14
Impact on Emerging Technologies Privacy in Computing

Privacy in Computing - Impact on emerging technologies

Embed Size (px)

Citation preview

Page 1: Privacy in Computing - Impact on emerging technologies

Impact on Emerging

Technologies

Privacy in Computing

Page 2: Privacy in Computing - Impact on emerging technologies

Contents

• Radio Frequency Identification (RFID) – Object for tracking people

• Electronic Voting – Technologies to facilitate elections

• Voice over Internet Protocols – Voice Grade telephone calls

Our main concern with the privacy in computing, has affect the emerging technologies

will consider 3 technologies.

These are:

Page 3: Privacy in Computing - Impact on emerging technologies

Radio Frequency

Identification

Privacy in Computing

Page 4: Privacy in Computing - Impact on emerging technologies

What it is and what it does

• Radio frequency identification or RFID is a technology that uses small, low-power wireless radio transmitters called RFID tags.

• Tags are tuned to a particular frequency and each has a unique ID number.

• When a tag receives its signal, it sends its ID number signal in response.

• Most of these devices are passive until they receive a signal from an interrogating reader.

• The distance at which they can receive and broadcast a receivable signal varies from roughly five centimeters at the least powerful end to several meters at the most powerful end.

Page 5: Privacy in Computing - Impact on emerging technologies

Uses

• toll plaza payments

• transit system fare cards

• stock or inventory labels

• passports and identity cards

Current uses of RFID tags include

Page 6: Privacy in Computing - Impact on emerging technologies

Applications of RFID

• Consumer products

• shirt, shoes, pen, wallet, credit card, mobile phone, media player, and candy bar wrapper

• RFID Tags for Individuals

Page 7: Privacy in Computing - Impact on emerging technologies

Security and Privacy

• the ability to track individuals wherever they go

• the ability to discern sensitive data about people.

• The correctness of the data obtained.

• The reading sensor may malfunction or the software processing IDs may

fail.

• Forgery of an RFID tag.

Page 8: Privacy in Computing - Impact on emerging technologies

Electronic Voting

Privacy in Computing

Page 9: Privacy in Computing - Impact on emerging technologies

Computer Voting

• Each voter's choices must be kept secret.

• Each voter may vote only once and only for allowed offices.

• The voting system must be tamperproof, and the election officials must be prevented from allowing it to be tampered with.

• All votes must be reported accurately.

• The voting system must be available for use throughout the election period.

• An audit trail must be kept to detect irregularities in voting, but without disclosing how any individual voted.

Properties essential to a fair election were enumerated as:

Page 10: Privacy in Computing - Impact on emerging technologies

Privacy and the Process

• Counting ballots,

• building and maintaining the list of eligible voters,

• recording who has voted,

• supporting absentee ballots,

• assisting voters at the wrong polling place, and

• transmitting election results to election headquarters.

The Computer Science and Telecommunications Board of the National Academy of Science:

• individual privacy in voter registration, the privacy of individual voters, and public confidence in the process.

Page 11: Privacy in Computing - Impact on emerging technologies

VoIP and Skype

Privacy in Computing

Page 12: Privacy in Computing - Impact on emerging technologies

What it is and how it works

• Voice over IP (VoIP) is a protocol for transmission of voice-grade

telephone traffic over the Internet.

• The major VoIP carrier is Skype.

• To call from Chennai to Accra, for example, you would invoke the VoIP

application, giving it the telephone number in Accra. A local office in Accra

would call the number in Accra and patch that call to its Internet servers.

(The process is even easier if both endpoints use VoIP.)

Page 13: Privacy in Computing - Impact on emerging technologies

Merit and Privacy

• cost

• the phone call will be somewhat exposed through packet headers.

Page 14: Privacy in Computing - Impact on emerging technologies

Thank You