Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2802130.2802137acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

For Your Eyes Only

Published: 11 September 2015 Publication History
  • Get Citation Alerts
  • Abstract

    As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals' movements to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT. While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito, a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences will see enhanced user engagement.

    References

    [1]
    Natasha Singer. F.T.C. says internet-connected devices pose big risks. The New York Times, Jan 2015. http://nyti.ms/1MPWgby.
    [2]
    The Economist. The internet of things (to be hacked), July 2014. http://econ.st/1FQ3A1Y.
    [3]
    Joseph Turow. The daily you: How the new advertising industry is defining your identity and your worth. Yale University Press, 2012.
    [4]
    Lori Andrews. Facebook is using you. The New York Times, Feb 2012. http://nyti.ms/1GGOG46.
    [5]
    David Meyer. Samsung invests in internet of things identity management platform evrythng, Oct. 2014. http://bit.ly/1JoTivU.
    [6]
    Hans Gellersen, Michael Beigl, and Albrecht Schmidt. Sensor-based context-awareness for situated computing. In Proc. of Workshop on Software Engineering for Wearable and Pervasive Computing., 2000.
    [7]
    Martin Azizyan, Ionut Constandache, and Romit Roy Choudhury. Surroundsense: mobile phone localization via ambience fingerprinting. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 261--272. ACM, 2009.
    [8]
    Yohan Chon, Nicholas D Lane, Fan Li, Hojung Cha, and Feng Zhao. Automatically characterizing places with opportunistic crowdsensing using smartphones. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 481--490. ACM, 2012.
    [9]
    Ming Lei, Xiaoyan Hong, and Susan V Vrbsky. Protecting location privacy with dynamic mac address exchanging in wireless networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE, pages 49--53. IEEE, 2007.
    [10]
    Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. On the age of pseudonyms in mobile ad hoc networks. In INFOCOM, 2010 Proceedings IEEE, pages 1--9. IEEE, 2010.
    [11]
    Rongxing Lu, Xiaodong Li, Tom H Luan, Xiaohui Liang, and Xuemin Shen. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. Vehicular Technology, IEEE Transactions on, 61(1):86--96, 2012.
    [12]
    Parikshit N Mahalle, Bayu Anggorojati, Neeli R Prasad, and Ramjee Prasad. Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility, 1(4):309--348, 2013.
    [13]
    Qi He, Dapeng Wu, and Pradeep Khosla. The quest for personal control over mobile location privacy. Communications Magazine, IEEE, 42(5):130--136, 2004.
    [14]
    Uribeacon. http://uribeacon.io.
    [15]
    Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99--110. ACM, 2007.
    [16]
    Konstantinos Lampropoulos and Spyros Denazis. Identity management directions in future internet. Communications Magazine, IEEE, 49(12):74--83, 2011.
    [17]
    Sheikh Iqbal Ahamed, Farzana Rahman, and Endadul Hoque. Erap: Ecc based rfid authentication protocol. In Future Trends of Distributed Computing Systems, 2008. FTDCS'08. 12th IEEE International Workshop on, pages 219--225. IEEE, 2008.
    [18]
    Guanglei Zhao, Xianping Si, Jingcheng Wang, Xiao Long, and Ting Hu. A novel mutual authentication scheme for internet of things. In Modelling, Identification and Control (ICMIC), Proceedings of 2011 International Conference on, pages 563--566. IEEE, 2011.
    [19]
    nrf51822 bluetooth smart beacon kit. http://bit.ly/1L34QCz.
    [20]
    Apple. Getting started with ibeacon, 2014. http://apple.co/1MPb7CU.
    [21]
    Albert Bifet, Geoff Holmes, Bernhard Pfahringer, and Ricard Gavaldà. Mining frequent closed graphs on evolving data streams. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 591--599. ACM, 2011.
    [22]
    Hong Cheng, Xifeng Yan, and Jiawei Han. Mining graph patterns. In Managing and Mining Graph Data, pages 365--392. Springer, 2010.
    [23]
    Yu-Ru Lin, Jimeng Sun, Hari Sundaram, Aisling Kelliher, Paul Castro, and Ravi Konuru. Community discovery via metagraph factorization. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(3):17, 2011.

    Cited By

    View all
    • (2022)A Novel Privacy Preservation and Quantification Methodology for Implementing Home-Care-Oriented Movement Analysis SystemsSensors10.3390/s2213467722:13(4677)Online publication date: 21-Jun-2022
    • (2020)Macro and Exogenous Factors in Computational Advertising: Key Issues and New Research DirectionsJournal of Advertising10.1080/00913367.2020.181117949:4(377-393)Online publication date: 11-Sep-2020
    • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MCS '15: Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services
    September 2015
    56 pages
    ISBN:9781450335454
    DOI:10.1145/2802130
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 September 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bluetooth low energy
    2. identity
    3. internet of things
    4. privacy

    Qualifiers

    • Research-article

    Funding Sources

    • Google Focused Research Grant

    Conference

    MobiCom'15
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 8 of 12 submissions, 67%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Novel Privacy Preservation and Quantification Methodology for Implementing Home-Care-Oriented Movement Analysis SystemsSensors10.3390/s2213467722:13(4677)Online publication date: 21-Jun-2022
    • (2020)Macro and Exogenous Factors in Computational Advertising: Key Issues and New Research DirectionsJournal of Advertising10.1080/00913367.2020.181117949:4(377-393)Online publication date: 11-Sep-2020
    • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019
    • (2018)Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments2018 IEEE/ACM Symposium on Edge Computing (SEC)10.1109/SEC.2018.00020(174-186)Online publication date: Oct-2018
    • (2017)The connected carProceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/3098279.3098535(1-12)Online publication date: 4-Sep-2017
    • (2016)MASHaBLEProceedings of the 22nd Annual International Conference on Mobile Computing and Networking10.1145/2973750.2973778(387-400)Online publication date: 3-Oct-2016
    • (2016)Internet of Things data management in the cloud for Bluetooth Low Energy (BLE) devicesProceedings of the Third International Workshop on Adaptive Resource Management and Scheduling for Cloud Computing10.1145/2962564.2962568(35-39)Online publication date: 25-Jul-2016
    • (2016)CryptoCoPProceedings of the 2016 Workshop on Wearable Systems and Applications10.1145/2935643.2935647(7-12)Online publication date: 30-Jun-2016
    • (2016)Security and Privacy in Public IoT Spaces2016 25th International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2016.7568573(1-8)Online publication date: Aug-2016

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media