{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:47:42Z","timestamp":1743029262556,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030948214"},{"type":"electronic","value":"9783030948221"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94822-1_11","type":"book-chapter","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T13:03:04Z","timestamp":1644325384000},"page":"190-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage, and Disclosure in Own Smart Home Environments"],"prefix":"10.1007","author":[{"given":"Chathurangi Ishara","family":"Wickramasinghe","sequence":"first","affiliation":[]},{"given":"Delphine","family":"Reinhardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"issue":"21","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20216131","volume":"20","author":"M Abu-Tair","year":"2020","unstructured":"Abu-Tair, M., et al.: Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors 20(21), 1\u201314 (2020)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"A\u00efvodji, U.M., Gambs, S., Martin, A.: IOTFLA: a secured and privacy-preserving smart home architecture implementing federated learning: a secured and privacy-preserving smart home architecture implementing federated learning. In: Proceedings of 2019 IEEE Security and Privacy Workshops (SPW), pp. 175\u2013180 (2019)","key":"11_CR2","DOI":"10.1109\/SPW.2019.00041"},{"doi-asserted-by":"publisher","unstructured":"Alanezi, K., Mishra, S.: Incorporating individual and group privacy preferences in the Internet of Things. J. Ambient Intell. Humanized Comput. 1\u201316 (2021). https:\/\/doi.org\/10.1007\/s12652-021-02959-7","key":"11_CR3","DOI":"10.1007\/s12652-021-02959-7"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","volume":"37","author":"A Alcaide","year":"2013","unstructured":"Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 37, 111\u2013123 (2013)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Barhamgi, M., et al.: POSTER: Enabling end-users to protect their privacy, pp. 905\u2013907 (2017)","key":"11_CR5","DOI":"10.1145\/3052973.3055154"},{"doi-asserted-by":"crossref","unstructured":"Barhamgi, M., et al.: Enabling end-users to protect their privacy. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 905\u2013907. ACM (2017)","key":"11_CR6","DOI":"10.1145\/3052973.3055154"},{"issue":"3","key":"11_CR7","first-page":"337","volume":"8","author":"J Cao","year":"2010","unstructured":"Cao, J., Carminati, B., Ferrari, E., Tan, K.L.: Castle: continuously anonymizing data streams. IEEE Trans. Dependable Secure Comput. 8(3), 337\u2013352 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s00779-013-0665-z","volume":"18","author":"J Carretero","year":"2014","unstructured":"Carretero, J., Garc\u00eda, J.D.: The Internet of Things: connecting the world. Pers. Ubiquit. Comput. 18(2), 445\u2013447 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"doi-asserted-by":"crossref","unstructured":"Chakravorty, A., Wlodarczyk, T., Rong, C.: Privacy preserving data analytics for smart homes. In: Proceedings of 2013 IEEE Security and Privacy Workshops, pp. 23\u201327 (2013)","key":"11_CR9","DOI":"10.1109\/SPW.2013.22"},{"issue":"6","key":"11_CR10","first-page":"1","volume":"3","author":"MD Firoozjaei","year":"2020","unstructured":"Firoozjaei, M.D., Lu, R., Ghorbani, A.A.: An evaluation framework for privacy-preserving solutions applicable for blockchain-based Internet-of-Things platforms. Secur. Priv. 3(6), 1\u201328 (2020)","journal-title":"Secur. Priv."},{"issue":"16","key":"11_CR11","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1002\/sec.1259","volume":"9","author":"X Huang","year":"2016","unstructured":"Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the Internet of Things. Secur. Commun. Netw. 9(16), 3083\u20133094 (2016)","journal-title":"Secur. Commun. Netw."},{"unstructured":"Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.: User interactive Internet of Things privacy preserved access control. In: International Conference for Internet Technology and Secured Transactions, pp. 597\u2013602 (2012)","key":"11_CR12"},{"doi-asserted-by":"crossref","unstructured":"Jia, Y.J., et al.: ContexloT: towards providing contextual integrity to applied IoT platforms. In: Network and Distributed System Security Symposium (NDSS), pp. 1\u201315 (2017)","key":"11_CR13","DOI":"10.14722\/ndss.2017.23051"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.iot.2020.100179","volume":"11","author":"AD Kounoudes","year":"2020","unstructured":"Kounoudes, A.D., Kapitsaki, G.M.: A mapping of IoT user-centric privacy preserving approaches to the GDPR. Internet Things 11, 100179 (2020)","journal-title":"Internet Things"},{"issue":"5","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1111\/joca.12111","volume":"51","author":"G Milne","year":"2016","unstructured":"Milne, G., Pettinico, G., Hajjat, F., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consum. Aff. 51(1), 133\u2013161 (2016)","journal-title":"J. Consum. Aff."},{"key":"11_CR17","first-page":"2325","volume":"278","author":"AJ Nagengast","year":"2011","unstructured":"Nagengast, A.J., Braun, D.A., Wolpert, D.M.: Risk-sensitivity and the mean-variance trade-off: decision making in sensorimotor control. Proc. Roy. Soc. B Biol. Sci. 278, 2325\u20132332 (2011)","journal-title":"Proc. Roy. Soc. B Biol. Sci."},{"issue":"2","key":"11_CR18","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"MC Oetzel","year":"2014","unstructured":"Oetzel, M.C., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126\u2013150 (2014)","journal-title":"Eur. J. Inf. Syst."},{"issue":"18","key":"11_CR19","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Perera, C., McCormick, C., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy-by-design framework for assessing Internet of Things applications and platforms. In: Proceedings of the 6th International Conference on the Internet of Things, pp. 83\u201392. ACM (2016)","key":"11_CR20","DOI":"10.1145\/2991561.2991566"},{"unstructured":"Regulation (EU): 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119\/1, pp. 1\u201388 (2016)","key":"11_CR21"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.bdr.2017.11.001","volume":"12","author":"J Rumbold","year":"2018","unstructured":"Rumbold, J., Pierscionek, B.: What are data? A categorization of the data sensitivity spectrum. Big Data Res. 12, 49\u201359 (2018)","journal-title":"Big Data Res."},{"doi-asserted-by":"crossref","unstructured":"Sachidananda, V., Siboni, S., Shabtai, A., Toh, J., Bhairav, S., Elovici, Y.: Let the cat out of the bag: a holistic approach towards security analysis of the Internet of Things. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 3\u201310 (2017)","key":"11_CR23","DOI":"10.1145\/3055245.3055251"},{"issue":"4","key":"11_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M Satyanarayanan","year":"2001","unstructured":"Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Pers. Commun. 8(4), 10\u201317 (2001)","journal-title":"IEEE Pers. Commun."},{"issue":"4","key":"11_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2981546","volume":"16","author":"S Siboni","year":"2016","unstructured":"Siboni, S., Shabtai, A., Tippenhauer, N.O., Lee, J., Elovici, Y.: Advanced security testbed framework for wearable IoT devices. ACM Trans. Internet Technol. 16(4), 1\u201325 (2016)","journal-title":"ACM Trans. Internet Technol."},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.future.2013.10.016","volume":"33","author":"J Su","year":"2014","unstructured":"Su, J., Cao, D., Zhao, B., Wang, X., You, I.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Futur. Gener. Comput. Syst. 33, 11\u201318 (2014)","journal-title":"Futur. Gener. Comput. Syst."},{"unstructured":"Tabassum, M., Kosinski, T., Lipford, H.R.: \u2018I don\u2019t own the data\u2019: end user perceptions of smart home device data practices and risks. In: Proceedings of SOUPS 2015, Symposium on Usable Privacy and Security, pp. 435\u2013450 (2019)","key":"11_CR27"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, J., Schooler, E.M., Ion, M.: Performance evaluation of attribute-based encryption: toward data privacy in the IoT. In: 2014 IEEE International Conference on Communications (ICC), pp. 725\u2013730 (2014)","key":"11_CR28","DOI":"10.1109\/ICC.2014.6883405"},{"key":"11_CR29","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-030-42504-3_27","volume-title":"Privacy and Identity Management. Data for Better Living: AI and Privacy","author":"CI Wickramasinghe","year":"2020","unstructured":"Wickramasinghe, C.I., Reinhardt, D.: A survey-based exploration of users\u2019 awareness and their willingness to protect their data with smart objects. In: Friedewald, M., \u00d6nen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 427\u2013446. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42504-3_27"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S1005-8885(10)60159-8","volume":"18","author":"JC Yang","year":"2011","unstructured":"Yang, J.C., Fang, B.X.: Security model and key technologies for the Internet of Things. J. Chin. Univ. Posts Telecommun. 18, 109\u2013112 (2011)","journal-title":"J. Chin. Univ. Posts Telecommun."},{"unstructured":"Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Proceedings of SOUPS 2013, Symposium on Usable Privacy and Security, pp. 65\u201380 (2017)","key":"11_CR31"},{"issue":"2","key":"11_CR32","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2018.2847733","volume":"6","author":"W Zhou","year":"2019","unstructured":"Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J. 6(2), 1606\u20131616 (2019)","journal-title":"IEEE Internet Things J."},{"unstructured":"Zimmermann, V., Bennighof, M., Edel, M., Hoffmann, O., Jung, J., Wick, M.: \u2018Home, smart home\u2019 - exploring end users\u2019 mental models of smart homes. In: Mensch und Computer 2018-Workshop Band, pp. 401\u2013417 (2018)","key":"11_CR33"},{"doi-asserted-by":"crossref","unstructured":"Zimmermann, V., Dickhaut, E., Gerber, P., Vogt, J.: Vision: shining light on smart homes - supporting informed decision-making of end users. In: Proceedings of 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), pp. 149\u2013153 (2019)","key":"11_CR34","DOI":"10.1109\/EuroSPW.2019.00023"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94822-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T19:12:26Z","timestamp":1652123546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94822-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030948214","9783030948221"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94822-1_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}