Privacy threat model in lifelogging

Md Sadek Ferdous, Soumyadeb Chowdhury, Joemon M. Jose

Research output: Chapter in Book/Published conference outputConference publication

Abstract

The lifelogging activity enables a user, the lifelogger, to passively capture multimodal records from a first-person perspective and ultimately create a visual diary encompassing every possible aspect of her life with unprecedented details. In recent years it has gained popularity among different groups of users. However, the possibility of ubiquitous presence of lifelogging devices especially in private spheres has raised serious concerns with respect to personal privacy. Different practitioners and active researchers in the field of lifelogging have analysed the issue of privacy in lifelogging and proposed different mitigation strategies. However, none of the existing works has considered a well-defined privacy threat model in the domain of lifelogging. Without a proper threat model, any analysis and discussion of privacy threats in lifelogging remains incomplete. In this paper we aim to fill in this gap by introducing a first-ever privacy threat model identifying several threats with respect to lifelogging. We believe that the introduced threat model will be an essential tool and will act as the basis for any further research within this domain.
Original languageEnglish
Title of host publicationProceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16
Place of PublicationNew York, NY (US)
PublisherACM
Pages576-581
Number of pages6
ISBN (Print)978-1-450-34462-3
DOIs
Publication statusPublished - 12 Sept 2016
Event2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - Heidelberg, Germany
Duration: 12 Sept 201616 Sept 2016

Conference

Conference2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Abbreviated titleUbiComp 2016
Country/TerritoryGermany
CityHeidelberg
Period12/09/1616/09/16

Bibliographical note

-Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Copyright is held by the owner/author(s).

Keywords

  • privacy
  • lifelogging
  • threats
  • threat modelling

Fingerprint

Dive into the research topics of 'Privacy threat model in lifelogging'. Together they form a unique fingerprint.
  • Exploring lifelog sharing and privacy

    Chowdhury, S., Ferdous, M. S. & Jose, J. M., 12 Sept 2016, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp '16. New York, NY (US): ACM, p. 553-558 6 p.

    Research output: Chapter in Book/Published conference outputConference publication

    Open Access
    File

Cite this