exploring visualization techniques to enhance privacy control ux for user-managed access

21
Exploring Visualization Techniques to Enhance Privacy Control UX for User- Managed Access Newcastle University Domenico Catalano, Maciej Wolniak and the Smart Team 1 V.3 21st July, 2011

Upload: domenico-catalano

Post on 08-May-2015

2.218 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Exploring Visualization Techniques to Enhance Privacy Control UX for User-

Managed Access

Newcastle University

Domenico Catalano, Maciej Wolniakand the Smart Team

1 V.321st July, 2011

Page 2: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Agenda

• Data sharing and online privacy

• SmartAM Information Ecology

• Enhance privacy control

‣ UMA Connection

‣ UMA Control bridge

• Future works

• User Experience

2

Page 3: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Data sharing

3

Biographical

Biological

Genealogical

Historical

Locational

Computational

Vocational

Reputational

Transactional

Relational

Online Privacy is about sharing

Page 4: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

The Paradigm User Data sharing and online Privacy

4

Page 5: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

SmartAM Information Ecology

5

Context

Content User

Page 6: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

SmartAM Information Ecology

• UMA/SmartAM Context

‣ Provide an advance system to allow internet user to protect and share online information

‣ Prevent of lost of user privacy

‣ Adhere to the international privacy regulations

‣ Secure online information (access control)

6

Context

Content User

Page 7: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

SmartAM Information Ecology

• UMA/SmartAM Content

‣ Authorizing User information

‣ Authorizing User’s Web resource info

‣ Authorization Policies

‣ Requesting Parties Information

‣ Analytics information (who, when, what)

7

Context

Content User

Page 8: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

SmartAM Information Ecology

• UMA/SmartAM User

‣ Internet User/Social networking user

‣ Company

‣ Developer

‣ Government

‣ Curios!!

8

Context

Content User

Page 9: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

9

SmartAM UX

Page 10: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

SmartAM states system

10

Subject

Host

AMHomepage

Resource

UserLogin

DevLearnMore

Protect &Share

User Welcome

Page

ViewResource

Setting Policy

ControlBridge

ResourceShared

smartam UX StudyPossible actions and states of the system

Notregistered

User

Wiki

Requester

A1A3

A4

A5

ResourceRegistered

ConsentDefaultPolicy

Privacy

A6

A7

A9A10

Conceptual model

B1

B3

B2

B4B5

B6

B10

B7B8

B9

B11

A2

Host Site

APP

ClientPrivileged

App forMySelf

C1 C2 ConsentApp Actions

PolicyDefinition

UserSettings

Initial state

Initial state

Initial state

Authorizing Userinteraction

ManageContacts

Connection

A8

PossibleActions

VisibleThings

State of System

User intentionsvs

Required Actions

Page 11: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Understand the nature of data sharing policy in distributed environment

• UMA model centralizes the authorization policies for all the Authorizing User's distributed web resource (protected resource).

• The externalization of the policies introduces a new level of complexity because the user must (mentally) map the authorization structure for each resource, in more sophisticate one.

• This new layer must be able to abstracting the existent, although it must be able to enhance the control on the information that will be shared.

• Increasing of Protected resources and requesting parties could be mentally difficult for the user to maintain control in practice on the information.

11

Page 12: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Risks

• Lost of Privacy

• Exploit of online personal Information

• Security breach

12

Page 13: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Enhance Privacy Control through visualization

• As result a context authorization policy and a governor system is definitely desirable.

• We introduce two new design concepts:

• A visualization tool is necessary to facilitate the creation of the sharing policy and the control of the privacy.

13

UMA Connection

UMA ControlTMbridge

Page 14: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

UMA Connection• An UMA Connection defines a context of the data sharing policy.

‣ It’s a set of objects, including Contacts, authorized Apps and allowed actions on a specific resource.

‣ It can include access restrictions (i.e. period validity) and/or Trusted Claims request to restrict access based on subject’s information.

• An UMA Connection is fundamental to enhance user control for what purpose the information will be revealed.

• UMA Connection uses a visualization approach which helps user to define an appropriate context.

• An Authorizing User can create a Connection for him-self or for others.

• A Connection doesn’t incapsulate other connections.

14

Page 15: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Structure of UMA Connection

15

Page 16: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Visualizing UMA Connection

16

Resource

OthersConnection

University

Class

Prof

Contacts

SocialApps

UMA Connection

Page 17: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

UMA Control bridge

• UMA Control bridge

‣ Is designed to adhere to the user-centric identity paradigm.

‣ Provides a primary user interface for control Resources, Connections, Apps and requesters.

‣ Provides a dashboard with main statistic information about connection, shared data, etc.

‣ Incorporates a single view of these main controls, including a notification bar for new access request.

‣ Provides 3-steps actions to get access to specific view, excluding optional view.

17UMA ControlTM

bridge

Page 18: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Maintain control on Information that will be revealed

18

University

Personal Data

Self-Registration

Collab Professional

ClassProf

Business

Friend

ProjectA

MySelf

MySelf

Page 19: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Future works

• Graph Algorithm

• Super Connection (Basket of Resources)

• Visualization techniques (HTML5)

19

Page 20: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

User eXperience

20

Page 21: Exploring Visualization Techniques to Enhance Privacy Control UX for User-Managed Access

Thanks

21