多媒体私隐及保安工作坊

Roger A. Hallman, K. Rohloff, Victor Chang
{"title":"多媒体私隐及保安工作坊","authors":"Roger A. Hallman, K. Rohloff, Victor Chang","doi":"10.1145/3133956.3137043","DOIUrl":null,"url":null,"abstract":"This workshop addresses the technical challenges arising from our current interconnected society. Multitudes of devices and people can be connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT). As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge. Multimedia in IoT services should provide a robust and resilient security platforms and solutions against any unauthorized access. Recent literature shows increased concerns about hacking, security breaches, data manipulation, social engineering, and new attack methods. Malware can be hidden within multimedia files and visiting infected websites can trigger its download to victims' machines. There are a multitude of techniques to steal personal information and other sensitive media for unauthorized dissemination; imposters/identity thefts are common in social networks. In order to demonstrate the effectiveness of resilient security and privacy solutions, methods such as new standards, advance cryptography, improved algorithms for intrusion detection, personalized privacy, and isolation of questionable or malicious files can be used independently or all together to minimize the threats. Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia (e.g., pictures, videos, data, analytics and personal information) can be created in a short period of time. When all these data are stored in a cloud environment, many people can connect to these services for viewing, sharing, commenting, and storing information. IoT represents a collection of devices, platforms, and software that allow people to store and share data in the cloud and also connects different types of clouds altogether. Hence, multimedia in the IoT serves a significant purpose as many people's updates, status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in near real time. IoT opens up many possibilities since more people can broadcast themselves and allow their networks to view and share in their lives. There are also increased fraudulent activities, cybercrimes, unauthorized access, malicious attacks, phishing, and impersonating/stealing identities. This presents challenges for existing areas such as access control, authentication, data leakage, permission, social engineering, denial of service, and identity management for the attackers to impose identity, steal information, and manipulate data in the IoT environment. Challenges also include new problems such as large scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware with multimedia, location-based privacy with high accuracy and anonymity, underground criminal networks, and hidden security breaches. Our workshopl, The 1st International Workshop on Multimedia Privacy and Security (MPS), as part of CCS 2017, focuses on these concerns, specific to the IoT ecosystem. We solicited submissions on new and innovative methods, techniques, and proofs of concepts supported by strong theory/algorithms and simulation/experiments to submit papers for this workshop. We accepted 5 submissions, and organized the workshop around talks for these publications with a keynote from Dr. Jeremy Epstein of the NSF and a panel discussion.","PeriodicalId":191367,"journal":{"name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Workshop on Multimedia Privacy and Security\",\"authors\":\"Roger A. Hallman, K. Rohloff, Victor Chang\",\"doi\":\"10.1145/3133956.3137043\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This workshop addresses the technical challenges arising from our current interconnected society. Multitudes of devices and people can be connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT). As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge. Multimedia in IoT services should provide a robust and resilient security platforms and solutions against any unauthorized access. Recent literature shows increased concerns about hacking, security breaches, data manipulation, social engineering, and new attack methods. Malware can be hidden within multimedia files and visiting infected websites can trigger its download to victims' machines. There are a multitude of techniques to steal personal information and other sensitive media for unauthorized dissemination; imposters/identity thefts are common in social networks. In order to demonstrate the effectiveness of resilient security and privacy solutions, methods such as new standards, advance cryptography, improved algorithms for intrusion detection, personalized privacy, and isolation of questionable or malicious files can be used independently or all together to minimize the threats. Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia (e.g., pictures, videos, data, analytics and personal information) can be created in a short period of time. When all these data are stored in a cloud environment, many people can connect to these services for viewing, sharing, commenting, and storing information. IoT represents a collection of devices, platforms, and software that allow people to store and share data in the cloud and also connects different types of clouds altogether. Hence, multimedia in the IoT serves a significant purpose as many people's updates, status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in near real time. IoT opens up many possibilities since more people can broadcast themselves and allow their networks to view and share in their lives. There are also increased fraudulent activities, cybercrimes, unauthorized access, malicious