Abstract
The use of wearable devices is growing exceptionally which helps the individuals to track their daily activities, habits, health status, etc. They are be-coming so powerful and affordable that in some cases replace the use of mobile devices. Users are not aware of the extent and quality of the data being collected by these devices and the inherent risk of data security and privacy violation. This research introduces a privacy aware layer built over a sample smartwatch OS to limit user data access through enforcement of user set privacy settings. Since the nature of wearable devices leaves little space for interaction between the device and users, we develop a interface to capture user’s privacy preference. Two user studies, one using the Tizen platform and one with the privacy protection layer, are performed to compare its effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Design for Wear OS [Internet]. https://developer.android.com/design/wear/. Accessed 26 Nov 2018
Design Principles|Tizen Developers [Internet]. https://developer.tizen.org/design/wearable/design-principles. Accessed 26 Nov 2018
HP Study [Internet]. https://www8.hp.com/us/en/hp-news/press-release.html?id=2037386#.Vi18G7crLIU. Accessed 19 Feb 2019
Aciicmez, O., Blaich, A.: Understanding the permissions and access control model for tizen application sandboxing (2012)
Anderson, A.: A Comparison of Two Privacy Policy Languages: EPAL and XACML. Sun Microsystems Inc., Santa Clara (2005)
Barker, K.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 2009. LNCS, vol. 5588, pp. 42–54. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02843-4_7
Ching, K.W., Singh, M.M.: Wearable technology devices security privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8(3), 19–26 (2016)
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceeedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012). ACM, New York (2012)
Gadyatskaya, O., Massacci, F., Zhauniarovich, Y.: Security in the firefox OS and Tizen mobile platforms. Computer 47(6), 57–63 (2014)
Ghazinour, K., Barker, K.: A privacy preserving model bridging data provider and collector preferences. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, Genoa, Italy, pp. 174–178, 18–22 March 2013
Ghazinour, K., Barker, K.: Capturing P3P semantics using an enforceable lattice-based structure. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, Uppsala, Sweden, pp. 1–6, 25 March 2011
Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference, vol. 2, pp. 335–340 (2009)
Im, B., Ware, R.: Tizen security overview. In: Tizen Developer Conference, May 2012. http://download.tizen.org/misc/media/conference2012/tuesday/ballroom-c/2012-05-08-1600-1640-tizen_security_framework_overview.pdf. Accessed 25 May 2018
Li, H., et al.: Examining individuals adoption’ of healthcare wearable devices: an empirical study from privacy calculus perspective. Int. J. Med. Inform. 88, 8–16 (2016)
Motti, V.G., Caine, K.: Users’ privacy concerns about wearables. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 231–244. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_17
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohzary, M., Tadisetty, S., Ghazinour, K. (2020). A Privacy Protection Layer for Wearable Devices. In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2019. Lecture Notes in Computer Science(), vol 12056. Springer, Cham. https://doi.org/10.1007/978-3-030-45371-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-45371-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45370-1
Online ISBN: 978-3-030-45371-8
eBook Packages: Computer ScienceComputer Science (R0)