Welcome to Constant Etherpad!
These pads are archived each night (around 4AM CET) @
http://etherdump.constantvzw.org/
An RSS feed from the etherdump also appears on
http://constantvzw.org/
To prevent your public pad from appearing in the archive and RSS feed, put or just leave the following (including the surrounding double underscores) anywhere in the text of your pad:
__NOPUBLISH__
Changes will be reflected after the next update at 4AM.
Notes on Paper on Augmented Home Inventories: Beyong myopia in smart home security and privacy
Possible audience/conferences/journals:
OUTLINE:
Motivation:
IOT work:
lots of low hanging fruit: focus on the bad
are there point solutions: device, libraries, programming framework
holistic framework for describing the problem space
position existing work to identify new problems
Complicated questions around:
device interaction
sharing
liability
responsibility
conflicts
ownership
disconnected operation
homesteading/device autonomy/home sovereignity
Hard to answer these questions!?
For example:
It is not clear who bears the responsibility
Unit of concern that is to be protected is unclear
Proposition is to use inventories
Define the problem space
As a way to systematize knowledge
identify gaps
Challenges to the Inventory model:
how do you count
can you count
how do you describe how you counted?
Todo:
- audience and conference search
- seda will research more on inventories and send amterial to nick
Calandrino
Related Literature:
There are dozens of articles on smart meters and privacy
Applying crypto, differential privacy etc. I can compile them if needed: YES/NO?
Survey: Choices for interaction with things on Internet and underlying issues
Mashal et al. (ad hoc networks)
-
Survey: When things matter: A survey on data-centric internet of things
Qin et al. (journal of network and computer applications)
Edge Analytics in the Internet of Things
Satyanarayanan et al. (pervasive computing)
Survey of Security and Privacy Issues of Internet of Things
Borgohain et al. (arxiv)
http://arxiv.org/pdf/1501.02211v1.pdf
-
Big Data Privacy in the Internet of Things Era
-
Perera et al. (IT professional)
## Smart Home Frameworks and Infrastructure
-
-
The role of smart data in smart home: health monitoring case
-
Puustjarvi and Puustjarvi (international conference on advances in information technology)
-
-
Privacy-preserving data infrastructure for smart home appliances based on the Octopus DHT
-
Fabian and Feldhaus (Computers in Industry)
-
-
Exploring the critical quality attributes and models of smart homes (kano model?)
-
Luor et al (maturitas)
-
-
Challenges in retaining privacy in smart spaces
-
Chau and Little (International conference on ambient systems, networks and technologies)
-
Risk driven Smart Home resource management using cloud services
-
Kirkham et al. (future generation computer systems)
-
-
The concept of an ecological smart home network
-
Saito (technologies, social impact and sustainability) - couldn't access pdf. need to search
-
-
A comprehensive approach to privacy in the cloud-based Internet of Things
-
Henze et al (future generation computer systems)
-
-
Integration of Cloud computing and Internet of Things: A survey
-
Botta et al. (future generation computer systems)
-
-
A more human-centric Internet of Things with temporal and spatial context
-
Calderon et al. (international conference on ambient systems, networks and technologies)
-
-
Security, privacy and trust in Internet of Things: The road ahead
-
Sciari et al (computer networks)
-
-
Survey on secure communication protocols for the Internet of Things
-
Nguyen et al. (ad hoc networks)
-
-
Autonomic schemes for threat mitigation in Internet of Things
-
Ashraf and Habaebi (Journal of Network and Computer Applications)
-
## Smart Home Studies
-
Social barriers to the adoption of smart homes
-
Balta-Ozkan et al. (Energy Policy)
-
-
Modeling users` work activities in a smart home
-
Allameh et al (environmental sciences)
-
## Examples of Future Smart Home applications:
I added these here so that they can drive our reflections on relevant privacy and security concerns
Unsupervised visit detection in smart homes
Aicha et al. (pervasive and mobile computing)
-
A Framework for Anomaly Diagnosis in Smart Homes Based on Ontology
-
Pardo et al, Procedia Computer Science (International Conference on Ambient Systems, networks, and technologies)
-
Detecting and exploring deviating behaviour of smart home residents
-
Lundstrom et al. (expert systems with applications)
-
State of the art of smart homes
De Silva et al. (engineering applications of artificial intelligence) look for work that cited this work
For carl:
Notes from Meeting with Nick June, 2016:
nick:
compiling an inventory is more complicated than it seems
try to figure out what is connected
what is connected
what if you have multiple instances
describing the device: the users, mobility (seda has a whole list of things that are worth evaluating)
ownership of the device
if the device looses connectivity, what happens? matter of security, privacy, consumer protection, robustness
what should be the fall back?
thermostat should still function
sharing is interesting, too
would it be good for privacy to comingle behaviors
spotify: there is all this kids songs
amazon recommendations
what happens if you project that into iot
profiling: privacy issues come up
IoT
parties trying to own the home IoT: samsung, apple, google, microsoft???
bottom up myopic approaches
it is good for pointing out the problems that exist: low hanging fruits
if you are trying to explore the solution space to address the problems that are coming towards us
there are different challenges to the role that devices and the network can play in security and privacy
vendor/manufacturer vs isp vs consumer
whose responsibility is it?
the network, the device, where does the liability ultimately lie?
is it the consumer? are they responsible for doing some things?
isp?
analogies from other areas?
recall? does it even make sense?
blog post for policy stuff?
technical capabilities may inform the policy recommendations
here are some end states we would like to get to:
a reasonable inventory
inventory means this and that
we also need data protection and isolation
sharing and conflicts
who bears the responsibility for making these happen given technical constraints?