Skip to main content

A Privacy-Orientated Distributed Data Storage Model for Smart Homes

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14045))

Included in the following conference series:

  • 1367 Accesses

  • 2 Citations

Abstract

With the wide adoption of smart home devices, users are concerned with what sensitive data these devices may be collecting and what that data may be used for. This paper proposes a way to reduce the level of dis-trust between the end-users and the companies that offer smart home hard-ware and/or personalised software services by allowing end-users to retain an optimal degree of control over their personal data (such as voice and video recordings) which is typically collected by the service provider and stored on the service provider’s cloud platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 96.29
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 128.39
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

') var buybox = document.querySelector("[data-id=id_"+ timestamp +"]").parentNode var buyingOptions = buybox.querySelectorAll(".buying-option") ;[].slice.call(buyingOptions).forEach(initCollapsibles) var buyboxMaxSingleColumnWidth = 480 function initCollapsibles(subscription, index) { var toggle = subscription.querySelector(".buying-option-price") subscription.classList.remove("expanded") var form = subscription.querySelector(".buying-option-form") var priceInfo = subscription.querySelector(".price-info") var buyingOption = toggle.parentElement if (toggle && form && priceInfo) { toggle.setAttribute("role", "button") toggle.setAttribute("tabindex", "0") toggle.addEventListener("click", function (event) { var expandedBuyingOptions = buybox.querySelectorAll(".buying-option.expanded") var buyboxWidth = buybox.offsetWidth ;[].slice.call(expandedBuyingOptions).forEach(function(option) { if (buyboxWidth buyboxMaxSingleColumnWidth) { toggle.click() } else { if (index === 0) { toggle.click() } else { toggle.setAttribute("aria-expanded", "false") form.hidden = "hidden" priceInfo.hidden = "hidden" } } }) } initialStateOpen() if (window.buyboxInitialised) return window.buyboxInitialised = true initKeyControls() })()

Institutional subscriptions

Similar content being viewed by others

Change history

  • 09 July 2023

    A correction has been published.

References

  1. Atlam, H.F., Wills, G.B.: Technical aspects of blockchain and IoT. In: Advances in Computers, pp. 1–39. Elsevier (2019). https://doi.org/10.1016/bs.adcom.2018.10.006

  2. Average number of connected devices residents have access to in U.S. households in 2020. https://tinyurl.com/mpfte866

  3. IoT Architecture: the Pathway from Physical Signals to Business Decisions. https://tinyurl.com/2p93wjhc

  4. Adadi, A.: A survey on data‐efficient algorithms in big data era. J. Big Data 8(1), 1–54 (2021). https://doi.org/10.1186/s40537-021-00419-9

    Article  Google Scholar 

  5. Rosado, D.G., Gomez, R., Mellado, D., Fernandez-M.E.: Security analysis in the migration to cloud environments. Future Internet 4, 469–487 (2012). https://doi.org/10.1109/EST.2013.13

  6. Lebea, K., Leung, W.S.: A model for context-driven authentication in physical access control environments. In: Kim, K.J., Kim, H.-Y. (eds.) Information Science and Applications. LNEE, vol. 621, pp. 319–328. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-1465-4_33

    Chapter  Google Scholar 

  7. Smart home privacy: How to avoid data paparazzi. https://tinyurl.com/3t9tkccr

  8. Wang, P., Ye, F., Chen, X.: Smart devices information extraction in home Wi- Fi networks. Internet Technol. Lett. 42 (2018). https://doi.org/10.1002/itl2.42

  9. Wang, P., Chen, X., Ye, F., Sun, Z.: A smart automated signature extraction scheme for mobile phone number in human-centered smart home systems. EEE Access 6, 30483–30490 (2018). https://doi.org/10.1109/ACCESS.2018.2841878

    Article  Google Scholar 

  10. Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)

    Article  Google Scholar 

  11. Bertino, E.: Data security and privacy in the IoT. In: EDBT (2016)

    Google Scholar 

  12. Tabassum, M., Kosinski, T., Lipford, H.R.: “I don’t own the data”: end user perceptions of smart home device data practices and risks. In: Fifteenth Symposium on Usable Privacy and Security, pp. 435–450. SOUPS (2019). https://doi.org/10.1109/ISSA.2016.7802925

  13. Choosing a Smart Home Hub?—Why Cloud vs Local Matters. https://tinyurl.com/sex5rpcm

  14. Guhr, N., Werth, O., Blacha, P.P.H., Breitner, M.H.: Privacy concerns in the smart home context. SN Appl. Sci. 2, 1–12 (2020)

    Article  Google Scholar 

  15. Smart Home and Data Protection: Between Convenience and Security. https://tinyurl.com/399fkt6u

  16. Suresh, S., Sruthi, P.V.: A review on smart home technology. In: 2015 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1–3. IEEE (2015)

    Google Scholar 

  17. What are the benefits of home automation?. https://tinyurl.com/tbazmxem

  18. ADT Survey Reveals Strong Consumer Expectations for Smart Home Privacy Protections. https://tinyurl.com/5yf3hrxx

  19. Wyze knew for years that hackers could remotely access its cameras, but didn’t tell anyone. https://tinyurl.com/t5nmk7b8

  20. A Losing Game: The Law is Struggling to Keep Up With Technology. https://tinyurl.com/ynz4ce3n

  21. Information Regulator in South Africa. https://tinyurl.com/36h7hp2v

  22. Apple Says its Updated, Opt-In Prompts for User Data Tracking on iOS will Come into Effect. Next Week. https://tinyurl.com/4kdjyzhh

  23. What you should know about smart home data collection. https://tinyurl.com/2tdjh4xn

  24. Revenue Model Types in Software Business: Examples and Model Choice. https://tinyurl.com/fm882rbp.

  25. The case for building a data-sharing culture in your company. https://tinyurl.com/mwa4kste

  26. Many smart home device makers still won’t say if they give your data to the government. https://tinyurl.com/336s9sa5

  27. New Amazon Echo devices will have local voice processing, giving users more privacy. https://tinyurl.com/mwtfp3fc

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wai Sze Leung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lebea, K., Leung, W.S. (2023). A Privacy-Orientated Distributed Data Storage Model for Smart Homes. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. https://doi.org/10.1007/978-3-031-35822-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35822-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35821-0

  • Online ISBN: 978-3-031-35822-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics