skip to main content
10.1145/3052973.3055154acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

Enabling End-Users to Protect their Privacy

Published: 02 April 2017 Publication History

Editorial Notes

A corrigendum was issued for this article on December 19, 2018. You can download the corrigendum from the supplemental materials section of this citation page.

Abstract

In this paper we present our ongoing work to build an approach to empower users of IoT-based cyber physical systems to protect their privacy by themselves. Our approach allows users to identify the privacy risks involved in sharing private data with a data consumer, assess the value of their private data based on identified risks and take a pragmatic data sharing decision balancing the risks with the benefits generated by the sharing. Our approach features a knowledgebase, called the Privacy Oracle, that exploits the power of the Semantic Web to determine how raw metadata can be combined by data consumers to infer privacy-sensitive information as well as the privacy risks associated with the disclosure of inferred information.

Supplementary Material

PDF File (p905-barhamgi-corrigendum.pdf)
Corrigendum to "POSTER: Enabling End-Users to Protect their Privacy", by by Barhamgi et al., published in ACM ASIA CCS?17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017), pages 905-907

References

[1]
B. Knijnenburg. Simplifying privacy decisions. In ACM RecSys, pages 40--41, 2013.
[2]
C. Li, D. Li, and G. Miklau. A theory of pricing private data. ACM Trans. Database Syst., 39(4):34, 2014.
[3]
S. Sicari and A. Rizzardi. Security, privacy and trust in internet of things. Computer Networks, 76:46--64, 2015.
[4]
M. Yang, Y. Yu, A. K. Bandara, and B. Nuseibeh. Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit. In IEEE TrustCom 2014, pages 45--52, 2014.

Cited By

View all
  • (2023)Data Transparency Design in Internet of Things: A Systematic ReviewInternational Journal of Human–Computer Interaction10.1080/10447318.2023.222899740:18(5003-5025)Online publication date: 18-Jul-2023
  • (2023)An Overview on Security and Privacy Concerns in IoT-Based Smart EnvironmentsSecurity, Privacy and Data Analytics10.1007/978-981-99-3569-7_21(291-309)Online publication date: 19-Aug-2023
  • (2022)A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage, and Disclosure in Own Smart Home EnvironmentsMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-030-94822-1_11(190-206)Online publication date: 8-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
April 2017
952 pages
ISBN:9781450349444
DOI:10.1145/3052973
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2017

Check for updates

Author Tags

  1. iot based smart environments
  2. privacy
  3. privacy ontologies

Qualifiers

  • Poster

Funding Sources

  • ERC Advanced Grant
  • MOST grant
  • QNRF grant NPRP

Conference

ASIA CCS '17
Sponsor:

Acceptance Rates

ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Data Transparency Design in Internet of Things: A Systematic ReviewInternational Journal of Human–Computer Interaction10.1080/10447318.2023.222899740:18(5003-5025)Online publication date: 18-Jul-2023
  • (2023)An Overview on Security and Privacy Concerns in IoT-Based Smart EnvironmentsSecurity, Privacy and Data Analytics10.1007/978-981-99-3569-7_21(291-309)Online publication date: 19-Aug-2023
  • (2022)A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage, and Disclosure in Own Smart Home EnvironmentsMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-030-94822-1_11(190-206)Online publication date: 8-Feb-2022
  • (2021)Enabling User-centered Privacy Controls for Mobile ApplicationsACM Transactions on Internet Technology10.1145/343477721:1(1-24)Online publication date: 30-Jan-2021
  • (2021)A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish PrivacyACM Transactions on Internet Technology10.1145/343150121:1(1-25)Online publication date: 17-Feb-2021
  • (2020)A Survey-Based Exploration of Users’ Awareness and Their Willingness to Protect Their Data with Smart ObjectsPrivacy and Identity Management. Data for Better Living: AI and Privacy10.1007/978-3-030-42504-3_27(427-446)Online publication date: 6-Mar-2020
  • (2019)Addressing Privacy and Security in Connected Health with Fog ComputingProceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good10.1145/3342428.3342654(255-260)Online publication date: 25-Sep-2019
  • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media