Skip to main content

A Privacy Protection Layer for Wearable Devices

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12056))

Included in the following conference series:

Abstract

The use of wearable devices is growing exceptionally which helps the individuals to track their daily activities, habits, health status, etc. They are be-coming so powerful and affordable that in some cases replace the use of mobile devices. Users are not aware of the extent and quality of the data being collected by these devices and the inherent risk of data security and privacy violation. This research introduces a privacy aware layer built over a sample smartwatch OS to limit user data access through enforcement of user set privacy settings. Since the nature of wearable devices leaves little space for interaction between the device and users, we develop a interface to capture user’s privacy preference. Two user studies, one using the Tizen platform and one with the privacy protection layer, are performed to compare its effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Design for Wear OS [Internet]. https://developer.android.com/design/wear/. Accessed 26 Nov 2018

  2. Design Principles|Tizen Developers [Internet]. https://developer.tizen.org/design/wearable/design-principles. Accessed 26 Nov 2018

  3. HP Study [Internet]. https://www8.hp.com/us/en/hp-news/press-release.html?id=2037386#.Vi18G7crLIU. Accessed 19 Feb 2019

  4. Aciicmez, O., Blaich, A.: Understanding the permissions and access control model for tizen application sandboxing (2012)

    Google Scholar 

  5. Anderson, A.: A Comparison of Two Privacy Policy Languages: EPAL and XACML. Sun Microsystems Inc., Santa Clara (2005)

    Google Scholar 

  6. Barker, K.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 2009. LNCS, vol. 5588, pp. 42–54. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02843-4_7

    Chapter  Google Scholar 

  7. Ching, K.W., Singh, M.M.: Wearable technology devices security privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8(3), 19–26 (2016)

    Google Scholar 

  8. Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceeedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012). ACM, New York (2012)

    Google Scholar 

  9. Gadyatskaya, O., Massacci, F., Zhauniarovich, Y.: Security in the firefox OS and Tizen mobile platforms. Computer 47(6), 57–63 (2014)

    Article  Google Scholar 

  10. Ghazinour, K., Barker, K.: A privacy preserving model bridging data provider and collector preferences. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, Genoa, Italy, pp. 174–178, 18–22 March 2013

    Google Scholar 

  11. Ghazinour, K., Barker, K.: Capturing P3P semantics using an enforceable lattice-based structure. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, Uppsala, Sweden, pp. 1–6, 25 March 2011

    Google Scholar 

  12. Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference, vol. 2, pp. 335–340 (2009)

    Google Scholar 

  13. Im, B., Ware, R.: Tizen security overview. In: Tizen Developer Conference, May 2012. http://download.tizen.org/misc/media/conference2012/tuesday/ballroom-c/2012-05-08-1600-1640-tizen_security_framework_overview.pdf. Accessed 25 May 2018

  14. Li, H., et al.: Examining individuals adoption’ of healthcare wearable devices: an empirical study from privacy calculus perspective. Int. J. Med. Inform. 88, 8–16 (2016)

    Article  Google Scholar 

  15. Motti, V.G., Caine, K.: Users’ privacy concerns about wearables. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 231–244. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_17

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kambiz Ghazinour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohzary, M., Tadisetty, S., Ghazinour, K. (2020). A Privacy Protection Layer for Wearable Devices. In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2019. Lecture Notes in Computer Science(), vol 12056. Springer, Cham. https://doi.org/10.1007/978-3-030-45371-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45371-8_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45370-1

  • Online ISBN: 978-3-030-45371-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics