Download Security & Privacy

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Data analysis wikipedia , lookup

Data vault modeling wikipedia , lookup

3D optical data storage wikipedia , lookup

Mass surveillance wikipedia , lookup

Internet privacy wikipedia , lookup

Business intelligence wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Do Not Track legislation wikipedia , lookup

Privacy International wikipedia , lookup

Information privacy law wikipedia , lookup

Transcript
Smart Home Technologies
Privacy
Data Security and Privacy


Security deals with the assurance of a set of
rules set to protect privacy

Prevent access to the environment

Prevent unauthorized access to data
Privacy deals with the subjective, culturedependent setting of standards that regulate
what is publicly accessible

Determine who should have access to what

Where are the limits for public access ?
Privacy in Intelligent
Environments

Privacy in intelligent environments
encompasses many aspects

Which data should be private ?

Who should have access ?

What means of information gathering can be used ?
Types of Privacy

Bodily Privacy


Territorial Privacy


Privacy Of Your Home, Office, …
Privacy Of Communications


Strip Searches, Drug Testing, …
Phone Calls, E-mail, …
Informational Privacy

Personal Data (Name, Address, Hobbies, …)
Perception of Privacy
Factors for Perception of
Privacy Threats

Scale of data collection


Manner in which the data is collected


What Type Of Data Is Recorded?
Reason for data collection


How Obviously Is Data Collected?
Type of data collected


To What Extend Is My Life Visible To Others?
What Are The Driving Factors?
Accessibility of information in data

How Do I Find Anything in this Data?
Examples of Non-Intrusive
Data Collection Tools
Example: Bodymedia
Security and Privacy-Aware
Environments

Security measures for access authentication
are not sufficient in intelligent environments

Access to information inside the environment has
to be limited


Home interfaces and displays have to follow
privacy rules


Multiple inhabitants should have access to different parts
of the available information
Interfaces can not display private information
Access inside the environment might have to be
restricted


Private spaces in office environments
Access restrictions to ensure safety of inhabitants
Remote Interface Example:
Georgia Tech Aware Home

Actual Environment:



Pressure sensitive floors
Microphone arrays
Video cameras
Remote Interface Example:
Georgia Tech Aware Home

Family Portraits:

Summarize daily activity
and long-term trends
iconically


Limits access to information
Provides peace of mind for
adult children
Privacy in Intelligent Interfaces

Interface should only display the required
information

Hide sensory data


Only display result of processing


E.g. no video data, no exact data on current actions
E.g. only display if everything is ok
Interface structure should reflect the
necessary information

Interfaces have to be practical and easy to use
without revealing information

E.g. only display static, pre-recorded image of person