Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags



Similar documents
EPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005

How To Counter SpIT

RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

Efficient Data Sharing in Healthcare

PRIME. Privacy and Identity Management for Everyone/Europe. Thomas Gross (IBM Research) with a PRIME hat on.

Strengthen RFID Tags Security Using New Data Structure

Getting Started with TraSer from Requirements to a Solution

Security Challenges of the EPCglobal Network

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

Architecture «Standard-Oriented» pour l IdO :

Guidance Regarding Skype and Other P2P VoIP Solutions

EU Policy on RFID & Privacy

Delivery date: 18 October 2014

Privacy and Data Protection (and more) for Big Data

White Paper Healthcare Supply Chain Traceability

Basic principles of labelling and Electronic Data Interchange - Abridged version -

Internet of Things - A GAME- CHANGER FOR OMNI-CHANNEL RETAILERS

RFID the next step in consumer-product relations or Orwellian nightmare?

Object Identification for Ubiquitous Networking

Data Protection Technical Guidance Radio Frequency Identification

Consolidation of EPC and Heterogeneous Home Network

Business Security and Privacy Risk of RFID

Summary of feedback on Big data and data protection and ICO response

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Enabling the secure use of RFID

GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE

THE ENTERPRISE INTERNET OF THINGS PLATFORM 2015 FEATURES GUIDE

The Art of Intervenability for Privacy Engineering

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Anti-Cloning Demonstrator

Internet of Things (IoT): A vision, architectural elements, and future directions

Press release Faster better error-proofing

ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012

INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology

Turnkey Cloud Based RFID Solutions. We put a light on all the things you search for

Towards Unified Tag Data Translation for the Internet of Things

Research on Anomaly Detection of RFID Supply Chain Data Based on EPC

CHAPTER 1 Introduction 1

Asset Tracking & Radio Frequency Identification White Paper

RFIDs and European Policies

Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security

Trust areas: a security paradigm for the Future Internet

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

RFID Technology - Potential Of Big Brother

Introduction of Information Security Research Division

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

IBM Solution for Pharmaceutical Track & Trace

How to Design and Build a RFID Network Infrastructure in Nationwide Buildings?

Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013

A Study on the Security of RFID with Enhancing Privacy Protection

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at

How To Spread Pheromone In An Rfid Tag

Future Directions for Internet of Things Work

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

IoT Prospects of Worldwide Development and Current Global Circumstances

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

How To Protect Your Privacy On The Net

Ans.: Spam Monitor support all popular programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Analyzing Product Flows with the Supply Chain Visualizer. Demo at Internet of Things Conference 2008, Zurich

RFID Design Principles

Belmont 16 Foot Sailing Club. Privacy Policy

RFID Design Principles

Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

Privacy and Security in library RFID Issues, Practices and Architecture

ECSA EuroCloud Star Audit Data Privacy Audit Guide

Consor;um (partners) ARES conference Toulouse, 24 August 2015

How To Secure Cloud Computing

Evaluation of different Open Source Identity management Systems

Beasley Broadcast Group, Inc. Privacy Policy

Selective dependable storage services for providing security in cloud computing

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance

Eclipse.Net Hosted Librarian Guide

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

How We Use Your Personal Information On An Afinion International Ab And Afion International And Afinion Afion Afion

Building Connected Businesses with Internet of Things Services

Cloud Computing Security Considerations

Reflection Paper of the Federal Government of Germany. From Berlin 2007 to Nice 2008 and Beyond: RFID Internet of Things Internet of the Future

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

ASPIRE and AspireRfid

DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)

Internet of goods - capturing container movements report from Amsterdam

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

COMPUTER USAGE -

Collection and Use of Information

How To Help The Global Healthcare User Group (Hug)

Mobile RFID Applications and Security Challenges

dma How to guide and cookies legislation Published by The DMA Marketing Council and the IAB Marketing Council we are the

1. Go to Projects to Invoices, then click on Components and Commitments in the drop down menu. search area. Components list sorting bar

Cloud RFID UHF Gen 2

Response of the German Medical Association

Data Storage in RFID Systems

Facts about the new identity card

Zinc Recruitment Pty Ltd Privacy Policy

PRIME Privacy and Identity Management for Europe Vision Objectives First Results

Amlib Library Software: Equipment & Asset Tracking Management System

FOR TEACHERS ONLY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION. ENGLISH LANGUAGE ARTS (Common Core)

Applications of eperspace Service Management Platform in Health Care

Transcription:

Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein markus.hansen@privacyresearch.eu meissner@datenschutzzentrum.de IFIP Summer School, August 2007 Karlstads Universitet Workshop on Ethical and Privacy Aspects of RFID

