Design of Robot Service Functions for a Framework Establishing Human-Machine Trust
In recent years, there has been an increasing interest in constructing a platform on information flow, which highly integrates robotics, IoT devices, and new generation networks and provides safely, securely and widely distribution and utilization of IoT data (i.e., information flow). From this background, we have been studying a framework establishing and enhancing human-machine trust for secure IoT services. This paper reports the design result of a robot application for the framework. The feature of the application is its function that system users can control the disclosure level of privacy information to service providers by themselves. In this paper, we show the usage scenario of the robot application and examine the feasibility of the framework functions by using it.
This work was supported by JSPS KAKENHI Grant Number 17KT0080 and the Cooperative Research Project Program of the Research Institute of Electrical Communication, Tohoku University.
- 1.Agarwal, Y., et al.: Protectmyprivacy: detecting and multigating privacy leaks on iOS devices using crowdsourcing. In: MobiSys 2013, pp. 97–100 (2013)Google Scholar
- 2.Babaguchi, N., Nishio, S.: Sensing and privacy protection of network robots. J. Inst. Electron. Inf. Commun. Eng. 91(5), 380–386 (2008)Google Scholar
- 3.Kayaba, K., Oide, T., Abe, T., Suganuma, T.: A proposal for personal data control assistant base on user’s preference clearness. IEICE Technical report, 117(205):1–6 (2018, in Japanese)Google Scholar
- 4.Liu, R., Cao, J., Yang, L., Zhang, K.: Recommendation for privacy settings of mobile apps based on crowdsourced users’ expectations. In: IEEE MS 2015, pp. 150–157 (2015)Google Scholar
- 5.T. Suganuma, K. Yasumoto, and Y. Kato. A concept of a human-machine trust generating framework for secure IoT services. IPSJ Technical report (DPS175), pp. 1–7 (2018, in Japanese)Google Scholar
- 6.Yasumoto, K., Yamaguchi, H., Shigeno, H.: Survey of real-time processing technologies of IoT data streams. J. Inf. Process. 24(2), 195–202 (2016)Google Scholar