• No results found

A Privacy-aware Platform for Sharing Personal Information on Wearable Devices

N/A
N/A
Protected

Academic year: 2021

Share "A Privacy-aware Platform for Sharing Personal Information on Wearable Devices"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Procedia Computer Science 98 ( 2016 ) 205 – 210

1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Peer-review under responsibility of the Program Chairs doi: 10.1016/j.procs.2016.09.033

ScienceDirect

The 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks

(EUSPN 2016)

A Privacy-aware Platform for Sharing

Personal Information on Wearable Devices

Kambiz Ghazinour *, Wesley Delp, Jimmy Gross, Ali Taheri Moghadam, Timothy

Strawbridge, Jake Tobin

Advanced Information Security and Privacy Lab, Department of Computer Science, Kent State University, Kent, Ohio, USA

Abstract

Personal information (PI) embodies a wide and sometimes fuzzy spectrum of user privacy and security concerns. Recently, with the rapid progression in mobile technologies, a new frontier with both opportunities and vulnerabilities has come to fruition. Multitudes of personal fitness devices are able to capture data at any time, storing it on users’ mobile devices. Third party developers can access this data, raising questions about the security of users’ sensitive information, in addition to privacy concerns related to the possibly identifiable nature of the data. Frameworks such as Apple’s HealthKit provide terms to developers, which restrict what can be done with personal user information. However, the wording of these frameworks is largely vague, and sharing settings within the OS are restrictive. In order to provide users with a more customizable and informative user-interface, as well as developers with a framework for requesting access to health data, a new standard must be created. We propose a model able to store privacy predicates for each piece of health information requested. We also propose a new platform, allowing users to select privacy settings in an efficient and informative manner. It is imperative that a uniform and scalable solution be put in place such that the privacy and security of personal and potentially identifiable health data remains an utmost concern. Our implementation provides a method to meet these concerns.

© 2016 The Authors. Published by Elsevier B.V.

Peer-review under responsibility of the Conference Program Chairs. Keywords: Privacy; Health info; JSON; Wearable device;

* Corresponding author. E-mail addresses: kghazino@kent.edu

© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

(2)

1. Introduction

The information collection capabilities of mobile and wearable technologies have continuously expanded over time. The current privacy options available for use in mobile and wearable devices do not allow an individual to know with certainty how sensitive information will be used or for how long that information will be stored 1. The legal framework that regulates and protects an individual’s health information has remained since 2009 2. Improvements in health information collection coupled with the aforementioned static legal framework has created a difficult situation for developers in knowing when the health information being collected is protected under law and when it is not 3. Inadequate protection of semi/quasi-identifying sensitive personal information may lead to unauthorized individuals using information to identify individuals, which poses a threat to user privacy and security. Reducing the security and privacy related uncertainty created by the current trends of technological progress and legislative gridlock for both individuals and developers is the problem we aim to solve.

There is previous research work in the areas of privacy policy languages, such as XACML 4 and the privacy taxonomy 1. XACML uses XML to implement a role based access control model (RBAC). RBACs provide a framework that protects both providers and collectors of data from unauthorized access to that data 5. However, the XML backbone of XACML is not ideal for mobile technologies because XML usage is too resource intensive for mobile hardware 6. The privacy tuple developed by Barker et al provides a framework in which individuals can gain information on how their data is being used (purpose), who is able to access the data (visibility), the level of detail of the data provided (granularity), and how long the data may be stored (retention).

To protect the privacy of users of mobile applications and wearable technology, and to ensure that developers can communicate privacy settings and their implications to their users, we propose a user interface that visualizes the taxonomy proposed by Barker et al. 1 and is supported by a standardized JSON schema. The work presented in 7 and 11 addresses a Privacy Policy Visualization Model (PPVM). However, this work does not provide a model that translated to a mobile user interface. In this work, we have developed an interface that communicates the privacy information of the taxonomy model to the user in a manner that is usable within the limitations of a mobile or wearable interface. The JSON schema that we propose is both modern and lightweight. It ensures that sensitive data can be kept secure using best security practices and can be easily be implemented by developers. We plan to examine the efficacy of our proposed model as future research direction.

