SlideShare a Scribd company logo
1 of 25
Download to read offline
Home is Safer than the Cloud!
Privacy Concerns for Consumer Cloud Storage
Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
Cloud Storage

Wednesday 4 December 13

SOUPS 2011

2
“Dropbox may sell […] your Personal
Information, in connection with a
merger, acquisition, reorganization or
“GOOGLE […] SHALL NOT BEto pre-screen, review, flag, filter, modify, […] any Content”
“Google reserves the right […] LIABLE TO YOU FORsale of assets or OR DAMAGE”
[…] ANY LOSS in the event of
bankruptcy.”
Third-Party

Cloud Storage

(Foreign)
Governments

Legal Courts
Law
Enforcement

Storage
Provider
Hacker

Internet
Service
Provider
Friend
Data Owner
Wednesday 4 December 13

SOUPS 2011

3
Cloud Storage
Third-Party
(Foreign)
Governments

Legal Courts
Law
Enforcement

Storage
Provider
Hacker

Internet
Service
Provider
Friend
Data Owner
Wednesday 4 December 13

SOUPS 2011

4
Related Work
§  Enterprise studies: security and privacy are top concerns
in cloud adoption [1]
§  No study looked into end-users’ practices and concerns
§  Most previous privacy studies focused on US
§  Known issue: users don’t read the privacy policies

[1] E. Schindler. Cloud development survey. Evans Data Corporation, Strategic Reports, July 2010.
http://www.evansdata.com/reports/viewRelease.php?reportID=27.
Wednesday 4 December 13

SOUPS 2011

5
Our Contributions
§  Conducted interviews in India and Switzerland and an
online survey
§  Showed that:
§  Users trust local storage more than the cloud
§  Users assume higher protection than actual
§  Cultural differences influence cloud privacy attitudes

Wednesday 4 December 13

SOUPS 2011

6
Cultural Differences
Switzerland

India

§  Individualistic vs. collectivist society
§  Right to privacy guaranteed/not guaranteed by
constitution
§  People accept that power is distributed equally/unequally
Wednesday 4 December 13

SOUPS 2011

7
Agenda
§  Study setup/ Methodology
§  Interview studies
§  Online questionnaires
§  Results
§  Current practices
§  Perceived privacy
§  Terms of service
§  Conclusions
Wednesday 4 December 13

SOUPS 2011

8
Methodology
II. ONLINE SURVEY

I. INTERVIEWS
1. Current practices

Multiple choice
2. Privacy perceptions

Mann-Whittney test

Likert scale

3. Rights & guarantees

Fisher’s exact test

Zurich

Delhi

Swiss

Indians

All

16

20

132

190

402

Interviews

Wednesday 4 December 13

Interviews

Online Survey

SOUPS 2011

9
Results
§  Current practices
§  Perceived privacy
§  Awareness of terms and conditions

Wednesday 4 December 13

SOUPS 2011

10
Current Practices
§  The cloud is my folder
§  Email accounts are subfolders: private, official, spam
§  With further folders…

Wednesday 4 December 13

SOUPS 2011

11
Survey: Data Storage and Internet Attitudes

G,A0,6=1C,#/<#G1A807-16=5#

I people put such privateassensitive Internet document I store and instead
not no their thing
There keep local backupsdata on thedocuments on service or on the Internet.
consumer protection gets hacked, it is on own
Iftry to isto store important,of every important and itthe Internet,policetheirthe
keep They should on my personal felt that
Internet whom I know that to, if Icomputers.safe on the Internet.
fault. them offline,could turn nothing is reallymy rights were violated.
)!"#

!"#$%&'()*+*(!+,#*-%(*./(0.+%#.%+(12+"/%3(

(!"#
'!"#
&!"#
%!"#
$!"#
!"#

*#+,,-#./01.#
210+3-#
B=A/6C.D#ECA,,#
Wednesday 4 December 13

4/#5,65789,#
/6.76,#

B/@,;>1=#ECA,,#

:;6#<13.=#7<#
>10+,?#

B/@,;>1=#F751CA,,#
SOUPS 2011

4/#0/653@,A#
-A/=,08/6#
B=A/6C.D#F751CA,,#
12
Perceived Privacy
§  “Nothing on the Internet is safe”
§  Anybody can see my data if they want to:
§  Hackers
§  Employees
§  Governments
§  But I am not interesting to them
§  “I am not criminal”
§  “I am not Obama”

Wednesday 4 December 13

SOUPS 2011

13
§  On my computer:
§  I look after my
computer
myself
§  I can go offline

§  In the cloud:
§  My computer
might crash

Wednesday 4 December 13

Percentage of participants

Survey: My data is safer…
80%
60%
40%
20%
0%
On my computer

In the cloud

Swiss

SOUPS 2011

Indians

14
Users would pay for better privacy in the cloud
“Dropbox may sell, transfer or otherwise share some or all of its assets,
including your Personal Information, in connection with a merger,
acquisition, reorganization or sale of assets or in the event of bankruptcy.”

Wednesday 4 December 13

SOUPS 2011

15
Results
§  Current practices
§  Perceived privacy
§  Terms and conditions

Wednesday 4 December 13

SOUPS 2011

16
Results
§  Privacy concerns for users differ from those of companies
§  Users are less concerned with:
§  Country of storage
§  Storage outsourcing
§  Guaranteed deletion of data
§  Users have misconceptions about the cloud architecture
§  The cloud/Internet is everywhere
§  “Why would they keep a backup?”

Wednesday 4 December 13

SOUPS 2011

17
Survey: Does your webmail provider have the
right to disable your account?
Yes, at anybut only I am advanced notice and awithout explanation.
Yes, time, without using itNo. notice and valid reason.
Only if with advanced criminal purposes.
for

Percentage of participants

50%
40%
30%
20%
10%
0%

Wednesday 4 December 13

Yes

Only with
advanced
notice &
reason

Only if used
for criminal
purposes

SOUPS 2011

No

I don't know
Swiss

Indians
18
Survey: Does your webmail provider have the right to
see or modify your email attachments?
They have thethem, to to not modify them,any of anythese are my store.or
They have right but see and at nor because of onlydocuments.
Theycan seethe rightright to look modifymodify the documents I
don't have the see and modify my documents my in criminal
terrorists cases. they belong to me, even if I store them there.
documents and

Percentage of participants

50%
40%
30%
20%
10%
0%

Wednesday 4 December 13

No

Can see, but
not modify

Only in
criminal
cases
SOUPS 2011

Yes
Swiss

I don't know
Indians
19
Survey: If your webmail provider lost some of your
data, what would your rights be?
If haveano rights even if I wouldn't care regardless whether it would have
I it data is lost anyway. is damages, about There An no was would
My is free pay me have a paid-for service.money. are apology a paid
They shouldservice, Iforitthe no rights, but if I paid for it, they guarantees.
to enough. the damages.
be or me for
forpayfree service. We had a contract.
Percentage of participants

50%
40%
30%
20%
10%
0%
Pay me for Pay me if not
damages a free service

Wednesday 4 December 13

I have no
rights
SOUPS 2011

Don't care
Swiss

I don't know
Indians
20
Survey: Internet Surveillance Attitudes
It is good if the government monitors every Internet communication
If the government had access to every document users store on theand
all user that would be a major violation of first.
Internet,accounts. National security comes individual privacy.

>:4?:0326:#5@#>24A?-B203.#

!"#$%&'$&()*+%#$,--.&/$)01(+2$34)*5,33)#36)7&2,.&3)

*!"#
)!"#
(!"#
'!"#
&!"#
%!"#
$!"#
!"#

+,-..#

/01-20.#

+,-..#

C5DE#2??:..#35#B4-D23:#15?.#-.#F21E#
+3450678#964::#
Wednesday 4 December 13

+5;:,<23#964::#

/03:40:3#;50-354-06#-.#6551E#

+5;:,<23#=-.264::#
SOUPS 2011

/01-20.#
+3450678#=-.264::#
21
Conclusions
§  Users trust local storage more than the cloud
§  Users assume to have more rights than stated in the
agreement
§  Cultural differences influence privacy and attitudes and
behavior

Wednesday 4 December 13

SOUPS 2011

22
Recommendations
§ 
§ 
§ 
§ 

Provide stronger security mechanisms in the cloud
Improve presentation of privacy policies
Create consumer protection agencies for the cloud
Investigate awareness of international laws

Wednesday 4 December 13

SOUPS 2011

23
Thank you!

Wednesday 4 December 13

SOUPS 2011

24
For any further information, please write to
pk@iiitd.ac.in
precog.iiitd.edu.in

Wednesday 4 December 13

SOUPS 2011

25

More Related Content

What's hot

Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
The Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesThe Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesEMC
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board CommunicationsOnBoard
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_riskDoug Copley
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI processDan Michaluk
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 

What's hot (20)

Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
The Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for DummiesThe Technologist’s Guide to eDiscovery Law for Dummies
The Technologist’s Guide to eDiscovery Law for Dummies
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Threats
ThreatsThreats
Threats
 
5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications5 e Discovery Risks to Avoid in Board Communications
5 e Discovery Risks to Avoid in Board Communications
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk2015 Secureworld_effectively_managing_information_risk
2015 Secureworld_effectively_managing_information_risk
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
The ins and outs of the e-FOI process
The ins and outs of the e-FOI processThe ins and outs of the e-FOI process
The ins and outs of the e-FOI process
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 

Similar to Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docxevonnehoggarth79783
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetTracy Aldridge
 
Ensuring User Data Protection And Privacy
Ensuring User Data Protection And PrivacyEnsuring User Data Protection And Privacy
Ensuring User Data Protection And PrivacyMandy Hebert
 
Ethics In DW &amp; DM
Ethics In DW &amp; DMEthics In DW &amp; DM
Ethics In DW &amp; DMabethan
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdfAbel Mutize
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Unit 4 P3 Business
Unit 4 P3 BusinessUnit 4 P3 Business
Unit 4 P3 BusinessCyndi Ruppel
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
The Law When Two Companies Merge
The Law When Two Companies MergeThe Law When Two Companies Merge
The Law When Two Companies MergeSummer Young
 
Information Literacy Personal Statement
Information Literacy Personal StatementInformation Literacy Personal Statement
Information Literacy Personal StatementElizabeth Temburu
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 

Similar to Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage (20)

Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Data Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam LawData Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam Law
 
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
The Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The InternetThe Debatable Issue Of Information Privacy On The Internet
The Debatable Issue Of Information Privacy On The Internet
 
Ensuring User Data Protection And Privacy
Ensuring User Data Protection And PrivacyEnsuring User Data Protection And Privacy
Ensuring User Data Protection And Privacy
 
Ethics In DW &amp; DM
Ethics In DW &amp; DMEthics In DW &amp; DM
Ethics In DW &amp; DM
 
pp_101_notes_eng.pdf
pp_101_notes_eng.pdfpp_101_notes_eng.pdf
pp_101_notes_eng.pdf
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Unit 4 P3 Business
Unit 4 P3 BusinessUnit 4 P3 Business
Unit 4 P3 Business
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
The Law When Two Companies Merge
The Law When Two Companies MergeThe Law When Two Companies Merge
The Law When Two Companies Merge
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Information Literacy Personal Statement
Information Literacy Personal StatementInformation Literacy Personal Statement
Information Literacy Personal Statement
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 

Recently uploaded (20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 

Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

  • 1. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
  • 2. Cloud Storage Wednesday 4 December 13 SOUPS 2011 2
  • 3. “Dropbox may sell […] your Personal Information, in connection with a merger, acquisition, reorganization or “GOOGLE […] SHALL NOT BEto pre-screen, review, flag, filter, modify, […] any Content” “Google reserves the right […] LIABLE TO YOU FORsale of assets or OR DAMAGE” […] ANY LOSS in the event of bankruptcy.” Third-Party Cloud Storage (Foreign) Governments Legal Courts Law Enforcement Storage Provider Hacker Internet Service Provider Friend Data Owner Wednesday 4 December 13 SOUPS 2011 3
  • 5. Related Work §  Enterprise studies: security and privacy are top concerns in cloud adoption [1] §  No study looked into end-users’ practices and concerns §  Most previous privacy studies focused on US §  Known issue: users don’t read the privacy policies [1] E. Schindler. Cloud development survey. Evans Data Corporation, Strategic Reports, July 2010. http://www.evansdata.com/reports/viewRelease.php?reportID=27. Wednesday 4 December 13 SOUPS 2011 5
  • 6. Our Contributions §  Conducted interviews in India and Switzerland and an online survey §  Showed that: §  Users trust local storage more than the cloud §  Users assume higher protection than actual §  Cultural differences influence cloud privacy attitudes Wednesday 4 December 13 SOUPS 2011 6
  • 7. Cultural Differences Switzerland India §  Individualistic vs. collectivist society §  Right to privacy guaranteed/not guaranteed by constitution §  People accept that power is distributed equally/unequally Wednesday 4 December 13 SOUPS 2011 7
  • 8. Agenda §  Study setup/ Methodology §  Interview studies §  Online questionnaires §  Results §  Current practices §  Perceived privacy §  Terms of service §  Conclusions Wednesday 4 December 13 SOUPS 2011 8
  • 9. Methodology II. ONLINE SURVEY I. INTERVIEWS 1. Current practices Multiple choice 2. Privacy perceptions Mann-Whittney test Likert scale 3. Rights & guarantees Fisher’s exact test Zurich Delhi Swiss Indians All 16 20 132 190 402 Interviews Wednesday 4 December 13 Interviews Online Survey SOUPS 2011 9
  • 10. Results §  Current practices §  Perceived privacy §  Awareness of terms and conditions Wednesday 4 December 13 SOUPS 2011 10
  • 11. Current Practices §  The cloud is my folder §  Email accounts are subfolders: private, official, spam §  With further folders… Wednesday 4 December 13 SOUPS 2011 11
  • 12. Survey: Data Storage and Internet Attitudes G,A0,6=1C,#/<#G1A807-16=5# I people put such privateassensitive Internet document I store and instead not no their thing There keep local backupsdata on thedocuments on service or on the Internet. consumer protection gets hacked, it is on own Iftry to isto store important,of every important and itthe Internet,policetheirthe keep They should on my personal felt that Internet whom I know that to, if Icomputers.safe on the Internet. fault. them offline,could turn nothing is reallymy rights were violated. )!"# !"#$%&'()*+*(!+,#*-%(*./(0.+%#.%+(12+"/%3( (!"# '!"# &!"# %!"# $!"# !"# *#+,,-#./01.# 210+3-# B=A/6C.D#ECA,,# Wednesday 4 December 13 4/#5,65789,# /6.76,# B/@,;>1=#ECA,,# :;6#<13.=#7<# >10+,?# B/@,;>1=#F751CA,,# SOUPS 2011 4/#0/653@,A# -A/=,08/6# B=A/6C.D#F751CA,,# 12
  • 13. Perceived Privacy §  “Nothing on the Internet is safe” §  Anybody can see my data if they want to: §  Hackers §  Employees §  Governments §  But I am not interesting to them §  “I am not criminal” §  “I am not Obama” Wednesday 4 December 13 SOUPS 2011 13
  • 14. §  On my computer: §  I look after my computer myself §  I can go offline §  In the cloud: §  My computer might crash Wednesday 4 December 13 Percentage of participants Survey: My data is safer… 80% 60% 40% 20% 0% On my computer In the cloud Swiss SOUPS 2011 Indians 14
  • 15. Users would pay for better privacy in the cloud “Dropbox may sell, transfer or otherwise share some or all of its assets, including your Personal Information, in connection with a merger, acquisition, reorganization or sale of assets or in the event of bankruptcy.” Wednesday 4 December 13 SOUPS 2011 15
  • 16. Results §  Current practices §  Perceived privacy §  Terms and conditions Wednesday 4 December 13 SOUPS 2011 16
  • 17. Results §  Privacy concerns for users differ from those of companies §  Users are less concerned with: §  Country of storage §  Storage outsourcing §  Guaranteed deletion of data §  Users have misconceptions about the cloud architecture §  The cloud/Internet is everywhere §  “Why would they keep a backup?” Wednesday 4 December 13 SOUPS 2011 17
  • 18. Survey: Does your webmail provider have the right to disable your account? Yes, at anybut only I am advanced notice and awithout explanation. Yes, time, without using itNo. notice and valid reason. Only if with advanced criminal purposes. for Percentage of participants 50% 40% 30% 20% 10% 0% Wednesday 4 December 13 Yes Only with advanced notice & reason Only if used for criminal purposes SOUPS 2011 No I don't know Swiss Indians 18
  • 19. Survey: Does your webmail provider have the right to see or modify your email attachments? They have thethem, to to not modify them,any of anythese are my store.or They have right but see and at nor because of onlydocuments. Theycan seethe rightright to look modifymodify the documents I don't have the see and modify my documents my in criminal terrorists cases. they belong to me, even if I store them there. documents and Percentage of participants 50% 40% 30% 20% 10% 0% Wednesday 4 December 13 No Can see, but not modify Only in criminal cases SOUPS 2011 Yes Swiss I don't know Indians 19
  • 20. Survey: If your webmail provider lost some of your data, what would your rights be? If haveano rights even if I wouldn't care regardless whether it would have I it data is lost anyway. is damages, about There An no was would My is free pay me have a paid-for service.money. are apology a paid They shouldservice, Iforitthe no rights, but if I paid for it, they guarantees. to enough. the damages. be or me for forpayfree service. We had a contract. Percentage of participants 50% 40% 30% 20% 10% 0% Pay me for Pay me if not damages a free service Wednesday 4 December 13 I have no rights SOUPS 2011 Don't care Swiss I don't know Indians 20
  • 21. Survey: Internet Surveillance Attitudes It is good if the government monitors every Internet communication If the government had access to every document users store on theand all user that would be a major violation of first. Internet,accounts. National security comes individual privacy. >:4?:0326:#5@#>24A?-B203.# !"#$%&'$&()*+%#$,--.&/$)01(+2$34)*5,33)#36)7&2,.&3) *!"# )!"# (!"# '!"# &!"# %!"# $!"# !"# +,-..# /01-20.# +,-..# C5DE#2??:..#35#B4-D23:#15?.#-.#F21E# +3450678#964::# Wednesday 4 December 13 +5;:,<23#964::# /03:40:3#;50-354-06#-.#6551E# +5;:,<23#=-.264::# SOUPS 2011 /01-20.# +3450678#=-.264::# 21
  • 22. Conclusions §  Users trust local storage more than the cloud §  Users assume to have more rights than stated in the agreement §  Cultural differences influence privacy and attitudes and behavior Wednesday 4 December 13 SOUPS 2011 22
  • 23. Recommendations §  §  §  §  Provide stronger security mechanisms in the cloud Improve presentation of privacy policies Create consumer protection agencies for the cloud Investigate awareness of international laws Wednesday 4 December 13 SOUPS 2011 23
  • 24. Thank you! Wednesday 4 December 13 SOUPS 2011 24
  • 25. For any further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in Wednesday 4 December 13 SOUPS 2011 25