Who's talking? Independent Centre for Privacy Protection Unabhängiges Landeszentrum für Datenschutz (ULD) Office of the Privacy Commissioner of Schleswig-Holstein, Germany's most northern and most beautiful federal state. Supervisory Authority Public administration as well as private sector. Consultancy Technical, legal, and organisational questions on privacy and IT security. Certification Authority Privacy Seal for IT products. Advanced Education and Training Privacy Academy (Datenschutzakademie). https://www.datenschutzzentrum.de/

Who's talking? Independent Centre for Privacy Protection Unabhängiges Landeszentrum für Datenschutz (ULD) Projects Bring privacy into concepts and designs. PRIME Privacy and Identity Management for Europe FIDIS Future of Identity in the Information Society TAUCIS Technology Assessment Ubiquitous Computing and Informational Self-Determination SPIT-AL Countering Spam over Internet Telephony Current Hot Topic: Online-Durchsuchung Remote Search of Computers by Law Enforcement

Electronic Product Code Item-unique identifier for goods. Standardised and issued by EPCglobal Inc., NPO founded by GS1(EAN) and UCC. EPC is a set of coding schemes for RFID tags, originally developed by MIT AutoID centre.

Retrieving Information ONS Object Name Service: Works similar to DNS; Locate information on queried EPC. EPCIS EPC Information Services: Exchange data (real-time aimed) on certain EPC from members of the EPCglobal Network: Community, NOT technical network. Subscribers

Tracking People with EPC? EPC tags do not contain any personally identifiable information about consumers. [...] The only information that is contained in the EPC tag relates to the product, not the purchaser. EPCglobal Public Policy Steering Committee FAQ Licensing agreements for the EPC specifically prohibit its use for tracking or identifying people, except in very specific cases and with full transparency relating to patient or troop safety. PPSC Fact Sheet: Important Messages About EPC and RFID

Identification: Lessons from Biometrics Characteristic and non-characteristic data. Gather set of characteristics. Match agains enrolled set: Non-binary functions => true/false by probability. False acceptance / false rejection rates.

Classification of Products By probability of being used by a single person only. Shoes Glasses frame Underwear (Implants?) Others used once only or often by different individuals (chocolate bar, refillable bottles). Shades of grey Classification scheme?

Map Classification to EPCs Create database mapping product classification to object classes. Remember: Serial number allows for unique identification.

The EPC Cloud Read RFIDs: Set of EPCs. Look up EPCs in ONS. Retrieve information via EPCIS. Map product classes against classification. Select subset of (high probability of) individuality. Continuous Enrollment

The EPC Cloud What do we know? What? => Who? Unique identifiers Where? Reader ID etc. from EPCIS When? Time Stamp What => Profiling: Consumption habits... When&Where => Tracking

The EPC Cloud Follow the Clouds! A fundamental principle of the EPCglobal Network Architecture is the assignment of a unique identity to physical objects, loads, locations, assets, and other entities whose use is to be tracked. EPCglobal Architecture Framework Final Version EPC is not just a number: =>Privacy implications arise from RFID tags and even more from EPC data processing systems.

Cloud Hopping

Cloud Hopping Unique ID appears with different EPC cloud. => Social interaction probable, => Link between individuals. Social Networks (nodes, ties) Find patterns of Cloud Hopping. => Mappable to types of social interaction? => Mappable to types of social relation? Father <> Daughter, Employer <> Employee,...

Infrastructure Requirements Vision: RFID with EPC as barcode replacement on any goods and everyday items. Readers at shops, in cupboards, fridges, washing machines, TV set-top boxes... just everywhere. Readers connected to ONS & EPCIS.

Security? Privacy? Security precautions as found in EPCglobal documents have their main focus on authentication and authorisation when using EPCIS and therefore are probably not intended to secure consumer privacy, but the business model of EPCglobal. Subscribers

Security? Privacy? The EPCglobal Architecture Framework does not currently discuss how these features affect the architecture above the level of the Reader Protocol, nor is there any architectural discussion of how the goals of security and privacy are addressed through these or other features. EPCglobal: EPCglobal Architecture Framework Final Version

Legal Aspects Identification of customers by personal profiles created from consumption and interest data, location data and data about social links. Person might be identifiable even though no traditional identifiers are available: => Items of high probability of individual use. EPC item-unique tagging usually will entail a processing of personal data. C.f. Art. 29 Data Protection Working Party: Working Documents WP 105, 136.

Conclusion EPCs on RFIDs are personally identifiable data, allow new type of privacy invasion. Legal regulation inherently can not prevent misuse, just sanction it: Technical designs of systems have to provide precautions to protect privacy of individuals by enforcing e.g. purpose-binding and deletion of collected data. As of now, license agreements seem to be the only insufficient protection against the described scenario.

Thanks for Listening! Contact: Markus Hansen Independent Centre for Privacy Protection Holstenstraße 98 24103 Kiel Germany markus.hansen@privacyresearch.eu