skip to main content
10.1145/2184489.2184510acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Sensor tricorder: what does that sensor know about me?

Published: 01 March 2011 Publication History

Abstract

As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.

References

[1]
Fair Information Practice Principles. http://www.ftc.gov/reports/privacy3/fairinfo.shtm.
[2]
IdM Policy Audit System. http://www.isoc.org/projects/idm_policy_audit_system.
[3]
P3P 1.1 Specification. http://www.w3.org/TR/P3P11/.
[4]
Xbox Kinect. http://www.xbox.com/en-US/kinect.
[5]
Zxing 1D/2D Barcode Image Processing Library. http://code.google.com/p/zxing.
[6]
ISO/IEC 18004: QR Code 2005 Bar Code Symbology Specification. Technical report, International Organization for Standardization, 2006.
[7]
S. A. Bagues, A. Zeidler, F. Valdivielso, and I. R. Matias. Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing. International Journal of Smart Home, 1, 2007.
[8]
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested Append-Only Memory: Making Adversaries Stick to Their Word. In SOSP, 2007.
[9]
S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis, and D. Avrahami. The Wi-Fi Privacy Ticker: Improving Awareness & Control of Personal Information Exposure on Wi-Fi. In Ubicomp, 2010.
[10]
S. A. Crosby and D. S. Wallach. Efficient Data Structures for Tamper-Evident Logging. In USENIX Security, 2009.
[11]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010.
[12]
J. Hong and J. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In MobiSys, 2004.
[13]
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing. In CCS, 2008.
[14]
H. Kato and K. T. Tan. Pervasive 2D Barcodes for Camera Phone Applications. IEEE Pervasive Computing.
[15]
P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder. A "Nutrition Label" for Privacy. In SOUPS, 2009.
[16]
P. G. Kelley, L. Cesca, J. Bresee, and L. F. Cranor. Standardizing Privacy Notices: an Online Study of the Nutrition Label Approach. In CHI, 2010.
[17]
M. Langheinrich. Privacy By Design -- Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp, 2001.
[18]
M. Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In Ubicomp, 2002.
[19]
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In IEEE Symposium on Security and Privacy, 2010.
[20]
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In EuroSys, 2008.
[21]
A. Mohan, G. Woo, S. Hiura, Q. Smithwick, and R. Raskar. Bokode: Imperceptible Visual Tags for Camera-based Interaction from a Distance. In ACM SIGGRAPH, 2009.
[22]
S. D. Perli, N. Ahmed, and D. Katabi. PixNet: LCD-camera Pairs as Communication Links. In ACM SIGCOMM, 2010.
[23]
B. Schneier and J. Kelsey. Secure Audit Logs to Support Computer Forensics. In ACM TISSEC, 1999.
[24]
E. Shi, A. Perrig, and L. V. Doorn. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In IEEE Symposium on Security and Privacy, 2005.

Cited By

View all
  • (2020)A User Study of a Wearable System to Enhance Bystanders’ Facial PrivacyIoT10.3390/iot10200131:2(198-217)Online publication date: 10-Oct-2020
  • (2018)FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of ThingsElectronics10.3390/electronics71203797:12(379)Online publication date: 3-Dec-2018
  • (2015)A design space for effective privacy noticesProceedings of the Eleventh USENIX Conference on Usable Privacy and Security10.5555/3235866.3235868(1-17)Online publication date: 22-Jul-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HotMobile '11: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
March 2011
103 pages
ISBN:9781450306492
DOI:10.1145/2184489
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

HotMobile '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 96 of 345 submissions, 28%

Upcoming Conference

HOTMOBILE '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)A User Study of a Wearable System to Enhance Bystanders’ Facial PrivacyIoT10.3390/iot10200131:2(198-217)Online publication date: 10-Oct-2020
  • (2018)FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of ThingsElectronics10.3390/electronics71203797:12(379)Online publication date: 3-Dec-2018
  • (2015)A design space for effective privacy noticesProceedings of the Eleventh USENIX Conference on Usable Privacy and Security10.5555/3235866.3235868(1-17)Online publication date: 22-Jul-2015
  • (2014)Do not share!Proceedings of the 1st ACM MobiCom workshop on Visible light communication systems10.1145/2643164.2643168(39-44)Online publication date: 7-Sep-2014
  • (2014)Security and privacy for augmented reality systemsCommunications of the ACM10.1145/2580723.258073057:4(88-96)Online publication date: 1-Apr-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media