Abstract
While in many cases wearable devices (involving the incorporation of computers/electronics into clothing and accessories) using all kind of different sensors may enhance our live, there is one big downside: the many privacy issues that spring out of the widespread use of wearable technology.
Here, it is necessary to distinguish between two cases: In the first case, one considers the privacy of data that a person captures about himself (quantified-self, i.e. self- tracking). The person wants to protect the data from unauthorized access or manipulation or would like to release its own data in a controlled manner. On the other side one considers the scenario that the person is captured by wearable devices of other persons, often without his/her consent or knowledge (e.g. someone films you with Google glass). We focus on this second case.
In an ideal world, every individual can formulate his/her requirements on data privacy in the context of wearable devices in a simple and efficient way which would automatically be read, respected and implemented by capturing devices (e.g. if you define that you do not want to be captured during your exercises, Google glass should not be able to film you in the gym).
Here we discuss new approaches to formulate and enforce appropriate data privacy policies. An important point is to consider the individual and situation-based context of the person exposed to someone else’s sensors. We propose simple technologies that could easily be used by any person to indicate his/her requirements to capturing devices and we describe components of wearable devices, which should guarantee the compliance against the situation-based requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
[AbDB99] G.D. Abowd, A.K. Day, P.J. Brown: Towards a better understanding of context and context- awareness”. In Handheld and ubiquitous computing. Springer, 1999, pp. 304–307
[BDE+08] M. Blount, J. Davis, M. Ebling, W. Jerome, B. Leiba, Xuan Liu, A. Misra: Privacy engine for context-aware enterprise application services. Iin Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on, vol. 2. IEEE, 2008, pp. 94–100.
[BHV+12] W. Bokhove, B. Hulsebosch, B. Van Schoonhoven, M. Sappelli, and K. Wouters: User privacy in applications for well-being and wellworking. In AMBIENT 2012, The Second International Conference on Ambient Computing, Applications, Services and Technologies, 2012, pp. 53–59.
[BKS+01] K. Bohrer, X. Liu, D. Kesdogan, E. Schonberg, M. Singh and S. L. Spraragen: Personal Information Management and Distribution. In: The Fourth International Conference on Electronic Commerce Research (ICECR-4), Dallas, 2001
[BuNP10] L. Bussard, G. Neven, F.-S. Preiss: Downstream Usage Control. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), Washington, 2010
[GhJFJ12] Dibyajyoti Ghosh, Anupam Joshi, Tim Finin and Pramod Jagtap: Privacy control in smart phones using semantically. In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, 2012
[HeBo00] H. Res and J. Borking: Privacy Enhancing Technologies: The Path to Anonymity. In Registratiekamer The Netherlands VolumeII, August 1995.
[Hust10] Peter Hustinx: Privacy by design: delivering the promises. Identity in the Information Society, Volume 3, Issue 2, August 2010, pp 253-255,
[InIn03] Stephen S. Intille and Amy M. Intille: New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries. MIT House_n Technical Report. September 15, 2003
[Levin97] R. Levinson: The planning and execution assistant and trainer (PEAT). The Journal of Head Trauma Rehabilitation, 1997
[Mann12] Steve Mann: Wearable Computing. In: The Encyclopedia of Human-Computer Interaction, 2 nded. Editor: Mads Soegaard and Rikke Friis Dam, 2012, http://www.interactiondesign.org/encyclopedia/wearable_computing.html
[Math14] Roland Mathys: Legal Challenges of Wearable Computing. Conference paper ITechLaw World Conference, 15. Mai 2014
[McPo02] C. E. McCarthy and M. E. Pollack: A plan-based personalized cognitive orthotic. In Proceedings of the Sixth International Conference on Artificial Intelligence Planning Systems, M. Ghallab, J. Hertzberg, and P. Traverso, Eds.: AAAI Press, 2002, pp. 243-252.
[PGDS06] A. Pentland, J. Gips, W. Dong, W. Stoltzman: Human Computing for Interactive Digital Media. In: MULTIMEDIA ’06 Proceedings of the 14th Annual ACM International Conference on Multimedia, New York, 2006
[SaEN05] V. Sacramento, M. Endler, and F. N. Nascimento: A privacy service for context-aware mobile computing. In Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on. IEEE, 2005, pp. 182–193.
[SaSt14] Riccardo Satta and Pasquale Stirparo: On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts. In 9th International Conference on Computer Vision Theory and Applications (VISAPP), 2014)
[Stati14] Statista: Google Glass annual sales forecast from 2014 to 2018. 2 May 2014 http://www.statista.com/statistics/259348/google-glassannual-sales-forecast/
[WaBr90] Warren, Samuel, Brandeis, Louis: The right to privacy. Harvard Law Review, 1890
[Welc14] Peter Welchering: Das Stromnetz verrät nicht nur Kriminelle. In F.A.Z. Frankfurter Allgemeine Zeitung Online-Archiv, Seitenüberschrift: Technik und Motor Ressort: Techn 01.07.2014
[West70] A. Westin: Privacy and freedom. New York: Atheneum, 1970
[Whit04] J. Whitman: The two western cultures of privacy: Dignity v liberty, Yale Law Journal, Volume 113 Issue 1151 Page 1161, 2004
[WiHI07] R. Wishart, K. Henricksen, and J. Indulska: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In Ubiquitous Intelligence and Computing. Springer, 2007, pp. 929–940.
[YouG13] YouGov: Would you feel comfortable interacting with someone wearing Google Glasses? http://www.statista.com/statistics/259368/likelihood-ofbuying-and-wearing-google-glasses/, 2 May 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Fachmedien Wiesbaden
About this paper
Cite this paper
Thiel, C., Thiel, C. (2014). Enforcing Data Privacy in the Age of Google Glass. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2014 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-06708-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-658-06708-3_18
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-06707-6
Online ISBN: 978-3-658-06708-3
eBook Packages: Computer ScienceComputer Science (R0)