ABSTRACT
The abundance of interconnected devices in the Internet of Things (IoT) offers a powerful vision on how automated capture systems can aid humans remember their lives better. Already today, mobile and wearable devices allow people to create rich logs of their daily experiences in the form of photos, videos, GPS traces, or even physiological data. This activity is often called "lifelogging", and has led to the so-called "quantified self" movement where people capture detailed traces of their everyday lives in order to better understand themselves. An interesting avenue to explore in this context is the possibility of capturing lifelog data for the sake of augmenting one's memory. Contemporary psychology theory suggests that captured experiences of daily events can be used to generate cues (hints) which, when reviewed, can improve subsequent long-term recall of these memories. However, limitations of on-body placement of wearable devices can yield poor quality data and restricts capture to a first-person perspective. The focus of this work is to enable the secure and automatic exchange of one's lifelog streams with both co-located peers and any available capture devices in an IoT infrastructure, in order to construct a more comprehensive representation of a previous experience, which can thus help one to create more effective cues. We present a privacy-aware architecture for this exchange and report on a proof-of-concept prototype implementation.
- Vannevar Bush. 1967. As we may think. The growth of knowledge: readings on organization and retrieval of information (1967), 23--35.Google Scholar
- Daragh Byrne, Aisling Kelliher, and Gareth J.F. Jones. 2011. Life Editing: Third-party Perspectives on Lifelog Content. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 1501--1510. DOI: http://dx.doi.org/10.1145/1978942.1979162 Google ScholarDigital Library
- Sarah Clinch, Nigel Davies, Mateusz Mikusz, Paul Metzger, Marc Langheinrich, Albrecht Schmidt, and Geoff Ward. The Big Picture: Lessons Learned from Collecting Shared Experiences through Lifelogging. (????). http://www.research.lancs.ac.uk/portal/services/downloadRegister/106871999/PC_PC_2015_02_0011.R1_Clinch.pdfGoogle Scholar
- Sarah Clinch, Paul Metzger, and Nigel Davies. 2014. Lifelogging for 'Observer' View Memories: An Infrastructure Approach. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 1397--1404. DOI:http://dx.doi.org/10.1145/2638728.2641721 Google ScholarDigital Library
- N. Davies, A. Friday, S. Clinch, C. Sas, M. Langheinrich, G. Ward, and A. Schmidt. 2015. Security and Privacy Implications of Pervasive Memory Augmentation. IEEE Pervasive Computing 14, 1 (Jan. 2015), 44--53. DOI: http://dx.doi.org/10.1109/MPRV.2015.13Google ScholarDigital Library
- Yevgeniy Dodis and Nelly Fazio. 2002. Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management, Joan Feigenbaum (Ed.). Number 2696 in Lecture Notes in Computer Science. Springer Berlin Heidelberg, 61--80. http://link.springer.com/chapter/10.1007/978-3-540-44993-5_5 DOI: 10.1007/978-3-540-44993-5_5.Google ScholarCross Ref
- A. Fathi, J. K. Hodgins, and J. M. Rehg. 2012. Social interactions: A first-person perspective. In 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1226--1233. DOI: http://dx.doi.org/10.1109/CVPR.2012.6247805 Google ScholarCross Ref
- Jim Gemmell, Gordon Bell, and Roger Lueder. 2006. MyLifeBits: A Personal Database for Everything. Commun. ACM 49, 1 (Jan. 2006), 88--95. DOI: http://dx.doi.org/10.1145/1107458.1107460 Google ScholarDigital Library
- Jim Gemmell, Lyndsay Williams, Ken Wood, Roger Lueder, and Gordon Bell. 2004. Passive Capture and Ensuing Issues for a Personal Lifetime Store. In Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (CARPE'04). ACM, New York, NY, USA, 48--55. DOI: http://dx.doi.org/10.1145/1026653.1026660 Google ScholarDigital Library
- Martin Georgiev and Vitaly Shmatikov. 2016. Gone in Six Characters: Short URLs Considered Harmful for Cloud Services. arXiv:1604.02734 {cs} (April 2016). http://arxiv.org/abs/1604.02734 arXiv: 1604.02734.Google Scholar
- Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645 --1660. DOI: http://dx.doi.org/10.1016/j.future.2013.01.010 Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications -- Big Data, Scalable Analytics, and Beyond. Google ScholarDigital Library
- Isam Ishaq, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman, and Piet Demeester. 2013. IETF Standardization in the Field of the Internet of Things (IoT): A Survey. Journal of Sensor and Actuator Networks 2, 2 (2013), 235. DOI: http://dx.doi.org/10.3390/jsan2020235Google ScholarCross Ref
- M Victoria Moreno, Miguel A Zamora, and Antonio F Skarmeta. 2015. An IoT based framework for user--centric smart building services. International Journal of Web and Grid Services 11, 1 (2015), 78--101. Google ScholarDigital Library
- Toshiya Nakakura, Yasuyuki Sumi, and Toyoaki Nishida. 2009. Neary: Conversation Field Detection Based on Similarity of Auditory Situation. In Proceedings of the 10th Workshop on Mobile Computing Systems and Applications (HotMobile '09). ACM, New York, NY, USA, 14:1--14:6. DOI: http://dx.doi.org/10.1145/1514411.1514423 Google ScholarDigital Library
- Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios V Vasilakos, Julie A McCann, and Kin K Leung. 2013. A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications 20, 6 (2013), 91--98.Google ScholarCross Ref
- Wai-Tian Tan, Mary Baker, Bowon Lee, and Ramin Samadani. 2013. The Sound of Silence. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13). ACM, New York, NY, USA, 19:1--19:14. DOI: http://dx.doi.org/10.1145/2517351.2517362Google ScholarDigital Library
- Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, and Petteri Nurmi. 2015. Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. Selected Papers from the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014) 16, Part B (Jan. 2015), 187--204. DOI: http://dx.doi.org/10.1016/j.pmcj.2014.10.005 Google ScholarDigital Library
- Chenren Xu, Sugang Li, Gang Liu, Yanyong Zhang, Emiliano Miluzzo, Yih-Farn Chen, Jun Li, and Bernhard Firner. 2013. Crowd++: Unsupervised Speaker Count with Smartphones. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '13). ACM, New York, NY, USA, 43--52. DOI: http://dx.doi.org/10.1145/2493432.2493435 Google ScholarDigital Library
Index Terms
- Secure Personal Memory-Sharing with Co-located People and Places
Recommendations
Understanding lifelog sharing preferences of lifeloggers
OzCHI '16: Proceedings of the 28th Australian Conference on Computer-Human InteractionThe lifelogging activity enables users, the lifeloggers, to passively capture images using wearable cameras from a first person perspective and ultimately create a visual diary encoding every possible aspect of their life with unprecedented details. ...
Reading-based Screenshot Summaries for Supporting Awareness of Desktop Activities
AH '16: Proceedings of the 7th Augmented Human International Conference 2016Lifelogging augments people's ability to keep track of their daily activities and helps them create rich archives and foster memory. Information workers perform a lot of their key activities throughout the day on their desktop computers. We argue that ...
Lifelogging memory appliance for people with episodic memory impairment
UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computingLifelogging technologies have the potential to provide memory cues for people who struggle with episodic memory impairment (EMI). These memory cues enable the recollection of significant experiences, which is important for people with EMI to regain a ...
Comments