Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2991561.2991577acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotConference Proceedingsconference-collections
research-article

Secure Personal Memory-Sharing with Co-located People and Places

Published: 07 November 2016 Publication History
  • Get Citation Alerts
  • Abstract

    The abundance of interconnected devices in the Internet of Things (IoT) offers a powerful vision on how automated capture systems can aid humans remember their lives better. Already today, mobile and wearable devices allow people to create rich logs of their daily experiences in the form of photos, videos, GPS traces, or even physiological data. This activity is often called "lifelogging", and has led to the so-called "quantified self" movement where people capture detailed traces of their everyday lives in order to better understand themselves. An interesting avenue to explore in this context is the possibility of capturing lifelog data for the sake of augmenting one's memory. Contemporary psychology theory suggests that captured experiences of daily events can be used to generate cues (hints) which, when reviewed, can improve subsequent long-term recall of these memories. However, limitations of on-body placement of wearable devices can yield poor quality data and restricts capture to a first-person perspective. The focus of this work is to enable the secure and automatic exchange of one's lifelog streams with both co-located peers and any available capture devices in an IoT infrastructure, in order to construct a more comprehensive representation of a previous experience, which can thus help one to create more effective cues. We present a privacy-aware architecture for this exchange and report on a proof-of-concept prototype implementation.

    References

    [1]
    Vannevar Bush. 1967. As we may think. The growth of knowledge: readings on organization and retrieval of information (1967), 23--35.
    [2]
    Daragh Byrne, Aisling Kelliher, and Gareth J.F. Jones. 2011. Life Editing: Third-party Perspectives on Lifelog Content. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 1501--1510.
    [3]
    Sarah Clinch, Nigel Davies, Mateusz Mikusz, Paul Metzger, Marc Langheinrich, Albrecht Schmidt, and Geoff Ward. The Big Picture: Lessons Learned from Collecting Shared Experiences through Lifelogging. (????). http://www.research.lancs.ac.uk/portal/services/downloadRegister/106871999/PC_PC_2015_02_0011.R1_Clinch.pdf
    [4]
    Sarah Clinch, Paul Metzger, and Nigel Davies. 2014. Lifelogging for 'Observer' View Memories: An Infrastructure Approach. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 1397--1404.
    [5]
    N. Davies, A. Friday, S. Clinch, C. Sas, M. Langheinrich, G. Ward, and A. Schmidt. 2015. Security and Privacy Implications of Pervasive Memory Augmentation. IEEE Pervasive Computing 14, 1 (Jan. 2015), 44--53.
    [6]
    Yevgeniy Dodis and Nelly Fazio. 2002. Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management, Joan Feigenbaum (Ed.). Number 2696 in Lecture Notes in Computer Science. Springer Berlin Heidelberg, 61--80. http://link.springer.com/chapter/10.1007/978-3-540-44993-5_5
    [7]
    A. Fathi, J. K. Hodgins, and J. M. Rehg. 2012. Social interactions: A first-person perspective. In 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1226--1233.
    [8]
    Jim Gemmell, Gordon Bell, and Roger Lueder. 2006. MyLifeBits: A Personal Database for Everything. Commun. ACM 49, 1 (Jan. 2006), 88--95.
    [9]
    Jim Gemmell, Lyndsay Williams, Ken Wood, Roger Lueder, and Gordon Bell. 2004. Passive Capture and Ensuing Issues for a Personal Lifetime Store. In Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (CARPE'04). ACM, New York, NY, USA, 48--55.
    [10]
    Martin Georgiev and Vitaly Shmatikov. 2016. Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. arXiv:1604.02734 {cs} (April 2016). http://arxiv.org/abs/1604.02734 arXiv: 1604.02734.
    [11]
    Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645 --1660. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications -- Big Data, Scalable Analytics, and Beyond.
    [12]
    Isam Ishaq, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman, and Piet Demeester. 2013. IETF Standardization in the Field of the Internet of Things (IoT): A Survey. Journal of Sensor and Actuator Networks 2, 2 (2013), 235.
    [13]
    M Victoria Moreno, Miguel A Zamora, and Antonio F Skarmeta. 2015. An IoT based framework for user--centric smart building services. International Journal of Web and Grid Services 11, 1 (2015), 78--101.
    [14]
    Toshiya Nakakura, Yasuyuki Sumi, and Toyoaki Nishida. 2009. Neary: Conversation Field Detection Based on Similarity of Auditory Situation. In Proceedings of the 10th Workshop on Mobile Computing Systems and Applications (HotMobile '09). ACM, New York, NY, USA, 14:1--14:6.
    [15]
    Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios V Vasilakos, Julie A McCann, and Kin K Leung. 2013. A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications 20, 6 (2013), 91--98.
    [16]
    Wai-Tian Tan, Mary Baker, Bowon Lee, and Ramin Samadani. 2013. The Sound of Silence. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13). ACM, New York, NY, USA, 19:1--19:14.
    [17]
    Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, and Petteri Nurmi. 2015. Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. Selected Papers from the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014) 16, Part B (Jan. 2015), 187--204.
    [18]
    Chenren Xu, Sugang Li, Gang Liu, Yanyong Zhang, Emiliano Miluzzo, Yih-Farn Chen, Jun Li, and Bernhard Firner. 2013. Crowd++: Unsupervised Speaker Count with Smartphones. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '13). ACM, New York, NY, USA, 43--52.

    Cited By

    View all
    • (2023)Open Datasets in Human Activity Recognition Research—Issues and Challenges: A ReviewIEEE Sensors Journal10.1109/JSEN.2023.331764523:22(26952-26980)Online publication date: 15-Nov-2023
    • (2019)Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach2019 IEEE International Conference on Pervasive Computing and Communications (PerCom10.1109/PERCOM.2019.8767389(1-10)Online publication date: Mar-2019
    • (2018)MemstoneProceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/3229434.3229477(1-13)Online publication date: 3-Sep-2018
    • Show More Cited By

    Index Terms

    1. Secure Personal Memory-Sharing with Co-located People and Places
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            IoT '16: Proceedings of the 6th International Conference on the Internet of Things
            November 2016
            186 pages
            ISBN:9781450348140
            DOI:10.1145/2991561
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            In-Cooperation

            • Universität Stuttgart: Universität Stuttgart

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 07 November 2016

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. Co-located people
            2. Infrastructure camera
            3. Lifelogging
            4. Memory augmentation
            5. Privacy
            6. Security
            7. Sharing
            8. Wearables

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Funding Sources

            Conference

            IoT'16

            Acceptance Rates

            Overall Acceptance Rate 28 of 84 submissions, 33%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)9
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 09 Aug 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2023)Open Datasets in Human Activity Recognition Research—Issues and Challenges: A ReviewIEEE Sensors Journal10.1109/JSEN.2023.331764523:22(26952-26980)Online publication date: 15-Nov-2023
            • (2019)Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach2019 IEEE International Conference on Pervasive Computing and Communications (PerCom10.1109/PERCOM.2019.8767389(1-10)Online publication date: Mar-2019
            • (2018)MemstoneProceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/3229434.3229477(1-13)Online publication date: 3-Sep-2018
            • (2017)Can Less be More?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/30900861:2(1-22)Online publication date: 30-Jun-2017
            • (2017)Satya Revisits "Pervasive Computing: Vision and Challenges"IEEE Pervasive Computing10.1109/MPRV.2017.294096516:3(20-23)Online publication date: 1-Jan-2017
            • (2017)Pervasive Data ScienceIEEE Pervasive Computing10.1109/MPRV.2017.294095616:3(50-58)Online publication date: 1-Jan-2017

            View Options

            Get Access

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media