• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网隐私风险暴露。

IoT Privacy Risks Revealed.

作者信息

Chang Kai-Chih, Niu Haoran, Kim Brian, Barber Suzanne

机构信息

Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX 78712, USA.

出版信息

Entropy (Basel). 2024 Jun 29;26(7):561. doi: 10.3390/e26070561.

DOI:10.3390/e26070561
PMID:39056923
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11275614/
Abstract

A user's devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user's devices. These IoT devices may or may not seek explicit user consent, thus leaving the users completely unaware the IoT device is collecting, using, and/or sharing their personal data or, only marginal informed, if the user consented to the connecting IoT device but did not read the associated privacy policies. Privacy policies are intended to inform users of what personally identifiable information (PII) data will be collected about them and the policies about how those PII data will be used and shared. This paper presents novel tools and the underlying algorithms employed by the Personal Privacy Assistant app (UTCID PPA) developed by the University of Texas at Austin Center for Identity to inform users of IoT devices seeking to connect to their devices and to notify those users of potential privacy risks posed by the respective IoT device. The assessment of these privacy risks must deal with the uncertainty associated with sharing the user's personal data. If privacy risk (R) equals the consequences (C) of an incident (i.e., personal data exposure) multiplied by the probability (P) of those consequences occurring (C × P), then efforts to control risks must seek to reduce the possible consequences of an incident as well as reduce the uncertainty of the incident and its consequences occurring. This research classifies risk according to two parameters: expected value of the incident's consequences and uncertainty (entropy) of those consequences. This research calculates the entropy of the privacy incident consequences by evaluating: (1) the data sharing policies governing the IoT resource and (2) the type of personal data exposed. The data sharing policies of an IoT resource are scored by the UTCID PrivacyCheck, which uses machine learning to read and score the IoT resource privacy policies against metrics set forth by best practices and international regulations. The UTCID Identity Ecosystem uses empirical identity theft and fraud cases to assess the entropy of privacy incident consequences involving a specific type of personal data, such as name, address, Social Security number, fingerprint, and user location. By understanding the entropy of a privacy incident posed by a given IoT resource seeking to connect to a user's device, UTCID PPA offers actionable recommendations enhancing the user's control over IoT connections, interactions, their personal data, and, ultimately, user-centric privacy control.

摘要

用户的手机和电脑等设备不断受到物联网设备及相关应用程序的轰炸,这些设备试图连接到用户的设备。这些物联网设备可能会也可能不会寻求用户的明确同意,从而使用户完全不知道物联网设备正在收集、使用和/或共享他们的个人数据,或者,如果用户同意连接物联网设备但没有阅读相关隐私政策,他们只是略有了解。隐私政策旨在告知用户将收集哪些关于他们的个人身份信息(PII)数据,以及关于这些PII数据将如何使用和共享的政策。本文介绍了德克萨斯大学奥斯汀分校身份中心开发的个人隐私助手应用程序(UTCID PPA)所采用的新颖工具和底层算法,以告知用户有哪些物联网设备试图连接到他们的设备,并通知这些用户各自的物联网设备可能带来的隐私风险。对这些隐私风险的评估必须应对与共享用户个人数据相关的不确定性。如果隐私风险(R)等于事件(即个人数据泄露)的后果(C)乘以这些后果发生的概率(P)(C×P),那么控制风险的努力必须寻求减少事件的可能后果,以及降低事件及其后果发生的不确定性。本研究根据两个参数对风险进行分类:事件后果的期望值和这些后果的不确定性(熵)。本研究通过评估以下内容来计算隐私事件后果的熵:(1)管理物联网资源的数据共享政策;(2)暴露的个人数据类型。物联网资源的数据共享政策由UTCID PrivacyCheck评分,该工具使用机器学习根据最佳实践和国际法规设定的指标来读取和评分物联网资源隐私政策。UTCID身份生态系统使用身份盗窃和欺诈的实际案例来评估涉及特定类型个人数据(如姓名、地址、社会保障号码、指纹和用户位置)的隐私事件后果的熵。通过了解给定的试图连接到用户设备的物联网资源所带来的隐私事件的熵,UTCID PPA提供可操作的建议,以增强用户对物联网连接、交互、其个人数据的控制,并最终实现以用户为中心的隐私控制。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/edc8ec707296/entropy-26-00561-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/62da57fe7afe/entropy-26-00561-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/2843b714800c/entropy-26-00561-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/ecdda025a7da/entropy-26-00561-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/5aec1a2caf45/entropy-26-00561-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/54ad388fda80/entropy-26-00561-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/0627f881e8e9/entropy-26-00561-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/f0a9ac77acc7/entropy-26-00561-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/42404a15f208/entropy-26-00561-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/ec91d80a08ff/entropy-26-00561-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/085c5c15c7d8/entropy-26-00561-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/edc8ec707296/entropy-26-00561-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/62da57fe7afe/entropy-26-00561-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/2843b714800c/entropy-26-00561-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/ecdda025a7da/entropy-26-00561-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/5aec1a2caf45/entropy-26-00561-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/54ad388fda80/entropy-26-00561-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/0627f881e8e9/entropy-26-00561-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/f0a9ac77acc7/entropy-26-00561-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/42404a15f208/entropy-26-00561-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/ec91d80a08ff/entropy-26-00561-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/085c5c15c7d8/entropy-26-00561-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bea3/11275614/edc8ec707296/entropy-26-00561-g011.jpg

相似文献

1
IoT Privacy Risks Revealed.物联网隐私风险暴露。
Entropy (Basel). 2024 Jun 29;26(7):561. doi: 10.3390/e26070561.
2
Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic.检测加密 IoT 应用程序流量中的 IoT 用户行为和敏感信息。
Sensors (Basel). 2019 Nov 3;19(21):4777. doi: 10.3390/s19214777.
3
Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things.个性化隐私助手:物联网中的身份构建与隐私
Entropy (Basel). 2023 Apr 26;25(5):717. doi: 10.3390/e25050717.
4
User Recommendation for Data Sharing in Social Internet of Things.社交物联网中数据共享的用户推荐
Sensors (Basel). 2021 Jan 11;21(2):462. doi: 10.3390/s21020462.
5
Security and Privacy for Mobile IoT Applications Using Blockchain.使用区块链的移动物联网应用的安全与隐私
Sensors (Basel). 2021 Sep 3;21(17):5931. doi: 10.3390/s21175931.
6
Privacy Policies of IoT Devices: Collection and Analysis.物联网设备的隐私政策:收集与分析。
Sensors (Basel). 2022 Feb 25;22(5):1838. doi: 10.3390/s22051838.
7
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
8
User Control of Personal mHealth Data Using a Mobile Blockchain App: Design Science Perspective.用户使用移动区块链应用程序控制个人健康数据:设计科学视角。
JMIR Mhealth Uhealth. 2022 Jan 20;10(1):e32104. doi: 10.2196/32104.
9
Ethical Design in the Internet of Things.物联网中的伦理设计。
Sci Eng Ethics. 2018 Jun;24(3):905-925. doi: 10.1007/s11948-016-9754-5. Epub 2016 Jan 21.
10
Understanding perspectives for product design on personal data privacy in internet of things (IoT): A systematic literature review (SLR).了解物联网(IoT)中个人数据隐私的产品设计视角:一项系统文献综述(SLR)。
Heliyon. 2024 Apr 25;10(9):e30357. doi: 10.1016/j.heliyon.2024.e30357. eCollection 2024 May 15.

本文引用的文献

1
Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things.个性化隐私助手:物联网中的身份构建与隐私
Entropy (Basel). 2023 Apr 26;25(5):717. doi: 10.3390/e25050717.
2
Reviewing the data security and privacy policies of mobile apps for depression.审视抑郁症移动应用程序的数据安全与隐私政策。
Internet Interv. 2018 Dec 20;15:110-115. doi: 10.1016/j.invent.2018.12.001. eCollection 2019 Mar.