Skip to main content

Enforcing Data Privacy in the Age of Google Glass

  • Conference paper
  • First Online:
ISSE 2014 Securing Electronic Business Processes

Abstract

While in many cases wearable devices (involving the incorporation of computers/electronics into clothing and accessories) using all kind of different sensors may enhance our live, there is one big downside: the many privacy issues that spring out of the widespread use of wearable technology.

Here, it is necessary to distinguish between two cases: In the first case, one considers the privacy of data that a person captures about himself (quantified-self, i.e. self- tracking). The person wants to protect the data from unauthorized access or manipulation or would like to release its own data in a controlled manner. On the other side one considers the scenario that the person is captured by wearable devices of other persons, often without his/her consent or knowledge (e.g. someone films you with Google glass). We focus on this second case.

In an ideal world, every individual can formulate his/her requirements on data privacy in the context of wearable devices in a simple and efficient way which would automatically be read, respected and implemented by capturing devices (e.g. if you define that you do not want to be captured during your exercises, Google glass should not be able to film you in the gym).

Here we discuss new approaches to formulate and enforce appropriate data privacy policies. An important point is to consider the individual and situation-based context of the person exposed to someone else’s sensors. We propose simple technologies that could easily be used by any person to indicate his/her requirements to capturing devices and we describe components of wearable devices, which should guarantee the compliance against the situation-based requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • [AbDB99] G.D. Abowd, A.K. Day, P.J. Brown: Towards a better understanding of context and context- awareness”. In Handheld and ubiquitous computing. Springer, 1999, pp. 304–307

    Google Scholar 

  • [BDE+08] M. Blount, J. Davis, M. Ebling, W. Jerome, B. Leiba, Xuan Liu, A. Misra: Privacy engine for context-aware enterprise application services. Iin Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on, vol. 2. IEEE, 2008, pp. 94–100.

    Google Scholar 

  • [BHV+12] W. Bokhove, B. Hulsebosch, B. Van Schoonhoven, M. Sappelli, and K. Wouters: User privacy in applications for well-being and wellworking. In AMBIENT 2012, The Second International Conference on Ambient Computing, Applications, Services and Technologies, 2012, pp. 53–59.

    Google Scholar 

  • [BKS+01] K. Bohrer, X. Liu, D. Kesdogan, E. Schonberg, M. Singh and S. L. Spraragen: Personal Information Management and Distribution. In: The Fourth International Conference on Electronic Commerce Research (ICECR-4), Dallas, 2001

    Google Scholar 

  • [BuNP10] L. Bussard, G. Neven, F.-S. Preiss: Downstream Usage Control. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), Washington, 2010

    Google Scholar 

  • [GhJFJ12] Dibyajyoti Ghosh, Anupam Joshi, Tim Finin and Pramod Jagtap: Privacy control in smart phones using semantically. In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, 2012

    Google Scholar 

  • [HeBo00] H. Res and J. Borking: Privacy Enhancing Technologies: The Path to Anonymity. In Registratiekamer The Netherlands VolumeII, August 1995.

    Google Scholar 

  • [Hust10] Peter Hustinx: Privacy by design: delivering the promises. Identity in the Information Society, Volume 3, Issue 2, August 2010, pp 253-255,

    Google Scholar 

  • [InIn03] Stephen S. Intille and Amy M. Intille: New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries. MIT House_n Technical Report. September 15, 2003

    Google Scholar 

  • [Levin97] R. Levinson: The planning and execution assistant and trainer (PEAT). The Journal of Head Trauma Rehabilitation, 1997

    Google Scholar 

  • [Mann12] Steve Mann: Wearable Computing. In: The Encyclopedia of Human-Computer Interaction, 2 nded. Editor: Mads Soegaard and Rikke Friis Dam, 2012, http://www.interactiondesign.org/encyclopedia/wearable_computing.html

  • [Math14] Roland Mathys: Legal Challenges of Wearable Computing. Conference paper ITechLaw World Conference, 15. Mai 2014

    Google Scholar 

  • [McPo02] C. E. McCarthy and M. E. Pollack: A plan-based personalized cognitive orthotic. In Proceedings of the Sixth International Conference on Artificial Intelligence Planning Systems, M. Ghallab, J. Hertzberg, and P. Traverso, Eds.: AAAI Press, 2002, pp. 243-252.

    Google Scholar 

  • [PGDS06] A. Pentland, J. Gips, W. Dong, W. Stoltzman: Human Computing for Interactive Digital Media. In: MULTIMEDIA ’06 Proceedings of the 14th Annual ACM International Conference on Multimedia, New York, 2006

    Google Scholar 

  • [SaEN05] V. Sacramento, M. Endler, and F. N. Nascimento: A privacy service for context-aware mobile computing. In Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on. IEEE, 2005, pp. 182–193.

    Google Scholar 

  • [SaSt14] Riccardo Satta and Pasquale Stirparo: On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts. In 9th International Conference on Computer Vision Theory and Applications (VISAPP), 2014)

    Google Scholar 

  • [Stati14] Statista: Google Glass annual sales forecast from 2014 to 2018. 2 May 2014 http://www.statista.com/statistics/259348/google-glassannual-sales-forecast/

  • [WaBr90] Warren, Samuel, Brandeis, Louis: The right to privacy. Harvard Law Review, 1890

    Google Scholar 

  • [Welc14] Peter Welchering: Das Stromnetz verrät nicht nur Kriminelle. In F.A.Z. Frankfurter Allgemeine Zeitung Online-Archiv, Seitenüberschrift: Technik und Motor Ressort: Techn 01.07.2014

    Google Scholar 

  • [West70] A. Westin: Privacy and freedom. New York: Atheneum, 1970

    Google Scholar 

  • [Whit04] J. Whitman: The two western cultures of privacy: Dignity v liberty, Yale Law Journal, Volume 113 Issue 1151 Page 1161, 2004

    Google Scholar 

  • [WiHI07] R. Wishart, K. Henricksen, and J. Indulska: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In Ubiquitous Intelligence and Computing. Springer, 2007, pp. 929–940.

    Google Scholar 

  • [YouG13] YouGov: Would you feel comfortable interacting with someone wearing Google Glasses? http://www.statista.com/statistics/259368/likelihood-ofbuying-and-wearing-google-glasses/, 2 May 2013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Thiel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Fachmedien Wiesbaden

About this paper

Cite this paper

Thiel, C., Thiel, C. (2014). Enforcing Data Privacy in the Age of Google Glass. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2014 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-06708-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-06708-3_18

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-06707-6

  • Online ISBN: 978-3-658-06708-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics