skip to main content
10.1145/2991561.2991577acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiotConference Proceedingsconference-collections
research-article

Secure Personal Memory-Sharing with Co-located People and Places

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

The abundance of interconnected devices in the Internet of Things (IoT) offers a powerful vision on how automated capture systems can aid humans remember their lives better. Already today, mobile and wearable devices allow people to create rich logs of their daily experiences in the form of photos, videos, GPS traces, or even physiological data. This activity is often called "lifelogging", and has led to the so-called "quantified self" movement where people capture detailed traces of their everyday lives in order to better understand themselves. An interesting avenue to explore in this context is the possibility of capturing lifelog data for the sake of augmenting one's memory. Contemporary psychology theory suggests that captured experiences of daily events can be used to generate cues (hints) which, when reviewed, can improve subsequent long-term recall of these memories. However, limitations of on-body placement of wearable devices can yield poor quality data and restricts capture to a first-person perspective. The focus of this work is to enable the secure and automatic exchange of one's lifelog streams with both co-located peers and any available capture devices in an IoT infrastructure, in order to construct a more comprehensive representation of a previous experience, which can thus help one to create more effective cues. We present a privacy-aware architecture for this exchange and report on a proof-of-concept prototype implementation.

References

  1. Vannevar Bush. 1967. As we may think. The growth of knowledge: readings on organization and retrieval of information (1967), 23--35.Google ScholarGoogle Scholar
  2. Daragh Byrne, Aisling Kelliher, and Gareth J.F. Jones. 2011. Life Editing: Third-party Perspectives on Lifelog Content. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 1501--1510. DOI: http://dx.doi.org/10.1145/1978942.1979162 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sarah Clinch, Nigel Davies, Mateusz Mikusz, Paul Metzger, Marc Langheinrich, Albrecht Schmidt, and Geoff Ward. The Big Picture: Lessons Learned from Collecting Shared Experiences through Lifelogging. (????). http://www.research.lancs.ac.uk/portal/services/downloadRegister/106871999/PC_PC_2015_02_0011.R1_Clinch.pdfGoogle ScholarGoogle Scholar
  4. Sarah Clinch, Paul Metzger, and Nigel Davies. 2014. Lifelogging for 'Observer' View Memories: An Infrastructure Approach. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 1397--1404. DOI:http://dx.doi.org/10.1145/2638728.2641721 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Davies, A. Friday, S. Clinch, C. Sas, M. Langheinrich, G. Ward, and A. Schmidt. 2015. Security and Privacy Implications of Pervasive Memory Augmentation. IEEE Pervasive Computing 14, 1 (Jan. 2015), 44--53. DOI: http://dx.doi.org/10.1109/MPRV.2015.13Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yevgeniy Dodis and Nelly Fazio. 2002. Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management, Joan Feigenbaum (Ed.). Number 2696 in Lecture Notes in Computer Science. Springer Berlin Heidelberg, 61--80. http://link.springer.com/chapter/10.1007/978-3-540-44993-5_5 DOI: 10.1007/978-3-540-44993-5_5.Google ScholarGoogle ScholarCross RefCross Ref
  7. A. Fathi, J. K. Hodgins, and J. M. Rehg. 2012. Social interactions: A first-person perspective. In 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1226--1233. DOI: http://dx.doi.org/10.1109/CVPR.2012.6247805 Google ScholarGoogle ScholarCross RefCross Ref
  8. Jim Gemmell, Gordon Bell, and Roger Lueder. 2006. MyLifeBits: A Personal Database for Everything. Commun. ACM 49, 1 (Jan. 2006), 88--95. DOI: http://dx.doi.org/10.1145/1107458.1107460 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jim Gemmell, Lyndsay Williams, Ken Wood, Roger Lueder, and Gordon Bell. 2004. Passive Capture and Ensuing Issues for a Personal Lifetime Store. In Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (CARPE'04). ACM, New York, NY, USA, 48--55. DOI: http://dx.doi.org/10.1145/1026653.1026660 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Martin Georgiev and Vitaly Shmatikov. 2016. Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. arXiv:1604.02734 {cs} (April 2016). http://arxiv.org/abs/1604.02734 arXiv: 1604.02734.Google ScholarGoogle Scholar
  11. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645 --1660. DOI: http://dx.doi.org/10.1016/j.future.2013.01.010 Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications -- Big Data, Scalable Analytics, and Beyond. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Isam Ishaq, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman, and Piet Demeester. 2013. IETF Standardization in the Field of the Internet of Things (IoT): A Survey. Journal of Sensor and Actuator Networks 2, 2 (2013), 235. DOI: http://dx.doi.org/10.3390/jsan2020235Google ScholarGoogle ScholarCross RefCross Ref
  13. M Victoria Moreno, Miguel A Zamora, and Antonio F Skarmeta. 2015. An IoT based framework for user--centric smart building services. International Journal of Web and Grid Services 11, 1 (2015), 78--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Toshiya Nakakura, Yasuyuki Sumi, and Toyoaki Nishida. 2009. Neary: Conversation Field Detection Based on Similarity of Auditory Situation. In Proceedings of the 10th Workshop on Mobile Computing Systems and Applications (HotMobile '09). ACM, New York, NY, USA, 14:1--14:6. DOI: http://dx.doi.org/10.1145/1514411.1514423 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios V Vasilakos, Julie A McCann, and Kin K Leung. 2013. A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications 20, 6 (2013), 91--98.Google ScholarGoogle ScholarCross RefCross Ref
  16. Wai-Tian Tan, Mary Baker, Bowon Lee, and Ramin Samadani. 2013. The Sound of Silence. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13). ACM, New York, NY, USA, 19:1--19:14. DOI: http://dx.doi.org/10.1145/2517351.2517362Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, and Petteri Nurmi. 2015. Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. Selected Papers from the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014) 16, Part B (Jan. 2015), 187--204. DOI: http://dx.doi.org/10.1016/j.pmcj.2014.10.005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Chenren Xu, Sugang Li, Gang Liu, Yanyong Zhang, Emiliano Miluzzo, Yih-Farn Chen, Jun Li, and Bernhard Firner. 2013. Crowd++: Unsupervised Speaker Count with Smartphones. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '13). ACM, New York, NY, USA, 43--52. DOI: http://dx.doi.org/10.1145/2493432.2493435 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure Personal Memory-Sharing with Co-located People and Places
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            IoT '16: Proceedings of the 6th International Conference on the Internet of Things
            November 2016
            186 pages
            ISBN:9781450348140
            DOI:10.1145/2991561

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 November 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate28of84submissions,33%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader