IoT Privacy Risks Revealed
Abstract
:1. Introduction
- Empowering users with enhanced privacy awareness: By integrating the Personalized Privacy Assistant (UTCID PPA) and UTCID PrivacyCheck™, this research offers users unprecedented insight into the connections established by IoT devices and the associated entropy of privacy incident consequences and resulting risks. This heightened awareness empowers users to make informed decisions about their privacy, thereby promoting digital autonomy, agency, and self-determination.
- Streamlining privacy management processes: The proposed framework facilitates the seamless detection of IoT connections and automated evaluation of privacy policies, simplifying the otherwise cumbersome task of privacy management. By offering personalized recommendations based on real-time assessments, users can efficiently reduce entropy of privacy incident consequences, mitigate privacy risks, and maintain control over their personal data across diverse IoT interactions.
- Contributing to the evolution of privacy-enhancing technologies: Through its innovative integration of machine learning and the privacy policy analysis tool PrivacyCheck™, as well as the empirical study and computation modeling of personal data values and risk exposures in the UTCID IoT Identity Ecosystem, this research advances the frontier of privacy-enhancing technologies. By addressing critical challenges such as privacy policy transparency, user awareness, and the privacy risks associated with the exposure of specific personal data, the proposed UTCID PPA sets a precedent for future developments in user-centric privacy management solutions, driving progress towards a more privacy-respecting digital landscape.
2. Related Work
2.1. Devices and Privacy
2.2. Privacy Risk Assessment
2.3. Privacy Assistant
2.4. Summary
3. UTCID Personalized Privacy Assistant with UTCID PrivacyCheck™ Risk Assessment
3.1. UTCID PPA Detects IoT Devices and Apps
3.2. UTCID PPA Finds the Identity Attributes Collected by IoT Devices or Apps
- What users KNOW (e.g., name, address, mother’s maiden name),
- What users HAVE (e.g., assigned credit card, SSN card),
- What users ARE (e.g., physical biometrics such as fingerprint or photographs), and
- What users DO (e.g., patterns of life such as geolocation patterns, website visit patterns, shopping patterns).
3.3. UTCID PPA Assesses IoT Device or App Privacy Risks from Identity Attributes
3.4. UTCID PPA Assesses IoT Device or App Privacy Risks from Privacy Policies
4. Evaluation
Comparison between Personalized Privacy Assistants
- Multiple Recommendation Sources: Potential biases were noticed in recommendations from personal privacy assistants by users, and users expressed they preferred the ability to select preferred recommendation sources to mitigate these biases.
- Crowd-Sourced: Participants found recommendations based on real users’ opinions and social cues to be valuable.
- Authoritative Sources: Users regarded recommendations from expert opinions, manufacturers, and independent organizations as trustworthy.
- Trusted Location Filtering: Incorporating a “trusted location” feature to filter out unnecessary notifications about devices in familiar locations was suggested to enhance user experience.
- Setting Configuration: Users favored a setting configuration feature that allowed them to make decisions about device interactions and revisit these decisions periodically or as preferences change.
- Explanations of Risks and Benefits: Participants stressed the need for clear explanations of the risks, benefits, and consequences of data collection to make informed decisions.
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
DNS | Domain Name System |
IoT | Internet of Things |
IRR | IoT Resource Registry |
ITAP | Identity Threat Assessment and Prediction |
NLP | Natural Language Processing |
PII | Personally Identifiable Information |
PPA | Personal Privacy Assistant |
UTCID | University of Texas at Austin Center for Identity |
References
- Milne, G.R.; Culnan, M.J. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. J. Interact. Mark. 2004, 18, 15–29. [Google Scholar] [CrossRef]
- Reardon, J.; Feal, Á.; Wijesekera, P.; On, A.E.B.; Vallina-Rodriguez, N.; Egelman, S. 50 ways to leak your data: An exploration of apps’ circumvention of the android permissions system. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 603–620. [Google Scholar]
- Shipp, L.; Blasco, J. How private is your period?: A systematic analysis of menstrual app privacy policies. Proc. Priv. Enhancing Technol. 2020, 2020, 491–510. [Google Scholar] [CrossRef]
- He, Y.; Yang, X.; Hu, B.; Wang, W. Dynamic privacy leakage analysis of Android third-party libraries. J. Inf. Secur. Appl. 2019, 46, 259–270. [Google Scholar] [CrossRef]
- Alazab, M.; Alazab, M.; Shalaginov, A.; Mesleh, A.; Awajan, A. Intelligent mobile malware detection using permission requests and API calls. Future Gener. Comput. Syst. 2020, 107, 509–521. [Google Scholar] [CrossRef]
- Liu, X.; Liu, J.; Zhu, S.; Wang, W.; Zhang, X. Privacy risk analysis and mitigation of analytics libraries in the android ecosystem. IEEE Trans. Mob. Comput. 2019, 19, 1184–1199. [Google Scholar] [CrossRef]
- Au, K.; Zhou, Y.; Huang, Z.; Gill, P.; Lie, D. Short paper: A look at smartphone permission models. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, 17 October 2011. [Google Scholar] [CrossRef]
- Felt, A.P.; Chin, E.; Hanna, S.; Song, D.; Wagner, D. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 17–21 October 2011; Association for Computing Machinery: New York, NY, USA, 2011. CCS ’11. pp. 627–638. [Google Scholar] [CrossRef]
- Zaeem, R.N.; German, R.L.; Barber, K.S. PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. ACM Trans. Internet Technol. 2018, 18, 1–18. [Google Scholar] [CrossRef]
- Nokhbeh Zaeem, R.; Barber, K.S. A study of web privacy policies across industries. J. Inf. Priv. Secur. 2017, 13, 169–185. [Google Scholar] [CrossRef]
- Zaeem, R.N.; Barber, K.S. The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Trans. Manag. Inf. Syst. 2020, 12, 1–20. [Google Scholar] [CrossRef]
- O’Loughlin, K.; Neary, M.; Adkins, E.C.; Schueller, S.M. Reviewing the data security and privacy policies of mobile apps for depression. Internet Interv. 2019, 15, 110–115. [Google Scholar] [CrossRef] [PubMed]
- Harkous, H.; Fawaz, K.; Lebret, R.; Schaub, F.; Shin, K.G.; Aberer, K. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 531–548. [Google Scholar]
- Zuo, C.; Lin, Z.; Zhang, Y. Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 1296–1310. [Google Scholar]
- Das, A.; Degeling, M.; Smullen, D.; Sadeh, N. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Comput. 2018, 17, 35–46. [Google Scholar] [CrossRef]
- Feng, Y.; Yao, Y.; Sadeh, N. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, Virtual, 8–13 May 2021; Association for Computing Machinery: New York, NY, USA, 2021. CHI ’21. [Google Scholar] [CrossRef]
- Ayci, G.; Sensoy, M.; ÖzgÜr, A.; Yolum, P. A Self-aware Personal Assistant for Making Personalized Privacy Decisions. arXiv 2022, arXiv:2205.06544. [Google Scholar]
- Stöver, A.; Hahn, S.; Kretschmer, F.; Gerber, N. Investigating How Users Imagine Their Personal Privacy Assistant. Proc. Priv. Enhancing Technol. 2023, 2, 384–402. [Google Scholar] [CrossRef]
- Chang, K.C.; Nokhbeh Zaeem, R.; Barber, K.S. Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information. In Proceedings of the 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 28–31 October 2020; pp. 256–262. [Google Scholar] [CrossRef]
- Chang, K.C.; Barber, S. Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things. Entropy 2023, 25, 717. [Google Scholar] [CrossRef] [PubMed]
- Chang, K.C.; Zaeem, R.N.; Barber, K.S. Internet of Things: Securing the identity by analyzing ecosystem models of devices and organizations. In Proceedings of the 2018 AAAI Spring Symposium Series, Palo Alto, CA, USA, 26–28 March 2018. [Google Scholar]
- Carrez, F.; Elsaleh, T.; Gómez, D.; Sánchez, L.; Lanza, J.; Grace, P. A Reference Architecture for federating IoT infrastructures supporting semantic interoperability. In Proceedings of the 2017 European Conference on Networks and Communications (EuCNC), Oulu, Finland, 12–15 June 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Anthopoulos, L.G. Understanding the Smart City Domain: A Literature Review. In Transforming City Governments for Successful Smart Cities; Rodríguez-Bolívar, M.P., Ed.; Springer International Publishing: Cham, Germany, 2015; pp. 9–21. [Google Scholar] [CrossRef]
- Schaffers, H.; Komninos, N.; Pallot, M.; Trousse, B.; Nilsson, M.; Oliveira, A. Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation; Springer Berlin Heidelberg Publisher: Heidelberg, Germany, 2011; pp. 431–446. [Google Scholar]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- Zaiss, J.; Nokhbeh Zaeem, R.; Barber, K.S. Identity Threat Assessment and Prediction. J. Consum. Aff. 2019, 53, 58–70. [Google Scholar] [CrossRef]
- Zaeem, R.N.; Manoharan, M.; Yang, Y.; Barber, K.S. Modeling and analysis of identity threat behaviors through text mining of identity theft stories. Comput. Secur. 2017, 65, 50–63. [Google Scholar] [CrossRef]
- Zaiss, J.; Anderson, R.; Zaeem, R.N.; Barber, K.S. ITAP Report 2019. 2019. Available online: https://identity.utexas.edu/2019-itap-report-0 (accessed on 1 February 2023).
- Chang, K.C.; Zaeem, R.N.; Barber, K.S. A Framework for Estimating Privacy Risk Scores of Mobile Apps. In Proceedings of the International Conference on Information Security, Bali, Indonesia, 16–18 December 2020; pp. 217–233. [Google Scholar]
- Regard, H. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data; OECD Guidelines. 2013. Available online: http://sec-law.co.il/images/2013-oecd-privacy-guidelines.pdf (accessed on 20 June 2024).
- Pitofsky, R.; Anthony, S.; Thompson, M.; Swindle, O.; Leary, T. Privacy Online: Fair Information Practices in the Electronic Marketplace; Statement of the Federal Trade Commission before the Committee on Commerce, Science and Transportation: Washington, DC, USA, 2000.
- Nokhbeh Zaeem, R.; Anya, S.; Issa, A.; Nimergood, J.; Rogers, I.; Shah, V.; Srivastava, A.; Barber, K.S. PrivacyCheck v2: A tool that recaps privacy policies for you. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management, Virtual Event, Ireland, 19–23 October 2020; pp. 3441–3444. [Google Scholar]
- Zaeem, R.N.; Ahbab, A.; Bestor, J.; Djadi, H.H.; Kharel, S.; Lai, V.; Wang, N.; Barber, K.S. PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies. In Proceedings of the 20th Workshop on Privacy in the Electronic Society (WPES 21), Virtual Event, Korea, 15 November 2021. [Google Scholar]
- Zaeem, R.N.; Barber, K.S. Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools. In Proceedings of the ICAART (2), Online, 4–6 February 2021; pp. 29–40. [Google Scholar]
- Zaeem, R.N.; Anya, S.; Issa, A.; Nimergood, J.; Rogers, I.; Shah, V.; Srivastava, A.; Barber, K.S. PrivacyCheck’s Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns. In Proceedings of the 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), Melbourne, Australia, 14–17 December 2020; pp. 291–298. [Google Scholar]
- Colnago, J.; Feng, Y.; Palanivel, T.; Pearman, S.; Ung, M.; Acquisti, A.; Cranor, L.F.; Sadeh, N. Informing the Design of a Personalized Privacy Assistant for the Internet of Things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA, 25–30 April 2020; Association for Computing Machinery: New York, NY, USA, 2020. CHI ’20. pp. 1–13. [Google Scholar] [CrossRef]
Category | Advantages | Gap |
---|---|---|
Devices and Privacy [2,3,4,5,6] | Concentrates on identifying actual data transmissions from mobile apps to third parties or instances of mobile apps accessing data. | Lacks provisions for user’s real-time preventive measures. Program analysis, which necessitates expert involvement, is performed offline, time-consuming, and costly. Detection of actual data transmission permits only reactive responses. Repercussions of transmitting personal data to third parties are not identified. |
Privacy Risk Assessment [7,8,9,10,11,12,13,14] | Analysis of privacy policies to evaluate compliance with governance and regulatory standards. | Does not address privacy risks posed by mobile apps. Omits assessment of direct privacy risks to users. |
Privacy Assistant [15,16,17,18] | Offers privacy setting recommendations to users tailored to their preferences. | Does not recommend settings based on the user’s privacy risk. Fails to explain why one identity attribute is more significant than another. |
PortNumbers | PowerFrequency | PowerUsage |
ProcessorType | Reputation | SerialNo |
ApplicationType | BusType | Cache |
CircuitDesign | Color | CookieWipe |
Symbol | Meaning |
---|---|
V | The set of identity attributes in the UTCID IoT Identity Ecosystem. |
The probability of exposure for identity attribute A. | |
The liability value for identity attribute A. | |
The set of ancestors for identity attribute A. | |
The set of descendants for identity attribute A. | |
The probability that identity attribute A gets exposed on its own after its ancestor is exposed. | |
The Accessibility for identity attribute A. | |
The Post Effect for identity attribute A. | |
The expected loss for identity attribute A. | |
The privacy risk score for identity attribute A. | |
The privacy risk score for IoT device S. |
App | Score (%) |
---|---|
Wiki | 43.63 |
Firefox Focus | 47.99 |
Kodi | 48.79 |
QsmFurthermore | 54.51 |
DuckDuckGo | 67.39 |
OpenVPN | 68.92 |
Signal Private Messenger | 69.32 |
Ted | 71.82 |
Blockchain Wallet | 73.67 |
Telegram | 73.99 |
User Control | Scores: 100% (Green) | Scores: 50% (Yellow) | Scores: 0% (Red) | |
---|---|---|---|---|
1 | How well does this website protect your email address? | Not asked for | Used for the intended service | Shared w/ third parties |
2 | How well does this website protect your credit card information and address? | Not asked for | Used for the intended service | Shared w/ third parties |
3 | How well does this website handle your Social Security number? | Not asked for | Used for the intended service | Shared w/ third parties |
4 | Does this website use or share your location? | PII not used for marketing | PII used for marketing | PII shared for marketing |
5 | Does this website track or share your location? | Not tracked | Used for the intended service | Shared w/ third parties |
6 | Does this website collect PII from children under 13? | Not collected | Not mentioned | Collected |
7 | Does this website share your information with law enforcement? | PII not recorded | Legal docs required | Legal docs not required |
8 | Does this website notify or allow you to opt out after changing their privacy policy? | Posted w/ opt-out option | Posted w/o opt-out option | Not posted |
9 | Does this website allow you to edit or delete your information from its record? | Edit/delete | Edit only | No edit/delete |
10 | Does this website collect or share aggregated data related to your identity or behavior? | Not aggregated | Aggregated w/o PII | Aggregated w/ PII |
GDPR | Scores: 100% (Green) | Scores: 0% (Red) | ||
1 | Does this website share the user’s information with other websites only upon user consent? | Yes | No/Unanswered | |
2 | Does this website disclose where the company is based/user’s PII will be processed and transferred? | Yes | No/Unanswered | |
3 | Does this website support the right to be forgotten? | Yes | No/Unanswered | |
4 | If they retain PII for legal purposes after the user’s request to be forgotten, will they inform the user? | Yes | No/Unanswered | |
5 | Does this website allow the user the ability to reject their usage of user’s PII? | Yes | No/Unanswered | |
6 | Does this website restrict the use of PII of children under the age of 16? | Yes | No/Unanswered | |
7 | Does this website advise the user that their data are encrypted even while at rest? | Yes | No/Unanswered | |
8 | Does this website ask for the user’s informed consent to perform data processing? | Yes | No/Unanswered | |
9 | Does this website implement all of the principles of data protection by design and by default? | Yes | No/Unanswered | |
10 | Does this website notify the user of security breaches without undo delay? | Yes | No/Unanswered |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chang, K.-C.; Niu, H.; Kim, B.; Barber, S. IoT Privacy Risks Revealed. Entropy 2024, 26, 561. https://doi.org/10.3390/e26070561
Chang K-C, Niu H, Kim B, Barber S. IoT Privacy Risks Revealed. Entropy. 2024; 26(7):561. https://doi.org/10.3390/e26070561
Chicago/Turabian StyleChang, Kai-Chih, Haoran Niu, Brian Kim, and Suzanne Barber. 2024. "IoT Privacy Risks Revealed" Entropy 26, no. 7: 561. https://doi.org/10.3390/e26070561
APA StyleChang, K. -C., Niu, H., Kim, B., & Barber, S. (2024). IoT Privacy Risks Revealed. Entropy, 26(7), 561. https://doi.org/10.3390/e26070561