{"33dd079d62d4ccd18a44676bb048e7a7christophstach":{"DOI":"10.5220/0007672900570068","ISBN":"978-989-758-369-8","ISSN":"","URL":"","abstract":"The Internet of Things and its applications are becoming increasingly popular. Especially Smart Service Platforms like Alexa are in high demand. Such a platform retrieves data from sensors, processes them in a back-end, and controls actuators in accordance with the results. Thereby, all aspects of our everyday life can be managed. In this paper, we reveal the downsides of this technology by identifying its privacy threats based on a real-world application. Our studies show that current privacy systems do not tackle these issues adequately. Therefore, we introduce PSSST!, a user-friendly and comprehensive privacy system for Smart Service Platforms limiting the amount of disclosed private information while maximizing the quality of service at the same time.","annote":"","author":[{"family":"Stach","given":"Christoph"},{"family":"Steimle","given":"Frank"},{"family":"Gritti","given":"Clémentine"},{"family":"Mitschang","given":"Bernhard"}],"citation-label":"iotbds_19_pssst","collection-editor":[{"family":"Ramachandran","given":"Muthu"},{"family":"Walters","given":"Robert"},{"family":"Wills","given":"Gary"},{"family":"Muñoz","given":"Víctor Méndez"},{"family":"Chang","given":"Victor"}],"collection-title":"IoTBDS '19","container-author":[{"family":"Ramachandran","given":"Muthu"},{"family":"Walters","given":"Robert"},{"family":"Wills","given":"Gary"},{"family":"Muñoz","given":"Víctor Méndez"},{"family":"Chang","given":"Victor"}],"container-title":"Proceedings of the 4ᵗʰ International Conference on Internet of Things, Big Data and Security","documents":[],"edition":"","editor":[{"family":"Ramachandran","given":"Muthu"},{"family":"Walters","given":"Robert"},{"family":"Wills","given":"Gary"},{"family":"Muñoz","given":"Víctor Méndez"},{"family":"Chang","given":"Victor"}],"event-date":{"date-parts":[["2019","may"]],"literal":"2019"},"event-place":"Heraklion","id":"33dd079d62d4ccd18a44676bb048e7a7christophstach","interhash":"a79c190ed4890aaf72d3f92370621749","intrahash":"33dd079d62d4ccd18a44676bb048e7a7","issue":"","issued":{"date-parts":[["2019","may"]],"literal":"2019"},"keyword":"Internet_of_Things access_control actuators privacy sensors smart_service_platform stream_processing","misc":{"isbn":"978-989-758-369-8","doi":"10.5220/0007672900570068"},"note":"","number":"","number-of-pages":"11","page":"57–68","page-first":"57","publisher":"SciTePress","publisher-place":"Heraklion","status":"","title":"PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments","type":"paper-conference","username":"christophstach","version":"","volume":"1"},"29482e95a9cbd13bb7a1762d7a0b2013christophstach":{"DOI":"10.1109/PERCOMW.2018.8480227","ISBN":"978-1-5386-3228-4","ISSN":"","URL":"","abstract":"As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data—as well as the knowledge which can be derived from it—is highly beneficial as apps are able to adapt their services appropriate to the respective context, it also poses a privacy threat. Thus, a lot of research work is done regarding privacy. Yet, all approaches obfuscate certain attributes which has a negative impact on context recognition and thus service quality. Therefore, we introduce a novel access control mechanism called PATRON. The basic idea is to control access to information patterns. For instance, a person suffering from diabetes might not want to reveal his or her unhealthy eating habit, which can be derived from the pattern \"rising blood sugar level\" → \"adding bread units\". Such a pattern which must not be discoverable by some parties (e.g., insurance companies) is called private pattern whereas a pattern which improves an app's service quality is labeled as public pattern. PATRON employs different techniques to conceal private patterns and, in case of available alternatives, selects the one with the least negative impact on service quality, such that the recognition of public patterns is supported as good as possible.","annote":"","author":[{"family":"Stach","given":"Christoph"},{"family":"Dürr","given":"Frank"},{"family":"Mindermann","given":"Kai"},{"family":"Palanisamy","given":"Saravana Murthy"},{"family":"Wagner","given":"Stefan"}],"citation-label":"comorea_18_patron","collection-editor":[{"family":"Roussos","given":"George"},{"family":"Kameas","given":"Achilles"},{"family":"Hirmer","given":"Pascal"},{"family":"Sztyler","given":"Timo"},{"family":"Indulska","given":"Jadwiga"}],"collection-title":"CoMoRea '18","container-author":[{"family":"Roussos","given":"George"},{"family":"Kameas","given":"Achilles"},{"family":"Hirmer","given":"Pascal"},{"family":"Sztyler","given":"Timo"},{"family":"Indulska","given":"Jadwiga"}],"container-title":"Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops","documents":[],"edition":"","editor":[{"family":"Roussos","given":"George"},{"family":"Kameas","given":"Achilles"},{"family":"Hirmer","given":"Pascal"},{"family":"Sztyler","given":"Timo"},{"family":"Indulska","given":"Jadwiga"}],"event-date":{"date-parts":[["2018","mar"]],"literal":"2018"},"event-place":"Athens","id":"29482e95a9cbd13bb7a1762d7a0b2013christophstach","interhash":"5a0424aefb2e6d7dc76587b78766c211","intrahash":"29482e95a9cbd13bb7a1762d7a0b2013","issue":"","issued":{"date-parts":[["2018","mar"]],"literal":"2018"},"keyword":"access_control complex_event_processing databases pattern_concealing privacy stream_processing","misc":{"isbn":"978-1-5386-3228-4","doi":"10.1109/PERCOMW.2018.8480227"},"note":"","number":"","number-of-pages":"5","page":"238–243","page-first":"238","publisher":"IEEE","publisher-place":"Athens","status":"","title":"How a Pattern-based Privacy System Contributes to Improve Context Recognition","type":"paper-conference","username":"christophstach","version":"","volume":""}}