomy of Privacy

    45. r 45 TRUSTe’s definition (excerpt) “any information … (i) that identifies or can be used to identify, contact, or locate … or (ii) from which identification or contact information of an individual person can be derived.” Includes: name, govt. ID numbers, phone + FAX numbers, street address, email address, financial profiles, medical profile, credit card info. Note financial / medical info is “especially sensitive information” Source: Jeffrey Klimas v. Comcast Corp, US …

    46. r 46 TRUSTe “Associated” Info “to the extent unique information … [not PII] is associated with PII … [it] will be considered [PII]” Includes personal profile, biometric, pseudonym, IP address IP address “becomes PII” only if “associated with” PII Excludes data collected “anonymously” (“without identification of the individual user”) So it seems to exclude Helen’s hat’s data records unless associated with PII This data is “pseudonymous”, not really “anonymous”

    47. r 47 Pseudonyms A pseudonym is any constant, unique datum Can be an almost-unique datum Can be a set of common data Can be an encrypted datum Can be a pseudo-random member of a unique set

    48. r 48 Privacy and Security

    49. r 49 Directionality in Identity Systems Omnidirectional = accessible to everyone Directional = only accessible to authorized parties Also called Unidirectional Enforced by security measures Authorization of both endpoints Encryption of data in storage and in communication

    50. r 50 Security Goals for RFID Privacy Personal ID should always be Directional Pseudonyms should always be Directional Personal ID: this is a no-brainer Pseudonyms: usually very difficult to implement!

    51. r 51 Problems With Tracking Resistance Proposed “privacy” measures: Clipping (IBM): shorten antenna after purchase Doesn’t change the information flow Killing (EPC): deactivate tag on command Prevents after-market use of tags Erase the Serial Number: leave the SKU intact Combinations of SKUs can create a unique identifier Blocker (RSA): device pretends to be every tag Denial of Service is a security violation Dynamic ID is a new trend in the RFID literature: tag presents apparently random ID Every reader has to know the secret for every tag

More Related