Author(s):

Haddadi, Hamed

Brown, Ian

Abstract:

The increasing availability of personal activity monitors, tracking devices, wearable recording devices, and associated smartphone apps has given rise to a wave of Quantified Self individuals and applications. The data from these apps and sensors are usually collected by associated apps and uploaded to the software developers for feedback to individual and their selected partners. In this paper we highlight the privacy risks associated with this practice, demonstrating the ease with which an app provider can infer individuals co-location and joint activities without having access to specific location data. We highlight a number of potential solution to this challenge in order to minimise the privacy leakage from these applications.

Document:

https://www.scl.org/articles/3161-quantified-self-and-the-privacy-challenge-in-wearables

References:

1. Alomainy, A., Di Bari, R., Abbasi, Q., and Chen, Y. Co-operative and Energy Efficient Body Area and Wireless Sensor Networks for Healthcare Applications. Academic Press library in biomedical applications of mobile and wireless communications. Elsevier Science, 2014.

2. Brown, I., Brown, L., and Korff, D. Using nhs patient data for research without consent. Law, Innovation and Technology 2, 2 (2010-12-01T00:00:00), 219–258.

3. Di Bari, R., Alomainy, A., and Hao, Y. Cooperative and low-power wireless sensor network for efficient body-centric communications in healthcare applications. In Wireless Mobile Communication and Healthcare, B. Godara and K. Nikita, Eds., vol. 61 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013, 351–360.

4. Domenico, M. D., Lima, A., and Musolesi, M. Interdependence and predictability of human mobility and social interactions. In Nokia Mobile Data Challenge (June 2012).

5. Haddadi, H., Fay, D., Jamakovic, A., Maennel, O., Moore, A. W., Mortier, R., Rio, M., and Uhlig, S. Beyond node degree: evaluating as topology models. arXiv preprint arXiv:0807.2023 (2008).

6. Haddadi, H., Hui, P., and Brown, I. Mobiad: private and scalable mobile advertising. In Proceedings of the fifth ACM International Workshop on Mobility in the Evolving Internet Architecture, MobiArch ’10, ACM (New York, NY, USA, 2010), 33–38.

7. Haddadi, H., Mortier, R., Hand, S., Brown, I., Yoneki, E., McAuley, D., and Crowcroft, J. Privacy analytics. SIGCOMM Comput. Commun. Rev. 42, 2 (Mar. 2012), 94–98.

8. Lathia, N., Pejovic, V., Rachuri, K., Mascolo, C., Musolesi, M., and Rentfrow, P. Smartphones for large-scale behavior change interventions. Pervasive Computing, IEEE 12, 3 (July 2013), 66–73.

9. Mortier, R., Haddadi, H., Henderson, T., McAuley, D., and Crowcroft, J. Challenges & opportunities in human-data interaction. In DE2013: Open Digital (Salford, UK, 2013).

10. Rojkova, V., and Kantardzic, M. M. Analysis of inter-domain traffic correlations: Random matrix theory approach. CoRR abs/0706.2520 (2007).

11. Sweeney, L. Simple demographics often identify people uniquely. Health (San Francisco) (2000), 1–34.

12. Watson, S. M. Living with Data: Personal Data Uses of the Quantified Self. Oxford Internet Institute Masters Thesis, 2013.