Report from ACM EuroSys MPM2012 workshop

Measurement, Privacy, and Mobility (MPM 2012)

Keynote from Steve Uhlig on content delivery platforms, agile network measurement, and understanding the can ecosystem, the adaptation to change in demand is slow today, so it will be better to use virtualisation technologies to manage the demand shifts. There is growing infrastructure and storage diversity which allows for universal content delivery, so virtualisation can enable mobility and agile services.
dswiss. Secure safe
Attackers have a variety of methods for accessing the data, password solutions are not enough. It is possible to scan the whole ipv4 address space in a day. Trust on cloud providers is based on social prestige. They use secure remote password (srp) in order to avoid MITM attacks on passwords even on insecure channels. In addition to that, a number of key chains and symmetric and asymmetric keys are used to enable document sharing, however if the user forgets their password AND their recovery code, the data is deleted. Encourages providers to prevent employee access to data.

David Evans, malfunction analysis and privacy attacks
Sensors in buildings have privacy implications since they are not protected. Classifying data using tags, enable reflection of physical environment and do reasoning on privacy implications of sensing in the physical world. Tags can be based on sensor, location and time. This allows for analysis of sensitivity of data in different context and using different data sources in conjunction with one another.

Miguel Nunez, Markova based location mobile prediction
Predicting trajectories is important for services such as content delivery, tourist information, weather reports etc. this has been done using raw trajectories or clustering of trajectories using semantic mapping. Using Markova models allows probabilistic prediction of sequence of states, using density joint clusters. They used microsoft geolife data set and their own data set to train and test the n-MMC which gives them about 70-80% accuracy especially for higher number of user POIs.
ANOSIP: Anonymizing the SIP Protocol
Iraklis Leontiadis (Institute Eurecom)
SIP Used often for phone conferencing, with text based call flow messages. The aim of the work is to protect the ID of user from the call portals or man in the middle attacks. Use a number of techniques to achieve this.

Online Privacy: From Users to Markets to Deployment
Dr Vijay Erramilli (Telefónica I+D Research, Spain)
Economic model of web: free service for personal data, so advertising and economy is the main driver. They want to understand monetization aspect. Check paper on arxiv. They carried out questionnaire using browser plugin to ask users about value of their actions. Highly revisited data and sites yield high gains. Conducting economics and marketing solutions to understand the ecosystem more.

Confidential Carbon Commuting
Chris Elsmore, Anil Madhavapeddy, Ian Leslie, and Amir
Understanding employee commute is important, however it is hard to collect the data. University used an app to collect user data. Personal container is used for data aggregation. It allows sensitive questions to be asked about employee habits. Check
The Impact of Trace and Adversary Models on Location Privacy Provided by K-anonymity
Volkan Cambazoglu and Christian Rohner (Uppsala University)
Used trace generation on different walk models for simulating locations. Used k-anonymity for identity protection and obfuscation for time of event hiding.

An Empirical Study on IMDb and its Communities Based on the Network of Co-Reviewers , Maryam Fatemi and Laurissa Tokarchuk
Interaction between people and content on social networks is important. There are a number of recommendation systems available but they suffer from shortcomings. A number of methods are used for comparison of movie review communities on imdb. So must take into account genres and context.

Providing Secure and Accountable Privacy to Roaming 802.11 Mobile Devices , Panagiotis Georgopoulos, Ben McCarthy, and Christopher Edwards
Mobile devices require connectivity and security. Differences in protocols and accesses point configs effect user mobility. An eduroam equivalent can work. Use CUI RFC4372. The idea is that request is anonymous access network, but relays alias to home network for authentication. Real ipv6 deployment test is done in lancaster.

When Browsing Leaves Footprints – Automatically Detect Privacy Violations
Hans Hofinger, Alexander Kiening, and Peter Schoo (Fraunhofer Research Institution for Applied and Integrated Security AISEC)
Introduced prividor, privacy violation detector via browser add-on. There are a large number of web techniques for user tracking such as cookies and scripts. A database is used for keeping track of bad sites, in addition to code checking. A centralised version is chosen for better management.