Skip to main content

2020 | OriginalPaper | Buchkapitel

A Survey-Based Exploration of Users’ Awareness and Their Willingness to Protect Their Data with Smart Objects

verfasst von : Chathurangi Ishara Wickramasinghe, Delphine Reinhardt

Erschienen in: Privacy and Identity Management. Data for Better Living: AI and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the last years, the Internet of Things (IoT) and smart objects have become more and more popular in our everyday lives. While IoT contributes in making our everyday life more comfortable and easier, it also increases the threats to our privacy, as embedded sensors collect data about us and our environment. To foster the acceptance of IoT, privacy-preserving solutions are therefore necessary. While such solutions have already been proposed, most of them do not involve the users in their design. In this paper, we therefore adopt a user-centric approach and lay the ground for the future design of user-centric privacy-preserving solutions dedicated to smart home environments. To this end, we have designed and distributed a questionnaire fulfilled by 229 anonymous participants. Our objectives are two-fold: We aim at investigating (1) requirements for end user-involved privacy-preserving solutions and (2) users’ readiness to be involved in their own privacy protection. Our results show that the majority of our participants are aware of the data collection happening as well as the associated privacy risks and would be ready to control and audit the collected data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Privacy paradox explains the discrepancy between the users’ stated preferences with regard to privacy protection and their actual behavior.
 
2
At the beginning of the survey, we informed the participants that both data collection and processing take place anonymously. Note that the survey was carried out at the University of Bonn, which did not have an ethical board for reviewing user studies in our field at the time of the study. We have, however, limited the data collection to the minimum and conducted it anonymously. The participants were informed that they could opt out at any time and that their data would be removed. After agreeing to participate, each participant has been assigned a pseudonym and asked to answer a questionnaire to gather his/her demographics.
 
3
A score of 1 corresponds to a strong disagreement, while a score of 5 to a strong agreement.
 
Literatur
1.
Zurück zum Zitat Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). OJ L119/1, pp. 1–88 (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). OJ L119/1, pp. 1–88 (2016)
2.
Zurück zum Zitat Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving iot target-triven applications. Comput. Secur. 37, 111–123 (2013)CrossRef Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving iot target-triven applications. Comput. Secur. 37, 111–123 (2013)CrossRef
3.
Zurück zum Zitat Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home Internet of Things privacy norms using contextual integrity. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 2(2), 1–23 (2018). Article 59CrossRef Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home Internet of Things privacy norms using contextual integrity. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 2(2), 1–23 (2018). Article 59CrossRef
4.
Zurück zum Zitat Barhamgi, M., et al.: Enabling end-users to protect their privacy. In: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, pp. 905–907 (2017) Barhamgi, M., et al.: Enabling end-users to protect their privacy. In: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, pp. 905–907 (2017)
5.
Zurück zum Zitat Cao, H., Liu, S., Guan, Z., Wu, L., Deng, H., Du, X.: An efficient privacy-preserving algorithm based on randomized response in IoT-based smart grid. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, pp. 881–886 (2018) Cao, H., Liu, S., Guan, Z., Wu, L., Deng, H., Du, X.: An efficient privacy-preserving algorithm based on randomized response in IoT-based smart grid. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, pp. 881–886 (2018)
6.
Zurück zum Zitat Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Depend. Secur. Comput. 8(3), 337–352 (2010) Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Depend. Secur. Comput. 8(3), 337–352 (2010)
7.
Zurück zum Zitat Carretero, J., García, J.D.: The Internet of Things: connecting the world. Pers. Ubiquit. Comp. 18(2), 445–447 (2014)CrossRef Carretero, J., García, J.D.: The Internet of Things: connecting the world. Pers. Ubiquit. Comp. 18(2), 445–447 (2014)CrossRef
8.
Zurück zum Zitat Chakravorty, A., Wlodarczyk, T., Rong, C.: Privacy preserving data analytics for smart homes. In: 2013 IEEE Security and Privacy Workshops, pp. 23–27 (2013) Chakravorty, A., Wlodarczyk, T., Rong, C.: Privacy preserving data analytics for smart homes. In: 2013 IEEE Security and Privacy Workshops, pp. 23–27 (2013)
9.
Zurück zum Zitat Chan, E.M., Lam, P.E., Mitchell, J.C.: Understanding the challenges with medical data segmentation for privacy. In: Usenix Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, pp. 1–10 (2013) Chan, E.M., Lam, P.E., Mitchell, J.C.: Understanding the challenges with medical data segmentation for privacy. In: Usenix Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, pp. 1–10 (2013)
10.
Zurück zum Zitat Coopamootoo, K., Gross, T.: Why privacy is all but forgotten. Proc. Priv. Enhanc. Technol. 4, 97–118 (2017)CrossRef Coopamootoo, K., Gross, T.: Why privacy is all but forgotten. Proc. Priv. Enhanc. Technol. 4, 97–118 (2017)CrossRef
12.
Zurück zum Zitat Friedewald, M., Da Costa, O., Punie, Y., Alahuhta, P., Heinonen, S.: Perspectives of ambient intelligence in home environment. Telemat. Inform. 22, 221–238 (2005)CrossRef Friedewald, M., Da Costa, O., Punie, Y., Alahuhta, P., Heinonen, S.: Perspectives of ambient intelligence in home environment. Telemat. Inform. 22, 221–238 (2005)CrossRef
13.
Zurück zum Zitat Guo, L., et al.: A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J. 4(2), 601–610 (2017)CrossRef Guo, L., et al.: A secure mechanism for big data collection in large scale internet of vehicle. IEEE Internet Things J. 4(2), 601–610 (2017)CrossRef
14.
Zurück zum Zitat Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the Internet of Things. Secur. Commun. Netw. 9(16), 3083–3094 (2016)CrossRef Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the Internet of Things. Secur. Commun. Netw. 9(16), 3083–3094 (2016)CrossRef
15.
Zurück zum Zitat Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive Internet of Things privacy preserved access control. In: 2012 International Conference for Internet Technology And Secured Transactions, pp. 597–602 (2012) Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive Internet of Things privacy preserved access control. In: 2012 International Conference for Internet Technology And Secured Transactions, pp. 597–602 (2012)
16.
Zurück zum Zitat Hussain, S.H., Geetha, S., Prabhakar, M.A.: Design and implementation of an adaptive model for sustainable home automation using Internet of Things (IoT). Int. J. Adv. Eng. Tech. VII(1), 827–829 (2016) Hussain, S.H., Geetha, S., Prabhakar, M.A.: Design and implementation of an adaptive model for sustainable home automation using Internet of Things (IoT). Int. J. Adv. Eng. Tech. VII(1), 827–829 (2016)
17.
Zurück zum Zitat Jia, Y.J., et al.: ContexloT: towards providing contextual integrity to appified IoT platforms. In: Network and Distributed System Security Symposium (NDSS), pp. 1–15 (2017) Jia, Y.J., et al.: ContexloT: towards providing contextual integrity to appified IoT platforms. In: Network and Distributed System Security Symposium (NDSS), pp. 1–15 (2017)
18.
Zurück zum Zitat Karaboga, M., et al.: Das versteckte Internet: Zu Hause - im Auto - am Körper. White paper, Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt (2015) Karaboga, M., et al.: Das versteckte Internet: Zu Hause - im Auto - am Körper. White paper, Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt (2015)
19.
Zurück zum Zitat Khan, M.S.N., Marchal, S., Buchegger, S., Asokan, N.: chownIoT: enhancing IoT privacy by automated handling of ownership change. In: Kosta, E., Pierson, J., Slamanig, D., Fischer-Hübner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 205–221. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16744-8_14CrossRef Khan, M.S.N., Marchal, S., Buchegger, S., Asokan, N.: chownIoT: enhancing IoT privacy by automated handling of ownership change. In: Kosta, E., Pierson, J., Slamanig, D., Fischer-Hübner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 205–221. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-16744-8_​14CrossRef
20.
Zurück zum Zitat Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef
21.
Zurück zum Zitat Lee, H., Kobsa, A.: Understanding user privacy in Internet of Things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407–412 (2016) Lee, H., Kobsa, A.: Understanding user privacy in Internet of Things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407–412 (2016)
22.
Zurück zum Zitat Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans. Ind. Inform. 14(8), 3599–3609 (2017)CrossRef Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans. Ind. Inform. 14(8), 3599–3609 (2017)CrossRef
23.
Zurück zum Zitat Martin, K., Nissenbaum, H.: Measuring privacy: an empirical test using context to expose confounding variables. Columbia Sci. Technol. Law Rev. 18, 176–218 (2016) Martin, K., Nissenbaum, H.: Measuring privacy: an empirical test using context to expose confounding variables. Columbia Sci. Technol. Law Rev. 18, 176–218 (2016)
24.
Zurück zum Zitat McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197–5207 (2017) McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197–5207 (2017)
25.
Zurück zum Zitat Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399–412 (2017) Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399–412 (2017)
26.
Zurück zum Zitat Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)CrossRef Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)CrossRef
27.
Zurück zum Zitat Pasquale, F.: The Black Box Society: the Secret Algorithms that Control Money and Information. Harvard University Press, Cambridge (2015)CrossRef Pasquale, F.: The Black Box Society: the Secret Algorithms that Control Money and Information. Harvard University Press, Cambridge (2015)CrossRef
28.
Zurück zum Zitat Perera, C., McCormick, C., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy-by-design framework for assessing Internet of Things applications and platforms. In: Proceedings of the 6th International Conference on the Internet of Things (ACM), pp. 83–92 (2016) Perera, C., McCormick, C., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy-by-design framework for assessing Internet of Things applications and platforms. In: Proceedings of the 6th International Conference on the Internet of Things (ACM), pp. 83–92 (2016)
29.
Zurück zum Zitat Su, J., Cao, D., Zhao, B., Wang, X., You, I.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Gener. Comp. Sys. 33, 11–18 (2014)CrossRef Su, J., Cao, D., Zhao, B., Wang, X., You, I.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Gener. Comp. Sys. 33, 11–18 (2014)CrossRef
30.
Zurück zum Zitat Udoh, E.S., Alkharashi, A.: Privacy risk awareness and the behavior of smartwatch users: a case study of Indiana University Students. In: 2016 Future Technologies Conference (FTC), pp. 926–931 (2016) Udoh, E.S., Alkharashi, A.: Privacy risk awareness and the behavior of smartwatch users: a case study of Indiana University Students. In: 2016 Future Technologies Conference (FTC), pp. 926–931 (2016)
31.
Zurück zum Zitat Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725–730 (2014) Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725–730 (2014)
32.
Zurück zum Zitat Yang, J.C., Fang, B.X.: Security model and key technologies for the Internet of Things. J. China Univ. Posts Telecommun. 18, 109–112 (2011)CrossRef Yang, J.C., Fang, B.X.: Security model and key technologies for the Internet of Things. J. China Univ. Posts Telecommun. 18, 109–112 (2011)CrossRef
33.
Zurück zum Zitat Yang, L., Humayed, A., Li, F.: A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (ACM), pp. 30–39 (2016) Yang, L., Humayed, A., Li, F.: A multi-cloud based privacy-preserving data publishing scheme for the Internet of Things. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (ACM), pp. 30–39 (2016)
34.
Zurück zum Zitat Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 415–427 (2012) Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 415–427 (2012)
35.
Zurück zum Zitat Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks. Article no. 5 (2015) Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks. Article no. 5 (2015)
36.
Zurück zum Zitat Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (SOUPS 2017), pp. 65–80 (2017) Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (SOUPS 2017), pp. 65–80 (2017)
37.
Zurück zum Zitat Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on Human-Computer Interaction, vol. 2, Article no. (CSCW 200), pp. 1–20 (2018)CrossRef Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on Human-Computer Interaction, vol. 2, Article no. (CSCW 200), pp. 1–20 (2018)CrossRef
38.
Zurück zum Zitat Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606–1616 (2019)CrossRef Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606–1616 (2019)CrossRef
Metadaten
Titel
A Survey-Based Exploration of Users’ Awareness and Their Willingness to Protect Their Data with Smart Objects
verfasst von
Chathurangi Ishara Wickramasinghe
Delphine Reinhardt
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42504-3_27