Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things

Author:

Chang Kai-Chih1ORCID,Barber Suzanne1ORCID

Affiliation:

1. Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX 78712, USA

Abstract

Over time, the many different ways in which we collect and use data have become more complex as we communicate and interact with an ever-increasing variety of modern technologies. Although people often say they care about their privacy, they do not have a deep understanding of what devices around them are collecting their identity information, what identity information is being collected, and how that collected data will affect them. This research is dedicated to developing a personalized privacy assistant to help users regain control, understand their own identity management, and process and simplify the large amount of information from the Internet of Things (IoT). This research constructs an empirical study to obtain the comprehensive list of identity attributes that are being collected by IoT devices. We build a statistical model to simulate the identity theft and to help calculate the privacy risk score based on the identity attributes collected by IoT devices. We discuss how well each feature of our Personal Privacy Assistant (PPA) works and compare the PPA and related work to a list of fundamental features for privacy protection.

Publisher

MDPI AG

Subject

General Physics and Astronomy

Reference52 articles.

1. Deloitte (2023). Shiny new devices may be bringing joy, but who’s protecting consumer data?. Deloitte Insights, Available online: https://www2.deloitte.com/us/en/insights/industry/technology/consumer-data-privacy.html.

2. IBM (2022). Cost of a Data Breach Report 2022, IBM.

3. Landi, H. (2021). Fitbit, apple user data exposed in breach impacting 61M fitness tracker records. Fierce Healthc., Available online: https://www.fiercehealthcare.com/digital-health/fitbit-apple-user-data-exposed-breach-impacting-61m-fitness-tracker-records.

4. University of Texas at Austin (2023, April 12). About the Center for Identity. Available online: https://identity.utexas.edu/about-center-identity.

5. Identity Threat Assessment and Prediction;Zaiss;J. Consum. Aff.,2019

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing Network Security in SDNIoT Environments Through CNN-Based Attack Detection;2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS);2023-10-18

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3