Welcome to Constant Etherpad!

These pads are archived each night (around 4AM CET) @ http://etherdump.constantvzw.org/
An RSS feed from the etherdump also appears on http://constantvzw.org/

To prevent your public pad from appearing in the archive and RSS feed, put or just leave the following (including the surrounding double underscores) anywhere in the text of your pad:

    __NOPUBLISH__

Changes will be reflected after the next update at 4AM.
Notes on Paper on Augmented Home Inventories: Beyong myopia in smart home security and privacy

Possible audience/conferences/journals:

OUTLINE:
Motivation:        
        IOT work:
                lots of low hanging fruit: focus on the bad
                are there point solutions: device, libraries, programming framework
                holistic framework for describing the problem space
                        position existing work to identify new problems
                
Complicated questions around:
        device interaction
        sharing
        liability
        responsibility
        conflicts
        ownership
        disconnected operation
        homesteading/device autonomy/home sovereignity
Hard to answer these questions!?

For example:
        It is not clear who bears the responsibility
        Unit of concern that is to be protected is unclear
        
Proposition is to use inventories
        Define the problem space
        As a way to systematize knowledge
        identify gaps
        
Challenges to the Inventory model:
        how do you count
        can you count
        how do you describe how you counted?
        

Todo:
        - audience and conference search
        - seda will research more on inventories and send amterial to nick
        
        


                
Calandrino


Related Literature:
    
        
       
 
     There are dozens of articles on smart meters and privacy
     Applying crypto, differential privacy etc. I can compile them if needed: YES/NO?
        
       Survey: Choices for interaction with things on Internet and underlying issues
       Mashal et al. (ad hoc networks)
 
 
      Qin et al. (journal of network and computer applications) 
       
       Edge Analytics in the Internet of Things
       Satyanarayanan et al. (pervasive computing)
       
       Survey of Security and Privacy Issues of Internet of Things
       Borgohain et al. (arxiv) http://arxiv.org/pdf/1501.02211v1.pdf
       
       

## Smart Home Frameworks and Infrastructure
        
        
## Smart Home Studies

## Examples of Future Smart Home applications:
    I added these here so that they can drive our reflections on relevant privacy and security concerns
    
    Unsupervised visit detection in smart homes  
    Aicha et al. (pervasive and mobile computing)
    


    De Silva et al. (engineering applications of artificial intelligence) look for work that cited this work
    
    
For carl:
Notes from Meeting with Nick June, 2016:
    

nick:

compiling an inventory is more complicated than it seems
        try to figure out what is connected
        what is connected
        what if you have multiple instances
        describing the device: the users, mobility (seda has a whole list of things that are worth evaluating)


ownership of the device
        if the device looses connectivity, what happens? matter of security, privacy, consumer protection, robustness
        what should be the fall back?
                thermostat should still function
        sharing is interesting, too
                would it be good for privacy to comingle behaviors
                spotify: there is all this kids songs
                amazon recommendations
                what happens if you project that into iot
                profiling: privacy issues come up
                
IoT
        parties trying to own the home IoT: samsung, apple, google, microsoft???
        
        
bottom up myopic approaches
        it is good for pointing out the problems that exist: low hanging fruits
        if you are trying to explore the solution space to address the problems that are coming towards us
        
        there are different challenges to the role that devices and the network can play in security and privacy
        vendor/manufacturer vs isp vs consumer
                whose responsibility is it?
                the network, the device, where does the liability ultimately lie?
                is it the consumer? are they responsible for doing some things?
                isp?
                analogies from other areas?
                recall? does it even make sense?
        
blog post for policy stuff?
        technical capabilities may inform the policy recommendations
        here are some end states we would like to get to:
                a reasonable inventory
                        inventory means this and that
                we also need data protection and isolation
                sharing and conflicts
        who bears the responsibility for making these happen given technical constraints?