skip to main content
10.1145/3460418.3479331acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Controlling Security Rules Using Natural Dialogue: an Application to Smart Home Care

Published: 24 September 2021 Publication History

Abstract

Smart home systems have revolutionized the way we interact with our living environment, but the concerns over sensor data privacy and security have become one of the major barriers to their widespread adoption. Despite a considerable research effort in designing secure access control mechanisms, the end users are still reluctant to use those either due to the complexity of the interfaces or because they do not have sufficient skills. For the elderly users the problem gets worse. Making the right security choices is increasingly more difficult for this group of users. To assist the elderly users in defining their access control policies, we design a dialogue-based system which allows to create new security rules or update existing ones in a simple and intelligible way using natural language and familiar terms.

References

[1]
Z Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A Selcuk Uluagac. 2018. Sensitive information tracking in commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). 1687–1704.
[2]
Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In Proceedings of USENIX Annual Technical Conference (USENIX ATC).
[3]
Z. Berkay Celik, Gang Tan, and Patrick McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In Proceedings of Network and Distributed System Security Symposium (NDSS 2019).
[4]
Ry Crist. 2019. Amazon and Google are listening to your voice recordings. Here’s what we know about that. CNET. https://cnet.co/3jdHbcNAccessed: June 2021.
[5]
Adam Clark Estes. 2018. Yes, Your Amazon Echo Is an Ad Machine. Gizmodo. https://gizmodo.com/yes-your-amazon-echo-is-an-ad-machine-1821712916Accessed: June 2021.
[6]
Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. Flowfence: Practical data protection for emerging iot application frameworks. In 25th USENIX security symposium (USENIX Security 16). 531–548.
[7]
Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019).
[8]
FTC. 2017. VIZIO to Pay 2.2 Million to FTC, State of New Jersey to Settle Charges It Collected Viewing Histories on 11 Million Smart Televisions without Users’ Consent. US Federal Trade Commission. https://www.ftc.gov/news-events/press-releases/2017/02/vizio-pay-22-million-ftc-state-new-jersey-settle-charges-itAccessed: June 2021.
[9]
Caroline Haskins. 2018. Amazon Sent 1,700 Alexa Recordings to the Wrong Person. Vice. https://www.vice.com/en/article/pa54g8/amazon-sent-1700-alexa-recordings-to-the-wrong-personAccessed: June 2021.
[10]
Christine Hauser. 2018. Police Use Fitbit Data to Charge 90-Year-Old Man in Stepdaughter’s Killing. New York Times. https://www.nytimes.com/2018/10/03/us/fitbit-murder-arrest.htmlAccessed: June 2021.
[11]
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. In Proceedings of Network and Distributed System Security Symposium (NDSS 2017), Vol. 2. 2–2.
[12]
Alfred Ng. 2019. You shared Ring footage with police. They may share it, too. CNET. https://www.cnet.com/home/security/you-shared-ring-footage-with-police-they-may-share-it-too/Accessed: June 2021.
[13]
Amanda Yeo. 2019. Data leak by IoT device maker Wyze exposes personal information of 2.4 million people. Mashable. https://mashable.com/article/wyze-smart-home-data-leak-breachAccessed: June 2021.
[14]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security ({SOUPS} 2017). 65–80.
[15]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 1–20.

Cited By

View all
  • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
  • (2024)Retrieval-Augmented Generation Based Assistant: A Smart Home Case StudyProgress in Artificial Intelligence10.1007/978-3-031-73500-4_14(160-171)Online publication date: 3-Sep-2024
  • (2023)Reviewing and Reflecting on Smart Home Research from the Human-Centered PerspectiveProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580842(1-21)Online publication date: 19-Apr-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp/ISWC '21 Adjunct: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers
September 2021
711 pages
ISBN:9781450384612
DOI:10.1145/3460418
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 September 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. elderly
  3. privacy
  4. smart home
  5. voice assistant

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

UbiComp '21

Acceptance Rates

Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
  • (2024)Retrieval-Augmented Generation Based Assistant: A Smart Home Case StudyProgress in Artificial Intelligence10.1007/978-3-031-73500-4_14(160-171)Online publication date: 3-Sep-2024
  • (2023)Reviewing and Reflecting on Smart Home Research from the Human-Centered PerspectiveProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580842(1-21)Online publication date: 19-Apr-2023
  • (2022)Caregiver Expectations of Interfacing With Voice Assistants to Support Complex Home Care: Mixed Methods StudyJMIR Human Factors10.2196/376889:2(e37688)Online publication date: 30-Jun-2022
  • (2022)Overview of the latest research related to smart speakers2022 IEEE 7th International Energy Conference (ENERGYCON)10.1109/ENERGYCON53164.2022.9830196(1-5)Online publication date: 9-May-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media