skip to main content
10.1145/3173574.3174117acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage

Published:21 April 2018Publication History

ABSTRACT

Users have accumulated years of personal data in cloud storage, creating potential privacy and security risks. This agglomeration includes files retained or shared with others simply out of momentum, rather than intention. We presented 100 online-survey participants with a stratified sample of 10 files currently stored in their own Dropbox or Google Drive accounts. We asked about the origin of each file, whether the participant remembered that file was stored there, and, when applicable, about that file's sharing status. We also recorded participants' preferences moving forward for keeping, deleting, or encrypting those files, as well as adjusting sharing settings. Participants had forgotten that half of the files they saw were in the cloud. Overall, 83% of participants wanted to delete at least one file they saw, while 13% wanted to unshare at least one file. Our combined results suggest directions for retrospective cloud data management.

Skip Supplemental Material Section

Supplemental Material

References

  1. Ibrahim Arpaci, Kerem Kilicer, and Salih Bardakci. 2015. Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior 45 (2015), 93--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Oshrat Ayalon and Eran Toch. 2013. Retrospective privacy: Managing longitudinal privacy in online social networks. In Proc. SOUPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Taiwo Ayodele, Galyna Akmayeva, and Charles A. Shoniregun. 2012. Machine learning approach towards email management. In Proc. World Congress on Internet Security (WorldCIS). 106--109.Google ScholarGoogle Scholar
  4. Olle Balter. 1997. Strategies for organising email messages. In Proc. HCI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Deborah Barreau and Bonnie A. Nardi. 1995. Finding and reminding: File organization from the desktop. ACM SigChi Bulletin 27, 3 (1995), 39--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Deborah K. Barreau. 1995. Context as a factor in personal information management systems. Journal of the American Society for Information Science 46, 5 (1995), 327. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, and Blase Ur. 2013. The post anachronism: The temporal dimension of Facebook privacy. In Proc. WPES. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Victoria Bellotti, Nicolas Ducheneaut, Mark Howard, Ian Smith, and Christine Neuwirth. 2002. Innovation in extremis: Evolving an application for the critical work of email and information management. In Proc. DIS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ofer Bergman, Richard Boardman, Jacek Gwizdka, and William Jones. 2004. Personal information management. In Proc. CHI Extended Abstracts. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ofer Bergman, Steve Whittaker, and Noa Falk. 2014. Shared files: The retrieval perspective. Journal of the Association for Information Science&Technology 65, 10 (2014), 1949--1963. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Richard Boardman and M. Angela Sasse. 2004. Stuff goes into the computer and doesn't come out: A cross-tool study of personal information management. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Richard Boardman, Robert Spence, and M. Angela Sasse. 2003. Too many hierarchies? The daily struggle for control of the workspace. In Proc. HCII.Google ScholarGoogle Scholar
  13. Richard Peter Boardman. 2004. Improving tool support for personal information management. Ph.D. Dissertation. University of London.Google ScholarGoogle Scholar
  14. Dell Cameron. 2014. Apple knew of iCloud security hole 6 months before Celebgate. The Daily Dot. (September 24 2014). http://www.dailydot.com/technology/appleicloud-brute-force-attack-march/.Google ScholarGoogle Scholar
  15. Robert Capra, Emily Vardell, and Kathy Brennan. 2014. File synchronization and sharing: User practices and challenges. In Proc. ASIS&T.Google ScholarGoogle ScholarCross RefCross Ref
  16. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina. 2009. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proc. CCSW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich. 2015. I Saw Images I Didn't Even Know I Had: Understanding User Perceptions of Cloud Storage Privacy. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Idilio Drago, Marco Mellia, Maurizio M. Munaf` o, Anna Sperotto, Ramin Sadre, and Aiko Pras. 2012. Inside Dropbox: Understanding personal cloud storage services. In Proc. IMC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Susan Dumais, Edward Cutrell, Jonathan J. Cadiz, Gavin Jancke, Raman Sarin, and Daniel C. Robbins. 2016. Stuff I've seen: A system for personal information retrieval and re-use. In ACM SIGIR Forum, Vol. 49. 28--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy personas: Clustering users via attitudes and behaviors toward security practices. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Global Industry Analysts. Inc. Accessed 2017. Personal cloud-A global strategic business report. http://www.strategyr.com/MarketResearch/Personal_Cloud_Market_Trends.asp. (Accessed 2017).Google ScholarGoogle Scholar
  22. Glauber Gonc ¸alves, Idilio Drago, Ana Paula Couto Da Silva, Alex Borges Vieira, and Jussara M. Almeida. 2014. Modeling the Dropbox client behavior. In Proc. ICC.Google ScholarGoogle Scholar
  23. Graham Cluley. Accessed 2017. Dropbox users leak tax returns, mortgage applications and more. https://www.grahamcluley.com/dropbox-box-leak/. (Accessed 2017).Google ScholarGoogle Scholar
  24. Jane Gruning and Sian Lindley. 2016. Things we own together: Sharing possessions at home. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Drew Houston and Arash Ferdowsi. 2016. Celebrating half a billion users. https: //blogs.dropbox.com/dropbox/2016/03/500-million/. (2016).Google ScholarGoogle Scholar
  26. Wenjin Hu, Tao Yang, and Jeanna N. Matthews. 2010. The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Operating Systems Review 44, 3 (2010), 110--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, and Srdjan Capkun. 2011. Home is safer than the cloud!: Privacy concerns for consumer cloud storage. In Proc. SOUPS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Eric Johnson. 2017. Lost in the cloud: Cloud storage, privacy, and suggestions for protecting users' data. Stan. L. Rev. 69 (2017), 867.Google ScholarGoogle Scholar
  29. Victor Kaptelinin. 2003. UMEA: Translating interaction histories into project contexts. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Beom Heyn Kim, Wei Huang, and David Lie. 2012. Unity: Secure and durable personal cloud storage. In Proc. CCSW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Felix Kollmar. 2017. Cloud Storage Report 2017. https://blog.cloudrail.com/cloud-storage-report-2017/. (2017).Google ScholarGoogle Scholar
  32. Mark W. Lansdale. 1988. The psychology of personal information management. Applied ergonomics 19, 1 (1988), 55--66.Google ScholarGoogle Scholar
  33. Cathy Marshall and John C. Tang. 2012. That syncing feeling: Early user experiences with the cloud. In Proc. DIS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Charlotte Massey, Thomas Lennig, and Steve Whittaker. 2014. Cloudy forecast: An exploration of the factors underlying shared repository use. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Peter Mell, Tim Grance, and others. 2011. The NIST definition of cloud computing. (2011).Google ScholarGoogle Scholar
  36. Adriana Mijuskovic and Mexhid Ferati. 2015. User awareness of existing privacy and security risks when storing data in the cloud. In Proc. ICEL.Google ScholarGoogle Scholar
  37. Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2017. Longitudinal Privacy Management in Social Media: The Need for Better Controls. IEEE Internet Computing 21, 3 (2017), 48--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Michael Nebeling, Matthias Geel, Oleksiy Syrotkin, and Moira C. Norrie. 2015. MUBox: Multi-user aware personal cloud storage. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Emilee Rader. 2010. The effect of audience design on labeling, organizing, and finding shared files. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Kopo Marvin Ramokapane, Awais Rashid, and Jose Such. 2017. "I feel stupid I can't delete...": A study of users' cloud deletion practices and coping strategies. In Proc. SOUPS.Google ScholarGoogle Scholar
  41. Esther Schindler. July 2010. Cloud development survey. Evans Data Corporation Strategic Reports. (July 2010).Google ScholarGoogle Scholar
  42. Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, and Michelle L Mazurek. 2016. Sharing personal content online: Exploring channel choice and multi-channel behaviors. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Peter Snyder and Chris Kanich. 2013. Cloudsweeper: Enabling data-centric document management for secure cloud archives. In Proc. CCSW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Luke Stark and Matt Tierney. 2014. Lockbox: Mobility, privacy and values in cloud storage. Ethics and Information Technology 16, 1 (2014), 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Nabil Ahmed Sultan. 2011. Reaching for the cloud: How SMEs can manage. International journal of information management 31, 3 (2011), 272--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Steve Whittaker, Victoria Bellotti, and Jacek Gwizdka. 2006. Email in personal information management. Commun. ACM 49, 1 (2006), 68--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Steve Whittaker and Candace Sidner. 1996. Email overload: Exploring personal information management of email. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Hong Zhang and Michael Twidale. 2012. Mine, yours and ours: Using shared folders in personal information management. Personal Information Management (PIM) (2012).Google ScholarGoogle Scholar
  49. Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara Alwaalan, Stephen Voida, and Dan Cosley. 2013. The many faces of Facebook: Experiencing social media as performance, exhibition, and personal archive. In Proc. CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
      April 2018
      8489 pages
      ISBN:9781450356206
      DOI:10.1145/3173574

      Copyright © 2018 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 April 2018

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '18 Paper Acceptance Rate666of2,590submissions,26%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader