Eliciting Security & Privacy-Informed Sharing Techniques for Multi-User Augmented Reality

被引:5
|
作者
Rajaram, Shwetha [1 ]
Chen, Chen [1 ]
Roesner, Franziska [2 ]
Nebeling, Michael [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Univ Washington, Seattle, WA USA
基金
美国国家科学基金会;
关键词
elicitation studies; threat modeling;
D O I
10.1145/3544548.3581089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The HCI community has explored new interaction designs for collaborative AR interfaces in terms of usability and feasibility; however, security & privacy (S&P) are often not considered in the design process and left to S&P professionals. To produce interaction proposals with S&P in mind, we extend the user-driven elicitation method with a scenario-based approach that incorporates a threat model involving access control in multi-user AR. We conducted an elicitation study in two conditions, pairing AR/AR experts in one condition and AR/S&P experts in the other, to investigate the impact of each pairing. We contribute a set of expert-elicited interactions for sharing AR content enhanced with access control provisions, analyze the benefits and tradeoffs of pairing AR and S&P experts, and present recommendations for designing future multi-user AR interactions that better balance competing design goals of usability, feasibility, and S&P in collaborative AR.
引用
下载
收藏
页数:17
相关论文
共 50 条
  • [41] Multi-User Diversity in a Spectrum Sharing System
    Ban, Tae Won
    Choi, Wan
    Jung, Bang Chu
    Sung, Dan Keun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (01) : 102 - 106
  • [42] Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study
    Zeng, Eric
    Roesner, Franziska
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 159 - 176
  • [43] Context-aware Maintenance Support for Augmented Reality Assistance and Synchronous Multi-user Collaboration
    Abramovici, Michael
    Wolf, Mario
    Adwernat, Stefan
    Neges, Matthias
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE IN THROUGH-LIFE ENGINEERING SERVICES, 2017, 59 : 18 - 22
  • [44] An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing
    Song, Fuyuan
    Qin, Zheng
    Liang, Jinwen
    Lin, Xiaodong
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [45] MuVR: A Multi-user Virtual Reality Platform
    Thomas, Jerald
    Bashyal, Raghav
    Goldstein, Samantha
    Suma, Evan
    2014 IEEE VIRTUAL REALITY (VR), 2014, : 115 - 116
  • [46] A Study on Privacy Preservation for Multi-user and Multi-granularity
    Li, Dong
    He, Xianmang
    Chen, Huahui
    Dong, Yihong
    Chen, Yefang
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 638 - 645
  • [47] Multi-User Guesswork and Brute Force Security
    Christiansen, Mark M.
    Duffy, Ken R.
    Calmon, Flavio du Pin
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6876 - 6886
  • [48] Security of Signature Schemes in a Multi-User Setting
    Alfred Menezes
    Nigel Smart
    Designs, Codes and Cryptography, 2004, 33 : 261 - 274
  • [49] On Signatures with Tight Security in the Multi-User Setting
    Hanaoka, Goichiro
    Schuldt, Jacob C. N.
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 91 - 95
  • [50] Tight Multi-User Security Bound of DbHtS
    Datta, Nilanjan
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 192 - 223