attacks, phishing, and impersonating/stealing identities. This presents challenges for existing areas such as access control, authentication, data leakage, permission, social engineering, denial of service, and identity management for the attackers to impose identity, steal information, and manipulate data in the IoT environment. Challenges also include new problems such as large scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware with multimedia, location-based privacy with high accuracy and anonymity, underground criminal networks, and hidden security breaches. Our workshopl, The 1st International Workshop on Multimedia Privacy and Security (MPS), as part of CCS 2017, focuses on these concerns, specific to the IoT ecosystem. We solicited submissions on new and innovative methods, techniques, and proofs of concepts supported by strong theory/algorithms and simulation/experiments to submit papers for this workshop. We accepted 5 submissions, and organized the workshop around talks for these publications with a keynote from Dr. Jeremy Epstein of the NSF and a panel discussion.\",\"PeriodicalId\":191367,\"journal\":{\"name\":\"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3133956.3137043\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3133956.3137043","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本次研讨会探讨了当前互联社会所带来的技术挑战。大量的设备和人可以通过智能算法、应用程序、社交网络和物联网(IoT)设置的基础设施相互连接。随着越来越多的人和他们的设备在没有太多限制的情况下连接起来,安全、隐私和信任问题仍然是一个挑战。物联网服务中的多媒体应提供强大且有弹性的安全平台和解决方案,以防止任何未经授权的访问。最近的文献显示,人们越来越关注黑客攻击、安全漏洞、数据操纵、社会工程和新的攻击方法。恶意软件可以隐藏在多媒体文件中,访问受感染的网站可以触发将其下载到受害者的机器上。有多种技术可以窃取个人资料和其他敏感媒体,以供未经授权的传播;冒名顶替者/身份盗窃在社交网络中很常见。为了证明弹性安全和隐私解决方案的有效性,可以单独或一起使用新标准、先进的加密技术、改进的入侵检测算法、个性化隐私和隔离可疑或恶意文件等方法,以最大限度地减少威胁。多媒体已经超出了它最初定义的范围。随着社交媒体的兴起,大量的多媒体(如图片、视频、数据、分析和个人信息)可以在短时间内被创造出来。当所有这些数据都存储在云环境中时,许多人可以连接到这些服务以查看、共享、评论和存储信息。物联网代表了一系列设备、平台和软件的集合,这些设备、平台和软件允许人们在云中存储和共享数据,并将不同类型的云连接在一起。因此,多媒体在物联网中发挥着重要作用,因为许多人的更新、状态、位置和实时行为可以被近乎实时地看到、传播、跟踪、评论和监控。物联网开辟了许多可能性,因为更多的人可以广播自己,并允许他们的网络查看和分享他们的生活。欺诈活动、网络犯罪、未经授权的访问、恶意攻击、网络钓鱼和冒充/窃取身份也在增加。这对现有领域提出了挑战,如访问控制、身份验证、数据泄漏、权限、社会工程、拒绝服务和身份管理,攻击者可以在物联网环境中强加身份、窃取信息和操纵数据。挑战还包括新的问题,如大规模攻击和预防、安全保护的强度(如通用加密算法)、利用多媒体隐藏恶意软件、高精度和匿名的基于位置的隐私、地下犯罪网络和隐藏的安全漏洞。我们的研讨会,第一届多媒体隐私与安全国际研讨会(MPS),作为CCS 2017的一部分,专注于这些问题,具体到物联网生态系统。我们要求提交新的和创新的方法,技术,以及由强大的理论/算法和模拟/实验支持的概念证明,以提交本次研讨会的论文。我们接受了5份投稿,并组织了研讨会,围绕这些出版物的演讲,由美国国家科学基金会的杰里米·爱泼斯坦博士发表主旨演讲,并举行了小组讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Workshop on Multimedia Privacy and Security
This workshop addresses the technical challenges arising from our current interconnected society. Multitudes of devices and people can be connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT). As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge. Multimedia in IoT services should provide a robust and resilient security platforms and solutions against any unauthorized access. Recent literature shows increased concerns about hacking, security breaches, data manipulation, social engineering, and new attack methods. Malware can be hidden within multimedia files and visiting infected websites can trigger its download to victims' machines. There are a multitude of techniques to steal personal information and other sensitive media for unauthorized dissemination; imposters/identity thefts are common in social networks. In order to demonstrate the effectiveness of resilient security and privacy solutions, methods such as new standards, advance cryptography, improved algorithms for intrusion detection, personalized privacy, and isolation of questionable or malicious files can be used independently or all together to minimize the threats. Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia (e.g., pictures, videos, data, analytics and personal information) can be created in a short period of time. When all these data are stored in a cloud environment, many people can connect to these services for viewing, sharing, commenting, and storing information. IoT represents a collection of devices, platforms, and software that allow people to store and share data in the cloud and also connects different types of clouds altogether. Hence, multimedia in the IoT serves a significant purpose as many people's updates, status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in near real time. IoT opens up many possibilities since more people can broadcast themselves and allow their networks to view and share in their lives. There are also increased fraudulent activities, cybercrimes, unauthorized access, malicious attacks, phishing, and impersonating/stealing identities. This presents challenges for existing areas such as access control, authentication, data leakage, permission, social engineering, denial of service, and identity management for the attackers to impose identity, steal information, and manipulate data in the IoT environment. Challenges also include new problems such as large scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware with multimedia, location-based privacy with high accuracy and anonymity, underground criminal networks, and hidden security breaches. Our workshopl, The 1st International Workshop on Multimedia Privacy and Security (MPS), as part of CCS 2017, focuses on these concerns, specific to the IoT ecosystem. We solicited submissions on new and innovative methods, techniques, and proofs of concepts supported by strong theory/algorithms and simulation/experiments to submit papers for this workshop. We accepted 5 submissions, and organized the workshop around talks for these publications with a keynote from Dr. Jeremy Epstein of the NSF and a panel discussion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信