2. Proposed Platform

To the best of our knowledge there is currently no clear method to identify how information collected by mobile devices is used, and given that many applications require at least some information to function, users may be unwillingly giving access to PI. For example, the current workflow supported by Apple’s HealthKit framework involves a user opening a third-party application before being transported to the system settings screen. This screen presents the user with a binary selection for each data point. This is a slightly tedious process as there is no uniform way of selecting preferences within the third-party app, and no way for the developer to communicate the purpose for using the data.

Our solution to this issue is be a new system-oriented UI for privacy preference selection. On initial startup of a third-party application, the device would trigger the application’s bundled JSON to be loaded into our proposed interface. The user could then select preferences for each individual data object. Once the user has selected his or her preferences, the edited JSON data object communicates with the third-party application as to the user’s intended settings and the application launches accordingly.

3. Implementation: Creating JSON API

In order to protect the user, certain steps concerning the security aspect of personal information must be followed. Users expect their data in a typical use case to be secure and protected. The security and authenticity of this data is a critical priority in any information system, even more so when this data is of a personal nature.

A. The first step in capturing data is conceptualizing and designing how it will be stored. This becomes important when complex relationships among datasets exist. We designed our system to be able to integrate with

(3)

existing information systems and the data contained within those systems. Our JSON object consists of three main parts. The first part is for meta-information describing what will be listed in the rest of the data object. This section starts with the key-value pair “sub” and “privacy”. “sub” is a key that is part of the IANA JSON Web Token Registry 8. This was used because JWT aids in the transfer and security of such information. This choice made it essential for us to conform to certain namespace standards in order to avoid collisions.

The key “sub” stands for subject; we start with this key to make it easy for the developer to see what the subject matter of the data is when the JSON envelope is opened. The next key “privacy” is a Boolean flag. It is used to determine whether the privacy envelope should be traversed further. Our system allows a developer to use this privacy object to give the user the option to opt out of giving responses to the privacy tuple. If the flag is set to false, the system retains its ability to process a positive or populated privacy policy, but now has a condition to handle a null or empty privacy policy.

The purpose of the next key “id” is to be a specific numeric or string based identifier. It correlates the JSON privacy policy to another data set in a system. Existing systems already collect information about users and may do so in many ways. To promote openness and ensure an easy adoption, we gave this key an open-ended identifier. This “id” represents the privacy set as a whole. If a user of a typical CRUD based web app or mobile app were to sign up for service, there would be a unique ID already linked to his or her form. The “id” field in our privacy JSON is meant to have a one to one relationship with that existing form ID. The next two keys are “iss” (issuer) and “info” (information). The former relates to the company or organization that is responsible, and the latter deals with short and readable descriptions of the relevant part of the privacy tuple.

The next section starts with the key “tuple”. It starts an object that lists keys and an array of values for each key. The internal keys of this object are a map for fields of privacy that are used for every individual privacy selection. The groupings of values following this key are options for the root keys, such as when the key “granularity” is present. The options that are then presented to the user are “existential, partial, and specific”. Developers can make their own options and set their own keys to ensure application functionality is not overridden by the overzealous application of privacy settings. We highly stress that for this system to be effective that developers stick to the keys present in the privacy taxonomy 1. With fields that are numeric in value, such as “retention”, we specify what format the time should be in (ISO8601) in our example scenario. We also set when the data should expire and be deleted from the system. The next and final section of our JSON object starts with the key “prefs”. This section is an object that starts the main body of user selection responses. Each object has a unique id ex. 0-n if numeric or if a string “nnn-nnn” whichever is chosen they should be unique so that they can map to actual user ingested data. The options for these selections are defined by the “tuple” section above.

