smart home technologies privacy. data security and privacy security deals with the assurance of a...
TRANSCRIPT
![Page 1: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/1.jpg)
Smart Home Technologies
Privacy
![Page 2: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/2.jpg)
Data Security and Privacy Security deals with the assurance of a
set of rules set to protect privacy Prevent access to the environment Prevent unauthorized access to data
Privacy deals with the subjective, culture-dependent setting of standards that regulate what is publicly accessible Determine who should have access to what Where are the limits for public access ?
![Page 3: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/3.jpg)
Privacy in Intelligent Environments
Privacy in intelligent environments
encompasses many aspects
Which data should be private ?
Who should have access ?
What means of information gathering can be
used ?
![Page 4: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/4.jpg)
Types of Privacy Bodily Privacy
Strip Searches, Drug Testing, … Territorial Privacy
Privacy Of Your Home, Office, … Privacy Of Communications
Phone Calls, E-mail, … Informational Privacy
Personal Data (Name, Address, Hobbies, …)
![Page 5: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/5.jpg)
Perception of Privacy
![Page 6: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/6.jpg)
Factors for Perception of Privacy Threats Scale of data collection
To What Extend Is My Life Visible To Others? Manner in which the data is collected
How Obviously Is Data Collected? Type of data collected
What Type Of Data Is Recorded? Reason for data collection
What Are The Driving Factors? Accessibility of information in data
How Do I Find Anything in this Data?
![Page 7: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/7.jpg)
Examples of Non-IntrusiveData Collection Tools
![Page 8: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/8.jpg)
Example: Bodymedia
![Page 9: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/9.jpg)
Security and Privacy-Aware Environments Security measures for access authentication
are not sufficient in intelligent environments Access to information inside the environment has
to be limited Multiple inhabitants should have access to different parts
of the available information Home interfaces and displays have to follow
privacy rules Interfaces can not display private information
Access inside the environment might have to be restricted
Private spaces in office environments Access restrictions to ensure safety of inhabitants
![Page 10: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/10.jpg)
Remote Interface Example: Georgia Tech Aware Home Actual Environment:
Pressure sensitive floors
Microphone arrays Video cameras
![Page 11: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/11.jpg)
Remote Interface Example: Georgia Tech Aware Home Family Portraits:
Summarize daily activityand long-term trends iconically
Limits access to information Provides peace of mind for adult children
![Page 12: Smart Home Technologies Privacy. Data Security and Privacy Security deals with the assurance of a set of rules set to protect privacy Prevent access to](https://reader035.vdocument.in/reader035/viewer/2022070414/5697c0231a28abf838cd4317/html5/thumbnails/12.jpg)
Privacy in Intelligent Interfaces Interface should only display the required
information Hide sensory data
E.g. no video data, no exact data on current actions Only display result of processing
E.g. only display if everything is ok
Interface structure should reflect the necessary information Interfaces have to be practical and easy to use without
revealing information E.g. only display static, pre-recorded image of person