skip to main content
10.1145/2660267.2660319acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

World-Driven Access Control for Continuous Sensing

Published:03 November 2014Publication History

ABSTRACT

Modern applications increasingly rely on continuous monitoring of video, audio, or other sensor data to provide their functionality, particularly in platforms such as the Microsoft Kinect and Google Glass. Continuous sensing by untrusted applications poses significant privacy challenges for both device users and bystanders. Even honest users will struggle to manage application permissions using existing approaches.

We propose a general, extensible framework for controlling access to sensor data on multi-application continuous sensing platforms. Our approach, world-driven access control, allows real-world objects to explicitly specify access policies. This approach relieves the user's permission management burden while mediating access at the granularity of objects rather than full sensor streams. A trusted policy module on the platform senses policies in the world and modifies applications' "views" accordingly. For example, world-driven access control allows the system to automatically stop recording in bathrooms or remove bystanders from video frames,without the user prompted to specify or activate such policies. To convey and authenticate policies, we introduce passports, a new kind of certificate that includes both a policy and optionally the code for recognizing a real-world object.

We implement a prototype system and use it to study the feasibility of world-driven access control in practice. Our evaluation suggests that world-driven access control can effectively reduce the user's permission management burden in emerging continuous sensing systems. Our investigation also surfaces key challenges for future access control mechanisms for continuous sensing applications.