(4)

B. We next faced the question of how to secure data adequately. Many things can happen to mobile devices and computers; they can be lost, stolen, tampered with, or comprised entirely. These attack vectors are solvable with storage encryption and validation. Both storage encryption and validation happen server-side for client devices. With symmetric key encryption, we can guarantee that user information will not be compromised. Additionally, for a totally secure system, web browsers should not to store any unnecessary personal information. However, current methods of web browser storage do not provide any mechanisms for symmetric key encryption. To mitigate this, invalidate data as quickly as possible in order to protect the user from common web based attacks. Attacks such as CSFR (Cross-site forgery request) can be prevented both browser-side and server-side. To prevent this attack browser-side, JSON web tokens or other private information can be stored in a secure cookie or in session storage. We use this method to ensure users will not have their information compromised regardless of the server protection.

One of the largest attack vectors for the proposed system occurs when information transfers over an open network. In addition to making sure data does not end up in the wrong hands, we also have to make sure the data that we are receiving is authentic and unmodified from the data we sent. We solve these problems by following web best security practices. First, we validate our API endpoint domains and set hard limits on those API endpoints. By validating our domains, we can make sure that we only receive traffic from valid sources that we define. By setting limits, we ensure that if a client was to become malicious they could not take down our endpoints. We also use strong and up to date SSL certificates that encrypt traffic between our servers and user’s devices. This prevents man in the middle attacks and eavesdropping.

4. Designing an Informative User Interface

Current sharing preference interfaces seen on mobile operating systems such as iOS and Android are largely binary, allowing the user an option of either all or nothing. While each individual app must have an available privacy policy, within the sharing interface the user is not informed as to why each individual piece of data is being read, and what is being done with it. While this design has previously been acceptable in setting whether to receive notifications or not, the sensitivity of personal quasi-identifying information such as health data calls for greater control and customization.

As the Privacy Taxonomy proposed by Barker et al. 1 is a four-part system that utilizes a tuple implementation to define privacy, our proposed interface provides four corresponding settings for each piece of data. Each setting contains a corresponding “strength” associated with it, as illustrated in the table below.

Table l – Taxonomy Strengths

Purpose p None Single Reuse- same Reuse- selected Reuse-any Any

Visibility None Owner House Third-party All

Granularity None Existential Partial Specific

Retention None Explicit Forever

Strengths range from most private to most public and options should be displayed dynamically to users depending

on the application and the data it either requests or requires. For example, an application requesting access to heart rate may allow a visibility anywhere from local to the device (owner), to public for sharing purposes (all). In some cases, where certain amounts of sharing may be required to use the application at all, the user will simply be presented with a shifted version of the table. An example of this may be a step tracking app which requires step count be shared with the company (house) by nature of the application’s service, but can be shared with third parties

(5)

for research. In this instance, the lowest “strength” for visibility displayed as an option to the user would be ‘house’. The user always has the right to deny an application’s policy at any point, but must set all preferences in order to accept and use it. This is to the benefit of the user, as it informs them about the sharing of their data, but is also the motivation for making the selection process as quick and simple as possible.

If a new standard user-interface for privacy settings is to be adopted by the current major mobile operating systems, it is important that it follow design guidelines for seamless integration and user familiarity. At the time of writing, Apple’s iOS design guidelines include three overarching themes: deference, clarity, and depth 9. Deference refers to utilizing the UI as a tool to help users understand the content without competing with it, in this case the data provided in the JSON. Clarity refers to legible text and informative icons, while depth provides layers of information. Google suggests similar guidelines, citing style, layout, and usability 10. In following with these guidelines, our proposed framework utilizes native components such as a table-view to display requested data, an overlay of four icons corresponding to the four taxonomic categories upon selecting a piece of data, and a quick selection process for available strengths within each category. After several studies of common interfaces and multiple design iterations, we have developed an initial UI as illustrated in Figure 2. The user’s mobile device that connects to the wearable device shows the sensitive information with the key icons beside each. This serves as the privacy setting for that piece of information. When the user presses a key icon, a menu consisting of four items pops up. Additionally, the background blurs to give a visual indication to the user that he or she is currently selecting privacy settings relating to the unblurred key icon. These four items represent purpose, granularity, visibility, and retention. The user can select each of these in a simple swipe gesture with one finger to specify the level of each privacy predicate.

(6)

5. Conclusion and Future Work

In this paper, we have demonstrated a mobile privacy-aware platform on wearable devices that implements the privacy tuple devised by Barker et al.1. To support this interface, we have developed a JSON schema. We have examined the benefits that the privacy tuple carries over existing privacy settings currently present on mobile/wearable devices. We have also compared our JSON schema to existing XML privacy frameworks and demonstrated why our schema is more appropriate for mobile and wearable devices. To conclude, our proposal provides an initial standard as a first step towards creating a uniform and informative platform for the sharing of users’ personal and potentially identifiable health data.

As part of the future research direction, a feasibility study on effectiveness of such model using HCI techniques would be recommended. We are currently working on the apps for smart watches and glasses.

References

l. K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, and A. Williams. A data privacy taxonomy. In BNCOD 26: Proceedings of the 26th British National Conference on Databases, pages 42–54, Berlin, Heidelberg, July 2009. Springer Verlag.

2. HHS.gov, 'HHS.gov', 2015. [Online]. Available:

http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/. [Accessed: 03- Dec- 2015].

3. A. Helm and D. Georgatos, 'Privacy and mHealth: How Mobile Health 'Apps' Fit into a Privacy Framework Not Limited to HIPAA', Syracuse Law Review, vol. 64, 2014. [Online]. Available:

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2465131. [Accessed: 21- Nov- 2015].

4. Fda.gov, 'Cybersecurity for Medical Devices and Hospital Networks: FDA Safety Communication', 2015. [Online]. Available: http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm. [Accessed: 06- Nov- 2015].

5. D. Ferraiolo and D. Kuhn, 'Role-Based Access Controls', in Baltimore, 15th National Computer Security Conference, 1992, pp. 554-563.

6. N. Nurseitov, M. Paulson, R. Reynolds and C. Izurieta, Comparison of JSON and XML Data Interchange Formats: A Case Study, 1st ed. Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, CAINE 2009, November 4-6, 2009, Hilton San Francisco Fisherman s Wharf, San Francisco, California, USA, 2009, pp. 157-162.

7. K. Ghazinour, M. Majedi and K. Barker, 'A Model for Privacy Policy Visualization', 2009. 33rd Annual IEEE International Computer Software and Applications Conference, 2009.

8. Iana.org, 'JSON Web Token (JWT)', 2015. [Online]. Available: http://www.iana.org/assignments/jwt/jwt.xhtml. [Accessed: 04- Dec- 2015].

9. Developer.apple.com, 'iOS Human Interface Guidelines: Designing for iOS', 2015. [Online]. Available: https://developer.apple.com/library/ios/documentation/UserExperience/Conceptual/MobileHIG/. [Accessed: 04- Dec- 2015].

10. Developer.android.com, 'Design | Android Developers', 2015. [Online]. Available: http://developer.android.com/design/index.html. [Accessed: 04- Dec- 2015].

11. T. Albalawi, K. Ghazinour. (2016). A Usability Study on the Privacy Policy Visualization Model. In the proceedings of the 14th IEEE International Conference on Pervasive Intelligent and Computing (PICom 2016), New Zealand, 6 pages.

References

Related documents

For the segmentation based recognition, binary GA is used to explore different combinations of segmenta- tion points which gives the best score, while HS is integrated inside the

Theological, and Pastoral Perspectives John MacArthur 495.00 82 The IVP Bible Background Commentary: New. Testament

From the observed microstructure, the joints fabricated at the condition with the tool rotation speed of 1120rpm, weld speed of 80 mm/min and tool tilt angle of 2.5 0

the system presently in use for official debt recording in Tanzania.. • The database recording of domestic debt is incomplete both at BOT and MOF. Arrangements will be made to

A number of studies have evaluated the effects of the concrete pore solution on the mechanical properties of GFRP reinforcement. Almusallam et al. [70] determined the tensile

In order to manage products, processes and customers, information on the following attributes is required: The state of the product, such as usage and repair history,

For example, if a University employee accompanied by her spouse rented a vehicle for University business and listed her spouse on the rental agreement as an additional driver;