IoT Privacy Risks Revealed

被引:0
|
作者
Chang, Kai-Chih [1 ]
Niu, Haoran [1 ]
Kim, Brian [1 ]
Barber, Suzanne [1 ]
机构
[1] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
关键词
identity; privacy; privacy policy; Internet of Things; privacy risks; entropy; INTERNET;
D O I
10.3390/e26070561
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A user's devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user's devices. These IoT devices may or may not seek explicit user consent, thus leaving the users completely unaware the IoT device is collecting, using, and/or sharing their personal data or, only marginal informed, if the user consented to the connecting IoT device but did not read the associated privacy policies. Privacy policies are intended to inform users of what personally identifiable information (PII) data will be collected about them and the policies about how those PII data will be used and shared. This paper presents novel tools and the underlying algorithms employed by the Personal Privacy Assistant app (UTCID PPA) developed by the University of Texas at Austin Center for Identity to inform users of IoT devices seeking to connect to their devices and to notify those users of potential privacy risks posed by the respective IoT device. The assessment of these privacy risks must deal with the uncertainty associated with sharing the user's personal data. If privacy risk (R) equals the consequences (C) of an incident (i.e., personal data exposure) multiplied by the probability (P) of those consequences occurring (C x P), then efforts to control risks must seek to reduce the possible consequences of an incident as well as reduce the uncertainty of the incident and its consequences occurring. This research classifies risk according to two parameters: expected value of the incident's consequences and uncertainty (entropy) of those consequences. This research calculates the entropy of the privacy incident consequences by evaluating: (1) the data sharing policies governing the IoT resource and (2) the type of personal data exposed. The data sharing policies of an IoT resource are scored by the UTCID PrivacyCheck (TM), which uses machine learning to read and score the IoT resource privacy policies against metrics set forth by best practices and international regulations. The UTCID Identity Ecosystem uses empirical identity theft and fraud cases to assess the entropy of privacy incident consequences involving a specific type of personal data, such as name, address, Social Security number, fingerprint, and user location. By understanding the entropy of a privacy incident posed by a given IoT resource seeking to connect to a user's device, UTCID PPA offers actionable recommendations enhancing the user's control over IoT connections, interactions, their personal data, and, ultimately, user-centric privacy control.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Research on IoT Privacy Security Risks
    Xi, Wang
    Ling, Luo
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS - COMPUTING TECHNOLOGY, INTELLIGENT TECHNOLOGY, INDUSTRIAL INFORMATION INTEGRATION (ICIICII), 2016, : 259 - 262
  • [2] Characterizing Privacy Risks in Healthcare IoT Systems
    Li, Shuai
    Baiocco, Alessio
    Xu, Shouhuai
    [J]. SECURE AND RESILIENT DIGITAL TRANSFORMATION OF HEALTHCARE, SUNRISE 2023, 2024, 1884 : 51 - 68
  • [3] Revealed Privacy Preferences: Are Privacy Choices Rational?
    Lee, Yi-Shan
    Weber, Roberto A.
    [J]. MANAGEMENT SCIENCE, 2024,
  • [4] Understanding Risks of Privacy Theater with Differential Privacy
    Smart M.A.
    Sood D.
    Vaccaro K.
    [J]. Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (2 CSCW)
  • [5] A Privacy Negotiation Mechanism for IoT
    Alanezi, Khaled
    Mishra, Shivakant
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 512 - 519
  • [6] Social IoT Security and Privacy
    Maniveena
    Kalaiselvi
    [J]. 2023 ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES FOR HIGH PERFORMANCE APPLICATIONS, ACCTHPA, 2023,
  • [7] Is there a Room for security and Privacy in IoT?
    Tabane, Elias
    Zuva, Tranos
    [J]. 2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), 2016, : 260 - 264
  • [8] IoT Security and Privacy Issues
    Assiri, Abeer
    Almagwashi, Haya
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [9] SECURITY AND PRIVACY IN WIRELESS IOT
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    Zhu, Liehuang
    Li, Jiangli
    Chang, Zheng
    [J]. IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 10 - 11
  • [10] Security and Privacy Functionalities in IoT
    Fazeldehkordi, Elahe
    Owe, Olaf
    Noll, Josef
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 37 - 48