Abstract
Internet-based personal assistants are promising devices combining voice control and search technologies to pull out relevant information to domestic users. They are expected to assist in a smart way to household activities, such as scheduling meetings, finding locations, reporting of cultural events, sending of messages and a lot more. The information collected by these devices, including personalized lifelogs about their corresponding users, is likely to be stored by well-established Internet players related to web search engines and social media. This can lead to serious privacy risks. The issue of protecting the identity of domestic users and their sensitive data must be tackled at design time, to promptly mitigate privacy threats. Towards this end, this paper proposes a protection scheme that jointly handles the aforementioned issues by combining log anonymization and sanitizable signatures.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable signatures. In: 10th European Conference on Research in Computer Security, ESORICS 2005 (2005)
Barbaro, M., Zeller, T.: A Face Is Exposed for AOL Searcher No. 4417749 (2006). https://www.nytimes.com/2006/08/09/technology/09aol.html
Canard, S., Jambert, A.: On extended sanitizable signature schemes. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 179–194. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11925-5_13
Center for Democracy and Technology: Search privacy practices: a work in progress (2007). http://www.cdt.org/privacy/20070808searchprivacy.pdf
Cooper, A.: A survey of query log privacy-enhancing techniques from a policy perspective. ACM Trans. Web (TWEB) 2(4), 19 (2008)
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-H., Metayer, D.L., Tirtea, R., Schiffner, S.: Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726 (2015)
European Parliament and Council of the European Union: Directive 95/46/EC of the European parliament and of the council (1995)
Grimes, J.M., Jaeger, P.T., Lin, J.: Weathering the storm: the policy implications of cloud computing (2009)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International conference on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)
Guo, K., Zhang, Q.: Fast clustering-based anonymization approaches with time constraints for data streams. Know. Based Syst. 46, 95–108 (2013)
Krempl, G., et al.: Open challenges for data stream mining research. ACM SIGKDD Explor. Newsl. 16(1), 1–10 (2014)
Navarro-Arribas, G., Torra, V.: Tree-based microaggregation for the anonymization of search logs. In: 2009 International Joint Conference on Web Intelligence and Intelligent Agent Technology, Washington, DC, USA, pp. 155–158 (2009)
Nijholt, A.: Google Home: experience, support and re-experience of social home activities. Inf. Sci. 178(3), 612–630 (2008)
Pàmies-Estrems, D., Castellà-Roca, J., Viejo, A.: Working at the web search engine side to generate privacy-preserving user profiles. Expert Syst. Appl. 64, 523–535 (2016)
Poblete, B., Spiliopoulou, M., Baeza-Yates, R.: Website privacy preservation for query log publishing. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 80–96. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78478-4_5
Regulation (EU): 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data, OJEU l 119/1 of 4.05.2016. In: Elementary Particle Theory (2016)
Sarconi, P., Calore, M.: OK, house: get smart. How to make the most of Amazon Echo and Google Home. Wired 25(6), 39–41 (2017)
Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with SybilQuery. In: 11th International Conference on Ubiquitous Computing. ACM (2009)
Soria-Comas, J., Domingo-Ferrer, J.: Probabilistic k-anonymity through microaggregation and data swapping. In: 2012 IEEE International Conference on Fuzzy Systems, pp. 1–8. IEEE (2012)
Wang, P., Smeaton, A.: Using visual lifelogs to automatically characterize everyday activities. Inf. Sci. 230, 147–161 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Pàmies-Estrems, D., Kaaniche, N., Laurent, M., Castellà-Roca, J., Garcia-Alfaro, J. (2018). Lifelogging Protection Scheme for Internet-Based Personal Assistants. In: Garcia-Alfaro, J., Herrera-Joancomartí, J., Livraga, G., Rios, R. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2018 2018. Lecture Notes in Computer Science(), vol 11025. Springer, Cham. https://doi.org/10.1007/978-3-030-00305-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-00305-0_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00304-3
Online ISBN: 978-3-030-00305-0
eBook Packages: Computer ScienceComputer Science (R0)