Skip to main content

2019 | OriginalPaper | Buchkapitel

The Automatic Detection of Sensitive Data in Smart Homes

verfasst von : Mahsa Keshavarz, Mohd Anwar

Erschienen in: HCI for Cybersecurity, Privacy and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Smart homes are increasingly becoming popular because they make living comfortable, enjoyable, and secure. People can remotely control various aspects of their smart home environments. However, smart home appliances can pose threats to privacy. The reason is that smart appliances collect and store sensitive information, and if hackers gain access to this information, user privacy may be breached. It is difficult for users to constantly monitor and determine which data is sensitive to them and which one is not. Also, a user’s identity can be leaked during sharing of information with different service providers such as health care providers and utility companies. In this paper we address one important privacy issue in smart homes, which is lack of users’ control over their desired privacy. We propose a privacy decision framework which considers this problem. In this framework, active learning (machine learning) technique is used to help users detect sensitive information according to their privacy preferences.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Han, D.-M., Lim, J.-H.: Smart home energy management system using IEEE 802.15. 4 and ZigBee. IEEE Trans. Consum. Electron. 56, 1403–1410 (2010)CrossRef Han, D.-M., Lim, J.-H.: Smart home energy management system using IEEE 802.15. 4 and ZigBee. IEEE Trans. Consum. Electron. 56, 1403–1410 (2010)CrossRef
2.
Zurück zum Zitat Pătru, I.-I., Carabaş, M., Bărbulescu, M., Gheorghe, L.: Smart home IoT system. In: 15th RoEduNet Conference: Networking in Education and Research, pp. 1–6 (2016) Pătru, I.-I., Carabaş, M., Bărbulescu, M., Gheorghe, L.: Smart home IoT system. In: 15th RoEduNet Conference: Networking in Education and Research, pp. 1–6 (2016)
3.
Zurück zum Zitat Wang, M., Zhang, G., Zhang, C., Zhang, J., Li, C.: An IoT-based appliance control system for smart homes. In: Fourth International Conference on Intelligent Control and Information Processing (ICICIP), pp. 744–747 (2013) Wang, M., Zhang, G., Zhang, C., Zhang, J., Li, C.: An IoT-based appliance control system for smart homes. In: Fourth International Conference on Intelligent Control and Information Processing (ICICIP), pp. 744–747 (2013)
4.
Zurück zum Zitat Kumar, P., Pati, U.C.: IoT based monitoring and control of appliances for smart home. In: IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 1145–1150 (2016) Kumar, P., Pati, U.C.: IoT based monitoring and control of appliances for smart home. In: IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 1145–1150 (2016)
5.
Zurück zum Zitat Bauer, K.A.: Home-based telemedicine: a survey of ethical issues. Camb. Q. Healthc. Ethics 10, 137–146 (2001)CrossRef Bauer, K.A.: Home-based telemedicine: a survey of ethical issues. Camb. Q. Healthc. Ethics 10, 137–146 (2001)CrossRef
6.
Zurück zum Zitat Zhang, M., Liu, Y., Wang, J., Hu, Y.: A new approach to security analysis of wireless sensor networks for smart home systems. In: International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 318–323 (2016) Zhang, M., Liu, Y., Wang, J., Hu, Y.: A new approach to security analysis of wireless sensor networks for smart home systems. In: International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 318–323 (2016)
7.
Zurück zum Zitat Bennett, C.L., Silver, S.M., Djulbegovic, B., Samaras, A.T., Blau, C.A., Gleason, K.J., et al.: Venous thromboembolism and mortality associated with recombinant erythropoietin and darbepoetin administration for the treatment of cancer-associated anemia. Jama 299, 914–924 (2008)CrossRef Bennett, C.L., Silver, S.M., Djulbegovic, B., Samaras, A.T., Blau, C.A., Gleason, K.J., et al.: Venous thromboembolism and mortality associated with recombinant erythropoietin and darbepoetin administration for the treatment of cancer-associated anemia. Jama 299, 914–924 (2008)CrossRef
8.
Zurück zum Zitat Baumeister, T.: Adapting PKI for the smart grid. In: IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 249–254 (2011) Baumeister, T.: Adapting PKI for the smart grid. In: IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 249–254 (2011)
9.
Zurück zum Zitat Kifer, D., Lin, B.-R.: Towards an axiomatization of statistical privacy and utility. In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 147–158 (2010) Kifer, D., Lin, B.-R.: Towards an axiomatization of statistical privacy and utility. In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 147–158 (2010)
10.
Zurück zum Zitat Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 202–210 (2003) Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 202–210 (2003)
11.
Zurück zum Zitat Finster, S., Baumgart, I.: Privacy-aware smart metering: a survey. IEEE Commun. Surv. Tutor. 16, 1732–1745 (2014)CrossRef Finster, S., Baumgart, I.: Privacy-aware smart metering: a survey. IEEE Commun. Surv. Tutor. 16, 1732–1745 (2014)CrossRef
12.
Zurück zum Zitat Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3, 275–294 (2010)CrossRef Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3, 275–294 (2010)CrossRef
14.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115 (2007)
15.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 24 (2006) Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 24 (2006)
16.
Zurück zum Zitat Hamill, L.: Controlling smart devices in the home. Inf. Soc. 22, 241–249 (2006)CrossRef Hamill, L.: Controlling smart devices in the home. Inf. Soc. 22, 241–249 (2006)CrossRef
17.
Zurück zum Zitat Han, D.-M., Lim, J.-H.: Design and implementation of smart home energy management systems based on ZigBee. IEEE Trans. Consum. Electron. 56, 1417–1425 (2010)CrossRef Han, D.-M., Lim, J.-H.: Design and implementation of smart home energy management systems based on ZigBee. IEEE Trans. Consum. Electron. 56, 1417–1425 (2010)CrossRef
18.
Zurück zum Zitat Bai, X., Xing, L., Zhang, N., Wang, X., Liao, X., Li, T., et al.: Staying secure and unprepared: understanding and mitigating the security risks of Apple ZeroConf. In: IEEE Symposium on Security and Privacy (SP), pp. 655–674 (2016) Bai, X., Xing, L., Zhang, N., Wang, X., Liao, X., Li, T., et al.: Staying secure and unprepared: understanding and mitigating the security risks of Apple ZeroConf. In: IEEE Symposium on Security and Privacy (SP), pp. 655–674 (2016)
19.
Zurück zum Zitat Kaaz, K.J., Hoffer, A., Saeidi, M., Sarma, A., Bobba, R.B.: Understanding user perceptions of privacy, and configuration challenges in home automation. In: IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp. 297–301 (2017) Kaaz, K.J., Hoffer, A., Saeidi, M., Sarma, A., Bobba, R.B.: Understanding user perceptions of privacy, and configuration challenges in home automation. In: IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp. 297–301 (2017)
20.
Zurück zum Zitat Urban, J., Hoofnagle, C.: The privacy pragmatic as privacy vulnerable (2014) Urban, J., Hoofnagle, C.: The privacy pragmatic as privacy vulnerable (2014)
21.
Zurück zum Zitat McCallister, E., Grance, T., Scarfone, K.A.: Guide to protecting the confidentiality of personally identifiable information (PII) (2010) McCallister, E., Grance, T., Scarfone, K.A.: Guide to protecting the confidentiality of personally identifiable information (PII) (2010)
22.
Zurück zum Zitat Sanchez, I., Satta, R., Fovino, I.N., Baldini, G., Steri, G., Shaw, D., et al.: Privacy leakages in Smart Home wireless technologies. In: International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014) Sanchez, I., Satta, R., Fovino, I.N., Baldini, G., Steri, G., Shaw, D., et al.: Privacy leakages in Smart Home wireless technologies. In: International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014)
23.
Zurück zum Zitat Pappachan, P., Degeling, M., Yus, R., Das, A., Bhagavatula, S., Melicher, W., et al.: Towards privacy-aware smart buildings: capturing, communicating, and enforcing privacy policies and preferences. In: IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 193–198 (2017) Pappachan, P., Degeling, M., Yus, R., Das, A., Bhagavatula, S., Melicher, W., et al.: Towards privacy-aware smart buildings: capturing, communicating, and enforcing privacy policies and preferences. In: IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 193–198 (2017)
24.
Zurück zum Zitat Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE Symposium on Security and Privacy (SP), pp. 636–654 (2016) Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: IEEE Symposium on Security and Privacy (SP), pp. 636–654 (2016)
25.
Zurück zum Zitat Konidala, D.M., Kim, D.-Y., Yeun, C.-Y., Lee, B.-C.: Security framework for RFID-based applications in smart home environment. J. Inf. Process. Syst. 7, 111–120 (2011)CrossRef Konidala, D.M., Kim, D.-Y., Yeun, C.-Y., Lee, B.-C.: Security framework for RFID-based applications in smart home environment. J. Inf. Process. Syst. 7, 111–120 (2011)CrossRef
26.
Zurück zum Zitat Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: IEEE Conference on Communications and Network Security (CNS), pp. 79–84 (2014) Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: IEEE Conference on Communications and Network Security (CNS), pp. 79–84 (2014)
27.
Zurück zum Zitat Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167 (2015) Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167 (2015)
28.
Zurück zum Zitat Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uCLinux on the Blackfin DSP. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2007, pp. 1–8 (2007) Chattopadhyay, A., Boult, T.E.: PrivacyCam: a privacy preserving camera using uCLinux on the Blackfin DSP. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2007, pp. 1–8 (2007)
29.
Zurück zum Zitat Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Conference on Computer Vision and Pattern Recognition Workshop, CVPRW 2006, p. 160 (2006) Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Conference on Computer Vision and Pattern Recognition Workshop, CVPRW 2006, p. 160 (2006)
30.
Zurück zum Zitat Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007) Baaziz, N., Lolo, N., Padilla, O., Petngang, F.: Security and privacy protection for automated video surveillance. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 17–22 (2007)
31.
Zurück zum Zitat Tansuriyavong, S., Hanaki, S.-i.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the 2001 Workshop on Perceptive User Interfaces, pp. 1–4 (2001) Tansuriyavong, S., Hanaki, S.-i.: Privacy protection by concealing persons in circumstantial video image. In: Proceedings of the 2001 Workshop on Perceptive User Interfaces, pp. 1–4 (2001)
32.
Zurück zum Zitat Hossain, H.S., Khan, M.A.A.H., Roy, N.: Active learning enabled activity recognition. Pervasive Mob. Comput. 38, 312–330 (2017)CrossRef Hossain, H.S., Khan, M.A.A.H., Roy, N.: Active learning enabled activity recognition. Pervasive Mob. Comput. 38, 312–330 (2017)CrossRef
Metadaten
Titel
The Automatic Detection of Sensitive Data in Smart Homes
verfasst von
Mahsa Keshavarz
Mohd Anwar
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22351-9_27