TY - GEN
T1 - For your eyes only
AU - Kravets, Robin
AU - Tuncay, Güliz Seray
AU - Sundaram, Hari
N1 - Publisher Copyright:
© 2015 ACM.
PY - 2015/9/11
Y1 - 2015/9/11
N2 - As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals' movements to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT. While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito, a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences will see enhanced user engagement.
AB - As users interact with an Internet of Things (IoT) ecosystem, they leave behind traces of information about their presence, preferences and behavior. While the ecosystem can track individuals' movements to provide enhanced recommendations, individuals have little control over how this information is being used or distributed. Such tracking has led to increasing privacy concerns over the use of IoT. While it is possible to develop systems to enable anonymous interaction with IoT, anonymity results in limited benefits to both individuals and IoT ecosystems. In response, we present Incognito, a secure and privacy preserving IoT framework where user information exposure is driven by the concept of identity. In particular, we advocate user-managed identities, leaving the control of the choice of identity in a given context, as well as the level of exposure, in the hands of the user. Using Incognito, users can create identities that work only within certain contexts and are meaningless outside of these contexts. Furthermore, Incognito allows for simple management of information exposure through contextual-policies for sharing as well as querying of an IoT ecosystem. By giving individuals full control over the information traces that they leave behind in an IoT infrastructure, Incognito, in essence, puts individuals on equal footing with the entities that want to track their behavioral data. Incognito fosters a symbiotic relationship; users will need to expose information in exchange for personalized recommendations and IoT organizations who provide sophisticated user experiences will see enhanced user engagement.
KW - Bluetooth Low Energy
KW - Identity
KW - Internet of Things
KW - Privacy
UR - http://www.scopus.com/inward/record.url?scp=84981320783&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84981320783&partnerID=8YFLogxK
U2 - 10.1145/2802130.2802137
DO - 10.1145/2802130.2802137
M3 - Conference contribution
AN - SCOPUS:84981320783
T3 - MCS 2015 - Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, co-located with MobiCom 2015
SP - 28
EP - 35
BT - MCS 2015 - Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, co-located with MobiCom 2015
PB - Association for Computing Machinery
T2 - 6th International Workshop on Mobile Cloud Computing and Services, MCS 2015
Y2 - 11 September 2015
ER -