{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:01:58Z","timestamp":1742979718888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030675493"},{"type":"electronic","value":"9783030675509"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67550-9_12","type":"book-chapter","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:02:51Z","timestamp":1611057771000},"page":"177-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Toward a Privacy Guard for Cloud-Based Home Assistants and IoT Devices"],"prefix":"10.1007","author":[{"given":"Radja","family":"Boukharrou","sequence":"first","affiliation":[]},{"given":"Ahmed-Chawki","family":"Chaouche","sequence":"additional","affiliation":[]},{"given":"Khaoula","family":"Mahdjar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,20]]},"reference":[{"key":"12_CR1","unstructured":"SpeechRecognition 3.8.1 (2020). https:\/\/pypi.org\/project\/SpeechRecognition\/, https:\/\/ifttt.com\/. Accessed 25 Aug 2020"},{"key":"12_CR2","unstructured":"Abdi, N., Ramokapane, K.M., Such, J.M.: More than smart speakers: security and privacy perceptions of smart home personal assistants. In: Symp. on Usable Privacy and Security. USENIX Association (2019)"},{"key":"12_CR3","unstructured":"Acar, A., et al.: Peek-a-boo: i see your smart home activities, even encrypted! arXiv preprint arXiv:1808.02741 (2018)"},{"key":"12_CR4","unstructured":"Ahmed, S., Chowdhury, A.R., Fawaz, K., Ramanathan, P.: Preech: a system for privacy-preserving speech transcription. In: $$\\{$$USENIX$$\\}$$ Security Symposium, pp. 2703\u20132720 (2020)"},{"key":"12_CR5","unstructured":"AL-mawee, W., et al.: Privacy and security issues in IoT healthcare applications for the disabled users a survey (2012)"},{"issue":"7","key":"12_CR6","first-page":"232","volume":"10","author":"F Alshohoumi","year":"2019","unstructured":"Alshohoumi, F., Sarrab, M., AlHamadani, A., Al-Abri, D.: Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl 10(7), 232\u2013251 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"12_CR7","series-title":"Internet of Things","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-18732-3_8","volume-title":"Digital Twin Technologies and Smart Cities","author":"HF Atlam","year":"2020","unstructured":"Atlam, H.F., Wills, G.B.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities. IT, pp. 123\u2013149. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-18732-3_8"},{"key":"12_CR8","unstructured":"Chandrasekaran, V., Linden, T., Fawaz, K., Mutlu, B., Banerjee, S.: Blackout and obfuscator: an exploration of the design space for privacy-preserving interventions for voice assistants. arXiv preprint arXiv:1812.00263 (2018)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Edu, J.S., Such, J.M., Suarez-Tangil, G.: Smart home personal assistants: a security and privacy review. arXiv preprint arXiv:1903.05593 (2019)","DOI":"10.1145\/3412383"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Feng, H., Fawaz, K., Shin, K.G.: Continuous authentication for voice assistants. In: 23rd Annual International Conference on Mobile Computing and Networking, pp. 343\u2013355 (2017)","DOI":"10.1145\/3117811.3117823"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Gao, C., Chandrasekaran, V., Fawaz, K., Banerjee, S.: Traversing the quagmire that is privacy in your smart home. In: Workshop on IoT Security and Privacy, pp. 22\u201328 (2018)","DOI":"10.1145\/3229565.3229573"},{"key":"12_CR12","unstructured":"He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: $$\\{$$USENIX$$\\}$$ Security Symposium, pp. 255\u2013272 (2018)"},{"key":"12_CR13","unstructured":"Inc., G.: Google Nest and Google Home device specifications (2020). https:\/\/support.google.com\/googlenest\/answer\/7072284. Accessed 16 Aug 2020"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kozlov, D., Veijalainen, J., Ali, Y.: Security and privacy threats in IoT architectures. In: BODYNETS, pp. 256\u2013262 (2012)","DOI":"10.4108\/icst.bodynets.2012.250550"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TCE.2017.014777","volume":"63","author":"YT Lee","year":"2017","unstructured":"Lee, Y.T., Hsiao, W.H., Lin, Y.S., Chou, S.C.T.: Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Trans. Consumer Electr. 63(2), 200\u2013207 (2017)","journal-title":"IEEE Trans. Consumer Electr."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Mi, X., Qian, F., Zhang, Y., Wang, X.: An empirical characterization of IFTTT: ecosystem, usage, and performance. In: 2017 Internet Measurement Conference, pp. 398\u2013404 (2017)","DOI":"10.1145\/3131365.3131369"},{"key":"12_CR17","unstructured":"Sohn, M.N.: Security and privacy threats in IoT architectures, p. 71 (2017)"},{"issue":"12","key":"12_CR18","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the internet of things: threats and challenges. Secur. Commun. Networks 7(12), 2728\u20132742 (2014)","journal-title":"Secur. Commun. Networks"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67550-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T01:14:23Z","timestamp":1697591663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67550-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030675493","9783030675509"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67550-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mspn2020.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}