Taking Control of Household IoT Device Privacy
نویسندگان
چکیده
Household IoT devices are intended to collect information in the home, and interact with each other, to create powerful new applications that support our day-to-day activities. For example, a smart fridge detects when certain groceries are running out, and triggers a shopping console to order fresh supplies. Technical solutions can ascertain that the data used for such functionality are minimized [13, 20, 24], but arguably, any functionality requires at least some amount of personal data. Therefore, users will have to trade off privacy and functionality: a solution that is fully privacy preserving will be limited in functionality, while a fully functional IoT solution may require far-reaching data collection and communication. Each user may have a different personal preference on this privacy-functionality tradeoff continuum; the challenge is to have them pick a setting that is pareto-optimal, i.e., one that provides the highest level of privacy for a given level of functionality (and vice versa). This is a different data minimization challenge: not on the system side, but on the user side.
منابع مشابه
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications
The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملPoster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic
The increasing popularity of specialized Internetconnected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have always-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network obs...
متن کامل