References

  1. ZXing.Net. http://zxingnet.codeplex.com/.Google ScholarGoogle Scholar
  2. Abrash, M. Latency -- the sine qua non of AR and VR, 2012. http://bit.ly/UbrBL0.Google ScholarGoogle Scholar
  3. Ada Initiative. Another way to attract women to conferences: photography policies, 2013. http://bit.ly/1bc3x3O.Google ScholarGoogle Scholar
  4. Ardagna, C. A., Cremonini, M., di Vimercati, S. D. C., and Samarati, P. Privacy-enhanced Location-based Access Control. In Handbook of Database Security. 2008, pp. 531--552.Google ScholarGoogle Scholar
  5. Bauer, L., Garriss, S., McCune, J. M., Reiter, M. K., Rouse, J., and Rutenbar, P. Device-enabled authorization in the Grey system. In International Conference on Information Security (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Borisov, N., and Brewer, E. A. Active certificates: A framework for delegation. In Network and Distributed System Security Symposium (NDSS) (2002).Google ScholarGoogle Scholar
  7. Brassil, J. Technical Challenges in Location-Aware Video Surveillance Privacy. In Protecting Privacy in Video Surveillance, A. Senior, Ed. 2009, pp. 91--113.Google ScholarGoogle Scholar
  8. Cammozzo, A. TagMeNot. http://tagmenot.info/.Google ScholarGoogle Scholar
  9. Clark, J., and van Oorschot, P. C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. IEEE Symposium on Security & Privacy (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. CNXSoft. Qualcomm fast computer vision sdk, 2011. http://bit.ly/rUY7Pa.Google ScholarGoogle Scholar
  11. Denning, T., Dehlawi, Z., and Kohno, T. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In ACM CHI (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In Symposium on Usable Privacy and Security (SOUPS) (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Geambasu, R., Levy, A. A., Kohno, T., Krishnamurthy, A., and Levy, H. M. Comet: An active distributed key-value store. In USENIX OSDI (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Google. Google Glass. http://glass.google.com/.Google ScholarGoogle Scholar
  15. Gray, R. The places where Google Glass is banned, Dec. 2013. http://www.telegraph.co.uk/technology/google/10494231/The-places-where- Google-Glass-is-banned.html.Google ScholarGoogle Scholar
  16. Halderman, J. A., Waters, B., and Felten, E. W. Privacy Management for Portable Recording Devices. In Workshop on Privacy in Electronic Society (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hudson, S., Fogarty, J., Atkeson, C., Avrahami, D., Forlizzi, J., Kiesler, S., Lee, J., and Yang, J. Predicting human interruptibility with sensors: a wizard of oz feasibility study. In ACM CHI (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H. J., and Ofek, E. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. In USENIX Security Symposium (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. In IEEE Symposium on Security and Privacy (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kotadia, M. Jamming device aims at camera phones, 2003. http://cnet.co/HEvS8b.Google ScholarGoogle Scholar
  21. Lasecki, W., Song, Y. C., Kautz, H., and Bigham, J. Real-time crowd labeling for deployable activity recognition. In Computer Supported Cooperative Work (CSCW) (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lee, S., Wong, E., Goel, D., Dahlin, M., and Shmatikov, V. PiBox: A platform for privacy preserving apps. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. LiKamWa, R., Priyantha, B., Philipose, M., Zhong, L., and Bahl, P. Energy characterization & optimization of image sensing toward continuous mobile vision. In MobiSys (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lioy, A., and Ramunno, G. Trusted computing. In Handbook of Information and Communication Security, Stavroulakis and Stamp, Eds. 2010, pp. 697{717.Google ScholarGoogle Scholar
  25. Marlinspike, M. Convergence. http://convergence.io/.Google ScholarGoogle Scholar
  26. Meta. Spaceglasses. http://spaceglasses.com.Google ScholarGoogle Scholar
  27. Microsoft. App. Domains. http://msdn.microsoft.com/en-us/library/2bh4z9hs(v=vs.110).aspx.Google ScholarGoogle Scholar
  28. Microsoft. Creating your own code access permissions, 2013. http://bit.ly/HFzDKD.Google ScholarGoogle Scholar
  29. O'Brien, K. Swiss Court Orders Modifications to Google Street View, 2012. http://nyti.ms/L3cdNZ.Google ScholarGoogle Scholar
  30. Panzarino, M. Inside the revolutionary 3d vision chip at the heart of google's project tango phone, Feb. 2014. http://tcrn.ch/1fkCuWK.Google ScholarGoogle Scholar
  31. Paruchuri, J. K., Cheung, S.-C. S., and Hail, M. W. Video data hiding for managing privacy information in surveillance systems. EURASIP Journal on Info. Security (Jan. 2009), 7:1--7:18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Patel, S. N., Summet, J. W., and Truong, K. N. BlindSpot: Creating Capture-Resistant Spaces. In Protecting Privacy in Video Surveillance, A. Senior, Ed. 2009.Google ScholarGoogle Scholar
  33. Priyantha, N. B., Miu, A. K. L., Balakrishnan, H., and Teller, S. J. The cricket compass for context-aware mobile applications. In Mobile Computing and Networking (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Quest Visual. WordLens: See the world in your language. http://questvisual.com/.Google ScholarGoogle Scholar
  35. Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H. J., and Cowan, C. User-driven access control: Rethinking permission granting in modern operating systems. In IEEE Symposium on Security and Privacy (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Schiff, J., Meingast, M., Mulligan, D. K., Sastry, S., and Goldberg, K. Y. Respectful Cameras: Detecting Visual Markers in Real-Time to Address Privacy Concerns. In International Conference on Intelligent Robots and Systems (2007).Google ScholarGoogle ScholarCross RefCross Ref
  37. Shotton, J., Fitzgibbon, A., Cook, M., Sharp, T., Finocchio, M., Moore, R., Kipman, A., and Blake, A. Real-time human pose recognition in parts from a single depth image. In Computer Vision & Pattern Recognition (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Starner, T. The Challenges of Wearable Computing: Part 2. IEEE Micro 21, 4 (2001), 54--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In Network and Distributed System Security Symposium (NDSS) (2014).Google ScholarGoogle ScholarCross RefCross Ref
  40. Tennenhouse, D. L., Smith, J. M., Sincoskie, W. D., Wetherall, D. J., and Minden, G. J. A Survey of Active Network Research. IEEE Communications 35 (1997), 80--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. The 5 Point Cafe. Google Glasses Banned, Mar. 2013. http://the5pointcafe.com/google-glasses-banned/.Google ScholarGoogle Scholar
  42. Tom Simonite. Bringing cell-phone location-sensing indoors. http://bit.ly/TVyMEx.Google ScholarGoogle Scholar
  43. Wendlandt, D., Andersen, D. G., and Perrig, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX Security Symposium (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Zimmermann, P. R. The Official PGP User's Guide. MIT Press, Cambridge, MA, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. World-Driven Access Control for Continuous Sensing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
          November 2014
          1592 pages
          ISBN:9781450329576
          DOI:10.1145/2660267

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 November 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader