Award Abstract # 1351058
CAREER: Contextual Protection for Private Data Storage and Retrieval

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF ILLINOIS
Initial Amendment Date: January 24, 2014
Latest Amendment Date: March 2, 2018
Award Number: 1351058
Award Instrument: Continuing Grant
Program Manager: James Joshi
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: February 1, 2014
End Date: January 31, 2020 (Estimated)
Total Intended Award Amount: $596,970.00
Total Awarded Amount to Date: $612,970.00
Funds Obligated to Date: FY 2014 = $120,114.00
FY 2015 = $112,139.00

FY 2016 = $150,444.00

FY 2017 = $119,309.00

FY 2018 = $110,964.00
History of Investigator:
  • Christopher Kanich (Principal Investigator)
    ckanich@uic.edu
Recipient Sponsored Research Office: University of Illinois at Chicago
809 S MARSHFIELD AVE M/C 551
CHICAGO
IL  US  60612-4305
(312)996-2862
Sponsor Congressional District: 07
Primary Place of Performance: University of Illinois at Chicago
851 S Morgan St
Chicago
IL  US  60607-7053
Primary Place of Performance
Congressional District:
07
Unique Entity Identifier (UEI): W8XEAJDKMXH3
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
01001516DB NSF RESEARCH & RELATED ACTIVIT

01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9251, 9178, 1045, 7434
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This research is building an understanding of what data is useful to attackers and what data is private for its legitimate owners so that security systems can incorporate these values into a data-driven, defense-in-depth approach to securing our digital lives.

We are exploiting the fact that both users and attackers must sift through vast amounts of data to find useful information. This system, called contextual data protection, enables users to passively manage their private and potentially lucrative stored data with minimal overhead, adding extra protection to private data which greatly lowers the risk inherent in long lived archives.

Simultaneously, we are creating effective defenses for data by improving our understanding of cybercrime, information use habits, and acceptable usability tradeoffs for data access. Building on previous research analyzing the financial successes of spam-based cybercrime, we are developing a methodology and apparatus for understanding the illicit value of stolen information. By understanding what is discoverable and valuable to attackers, we can develop techniques to focus security efforts on lucrative information, thereby preventing cybercriminals from turning a profit.

Ultimately, our goal is to create a set of general techniques that use tools from cryptography that defend users' data by exploiting a deeper understanding of its value to both the users and the attackers. This research will shed light on the meaning of information value, ownership, and protection in this era of long-lived digital storage.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Ameya Hanamsagar, Simon Woo, Chris Kanich, and Jelena Mirkovic "Leveraging Semantic Transformation to Investigate Password Habits and Their Causes" Proceedings of the ACM Conference on Human Factors in Computing Systems , 2018
Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich. ""I Saw Images I Didn?t Even Know I Had:" Understanding User Perceptions of Cloud Storage Privacy." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2015
Khan, Mohammad Taha and Huo, Xiang and Li, Zhou and Kanich, Chris "Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting" Proceedings of the 36th IEEE Symposium on Security and Privacy , 2015
Mohammad Taha Khan and Maria Hyun and Chris Kanich and Blase Ur "Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage" Proceedings of the ACM Conference on Human Factors in Computing Systems , 2018
Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez "An Empirical Analysis of the Commercial VPN Ecosystem" Internet Measurement Conference , 2018
Sara Amini, Chris Kanich "Characterizing the Impact of Malware Infectionsand Remediation Attempts Through Support ForumAnalysis" Proceedings of the Symposium on Electronic Crime Research (IEEE) , 2017
Snyder, Peter and Kanich, Chris "Characterizing Fraud and Its Ramifications in Affiliate Marketing Networks" Journal of Cybersecurity , 2016

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The major goals of this project were to develop a principled understanding of the risks of long term personal information storage and to develop effective methods for mitigating those risks. By putting humans and their experience of contemporary computing systems at its center, this project was able to substantially broaden and deepen our understanding of long term information storage. We discovered multiple surprising and important aspects of how users perceive risks and benefits of their cloud storage, applied those discoveries to building improved software systems, and introduced several undergraduates to research in computer science along the way.

As part of this project, we conducted multiple studies related to participant perception of the usefulness and sensitivity of the files they store within the cloud. One early project expanded beyond the initial search for predefined "sensitive" data (passwords) to all images stored within cloud email accounts. This effort led to two important discoveries: first, that modern email archives' tendency to save sent messages by default led to many participants storing many images they did not even realize at first: this modality is particularly confusing on mobile phones where these photos can easily end up stored in two or three places as the result of one action, making fully deleting them exceedingly difficult. The second discovery is that, while participants considered sensitive images of themselves risky, photos taken of or by others which were entrusted to them were considered even more sensitive, leading us to increase our respect for how interpersonal context is exceedingly important in the perception of privacy. Both of these discoveries enabled us to further refine our approach to building tools that can successfully assist users in minimizing the risks embedded in their online storage accounts.

Throughout the performance of this project, we have built several pieces of information technology infrastructure which enable deep investigation of the risk/reward trade off surrounding the storage of files in the cloud. At first our infrastructure could only investigate Gmail cloud email accounts, but throughout the project we expanded that capability to include other cloud services like Dropbox and Google Drive. This software has been shared within the research community and forms the basis of several other experimental infrastructures built for investigating perceptions surrounding the use of cloud storage.

PI Kanich has had the opportunity to mentor twelve undergraduates as part of the efforts of this project, ten of whom are members of groups underrepresented in STEM. Many of these students are first generation college students and have continued their efforts in research or moved on to jobs in STEM fields.


Last Modified: 08/22/2020
Modified by: Christopher Kanich

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page