Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management

被引:4
|
作者
Bello-Ogunu, Emmanuel [1 ]
Shehab, Mohamed [1 ]
Miazi, Nazmus Sakib [1 ]
机构
[1] Univ North Carolina Charlotte, Charlotte, NC 28223 USA
关键词
Bluetooth Low Energy; Privacy Policy; BLE Beacons; Policy Management;
D O I
10.1109/COMPSAC.2019.00121
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Bluetooth Low Energy (BLE) beacons are an emerging type of technology in the Internet-of-Things (IoT) realm, which use BLE signals to broadcast a unique identifier that is detected by a compatible device to determine the location of nearby users. Beacons can be used to provide a tailored user experience with each encounter, yet can also constitute an invasion of privacy, due to their covertness and ability to track user behavior. Therefore, we hypothesize that user-driven privacy policy configuration is key to enabling effective and trustworthy privacy management during beacon encounters. We developed a framework for beacon privacy management that provides a policy configuration platform. Through an empirical analysis with 90 users, we evaluated this framework through a proof-of-concept app called BEACON PRIVACY MANAGER (BPM), which focused on the user experience of such a tool. Using BPM, we provided users with the ability to create privacy policies for beacons, testing different configuration schemes to refine the framework and then offer recommendations for future research.
引用
收藏
页码:823 / 832
页数:10
相关论文
共 50 条
  • [1] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [2] Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA
    Bussard, Laurent
    Pinsdorf, Ulrich
    [J]. OPEN PROBLEMS IN NETWORK SECURITY, 2012, 7039 : 104 - 118
  • [3] Privacy Care: A Tangible Interaction Framework for Privacy Management
    Mehta, Vikram
    Gooch, Daniel
    Bandara, Arosha
    Price, Blaine
    Nuseibeh, Bashar
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)
  • [4] A Formal Privacy Management Framework
    Le Metayer, Daniel
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 162 - 176
  • [5] Protecting Privacy with a Declarative Policy Framework
    Martiny, Karsten
    Elenius, Daniel
    Denker, Grit
    [J]. 2018 IEEE 12TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2018, : 227 - 234
  • [6] Or best offer: A privacy policy negotiation protocol
    Walker, Daniel D.
    Mercer, Eric G.
    Seamons, Kent E.
    [J]. 2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 173 - 180
  • [7] Protecting Privacy of BLE Device Users
    Fawaz, Kassem
    Kim, Kyu-Han
    Shin, Kang G.
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 1205 - 1221
  • [8] Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements
    Mohammadi, Nazila Gol
    Leicht, Jens
    Ulfat-Bunyadi, Nelufar
    Heisel, Maritta
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 46 - 62
  • [9] Privacy in information technology: Designing to enable privacy policy management in organizations
    Karat, J
    Karat, CM
    Brodie, C
    Feng, JJ
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 153 - 174
  • [10] Recommender Systems for Privacy Management: A Framework
    Rasmussen, Curtis
    Dara, Rozita
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 243 - 244