skip to main content
10.1145/2802130.2802137acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

For Your Eyes Only

Authors Info & Claims
Published:11 September 2015Publication History

ABSTRACT

As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals' movements to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT. While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito, a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences will see enhanced user engagement.

References

  1. Natasha Singer. F.T.C. says internet-connected devices pose big risks. The New York Times, Jan 2015. http://nyti.ms/1MPWgby.Google ScholarGoogle Scholar
  2. The Economist. The internet of things (to be hacked), July 2014. http://econ.st/1FQ3A1Y.Google ScholarGoogle Scholar
  3. Joseph Turow. The daily you: How the new advertising industry is defining your identity and your worth. Yale University Press, 2012.Google ScholarGoogle Scholar
  4. Lori Andrews. Facebook is using you. The New York Times, Feb 2012. http://nyti.ms/1GGOG46.Google ScholarGoogle Scholar
  5. David Meyer. Samsung invests in internet of things identity management platform evrythng, Oct. 2014. http://bit.ly/1JoTivU.Google ScholarGoogle Scholar
  6. Hans Gellersen, Michael Beigl, and Albrecht Schmidt. Sensor-based context-awareness for situated computing. In Proc. of Workshop on Software Engineering for Wearable and Pervasive Computing., 2000.Google ScholarGoogle Scholar
  7. Martin Azizyan, Ionut Constandache, and Romit Roy Choudhury. Surroundsense: mobile phone localization via ambience fingerprinting. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 261--272. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yohan Chon, Nicholas D Lane, Fan Li, Hojung Cha, and Feng Zhao. Automatically characterizing places with opportunistic crowdsensing using smartphones. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 481--490. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ming Lei, Xiaoyan Hong, and Susan V Vrbsky. Protecting location privacy with dynamic mac address exchanging in wireless networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE, pages 49--53. IEEE, 2007.Google ScholarGoogle Scholar
  10. Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. On the age of pseudonyms in mobile ad hoc networks. In INFOCOM, 2010 Proceedings IEEE, pages 1--9. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Rongxing Lu, Xiaodong Li, Tom H Luan, Xiaohui Liang, and Xuemin Shen. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. Vehicular Technology, IEEE Transactions on, 61(1):86--96, 2012.Google ScholarGoogle Scholar
  12. Parikshit N Mahalle, Bayu Anggorojati, Neeli R Prasad, and Ramjee Prasad. Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility, 1(4):309--348, 2013.Google ScholarGoogle Scholar
  13. Qi He, Dapeng Wu, and Pradeep Khosla. The quest for personal control over mobile location privacy. Communications Magazine, IEEE, 42(5):130--136, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Uribeacon. http://uribeacon.io.Google ScholarGoogle Scholar
  15. Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99--110. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Konstantinos Lampropoulos and Spyros Denazis. Identity management directions in future internet. Communications Magazine, IEEE, 49(12):74--83, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  17. Sheikh Iqbal Ahamed, Farzana Rahman, and Endadul Hoque. Erap: Ecc based rfid authentication protocol. In Future Trends of Distributed Computing Systems, 2008. FTDCS'08. 12th IEEE International Workshop on, pages 219--225. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Guanglei Zhao, Xianping Si, Jingcheng Wang, Xiao Long, and Ting Hu. A novel mutual authentication scheme for internet of things. In Modelling, Identification and Control (ICMIC), Proceedings of 2011 International Conference on, pages 563--566. IEEE, 2011.Google ScholarGoogle Scholar
  19. nrf51822 bluetooth smart beacon kit. http://bit.ly/1L34QCz.Google ScholarGoogle Scholar
  20. Apple. Getting started with ibeacon, 2014. http://apple.co/1MPb7CU.Google ScholarGoogle Scholar
  21. Albert Bifet, Geoff Holmes, Bernhard Pfahringer, and Ricard Gavaldà. Mining frequent closed graphs on evolving data streams. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 591--599. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hong Cheng, Xifeng Yan, and Jiawei Han. Mining graph patterns. In Managing and Mining Graph Data, pages 365--392. Springer, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  23. Yu-Ru Lin, Jimeng Sun, Hari Sundaram, Aisling Kelliher, Paul Castro, and Ravi Konuru. Community discovery via metagraph factorization. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(3):17, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. For Your Eyes Only

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MCS '15: Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services
        September 2015
        56 pages
        ISBN:9781450335454
        DOI:10.1145/2802130

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 September 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate8of12submissions,67%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader