Skip to main content

A Privacy Threat Model in XR Applications

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 47))

Abstract

A new visualization user experience is expected to be empowered with XR technologies. XR accommodates a wide range of computerized reality technology, such as AR (Augmented Reality), MR (Mixed Reality), and VR (Virtual Reality). XR is providing more immerse and entertaining user experience. The number of devices increases and it is leveraging a wide range of applications. As consumer XR applications start to grow, it is important to understand the privacy threats. The author describes privacy threats in XR. First, the author discusses privacy threat elements. Second, the author describes a 3-dimensional model of privacy threats in XR. It clarifies the XR-specific privacy threats in addition to other sensor API-enabled applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Desai, B.C.: IoT: imminent ownership threat. In: Proceedings of the 21st International Database Engineering & Applications Symposium, IDEAS 2017, pp. 82–89. ACM, New York (2017)

    Google Scholar 

  2. Dong, R., Ratliff, L.J., Cárdenas, A.A., Ohlsson, H., Sastry, S.S.: Quantifying the utility-privacy tradeoff in the internet of things. ACM Trans. Cyber Phys. Syst. 2(2), 8:1–8:28 (2018)

    Article  Google Scholar 

  3. Ferdous, M.S., Chowdhury, S., Jose, J.M.: Privacy threat model in lifelogging. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp 2016, pp. 576–581. ACM, New York (2016)

    Google Scholar 

  4. Jones, B., Waliczek, N.: WebXR device API. In: W3C Working Draft, 10 October 2019. https://www.w3.org/TR/2019/WD-webxr-20191010/

  5. Kettani, H., Cannistra, R.M.: On cyber threats to smart digital environments. In: Proceedings of the 2nd International Conference on Smart Digital Environment, ICSDE 2018, pp. 183–188. ACM, New York (2018)

    Google Scholar 

  6. Lebeck, K., Kohno, T., Roesner, F.: How to safely augment reality: challenges and directions. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, HotMobile 2016, pp. 45–50. ACM, New York (2016)

    Google Scholar 

  7. Moustaka, V., Theodosiou, Z., Vakali, A., Kounoudes, A.: Smart cities at risk!: privacy and security borderlines from social networking in cities. In: Companion Proceedings of the Web Conference 2018, WWW 2018, pp. 905–910. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2018)

    Google Scholar 

  8. Olejnik, L., Novak, J.: Self-review questionnaire: security and privacy, December 2018. https://w3ctag.github.io/security-questionnaire/

  9. Siby, S., Maiti, R.R., Tippenhauer, N.O.: IoTScanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS 2017, pp. 23–30. ACM, New York (2017)

    Google Scholar 

  10. Soh, L., Burke, J., Zhang, L.: Supporting augmented reality: looking beyond performance. In: Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, VR/AR Network 2018, pp. 7–12. ACM, New York (2018)

    Google Scholar 

  11. Waldron, R.: Generic sensor API, November 2018. https://w3c.github.io/sensors/#security-and-privacy

  12. Wuyts, K., Van Landuyt, D., Hovsepyan, A., Joosen, W.: Effective and efficient privacy threat modeling through domain refinements. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1175–1178. ACM, New York (2018)

    Google Scholar 

  13. Zhang, R., Zhang, N., Du, C., Lou, W., Hou, Y.T., Kawamoto, Y.: From electromyogram to password: exploring the privacy impact of wearables in augmented reality. ACM Trans. Intell. Syst. Technol. 9(1), 13:1–13:20 (2017)

    Google Scholar 

  14. Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents’ perception of mobile threats. In: Proceedings of the 15th International Conference on Interaction Design and Children, IDC 2016, pp. 388–399. ACM, New York (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toshihiko Yamakami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yamakami, T. (2020). A Privacy Threat Model in XR Applications. In: Barolli, L., Okada, Y., Amato, F. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-39746-3_40

Download citation

Publish with us

Policies and ethics