Abstract
Smart home devices become increasingly popular as they allow to automate tedious tasks and often provide a wide variety of entertainment features. Yet, this increase in comfort comes at the cost of exposure to privacy risks as connected devices in smart homes capture most sensitive user data, including video, audio, and movement data of the inhabitants and guests. Smart home owners and bystanders typically have very limited control over these recordings. While few devices do provide physical artifacts to block individual sensors, deactivating recording and transmission capabilities typically requires powering devices off or disconnecting them from the network, typically rendering these smart home appliances useless. In response, we created ConnectivityControl, a framework that allows users to switch between four device connectivity levels: Offline, Access Point mode, Local Network mode, and Online. ConnectivityControl features a privacy label that depicts how those modes impact device features and privacy exposure. The label can be used to inform purchase decisions and to monitor devices across their lifetime. In this paper, we detail the system architecture and the interaction design and showcase ConnectivityControl’s implementation in the context of two common smart home systems: a smart camera and an environmental sensing unit. Finally, we discuss how ConnectivityControl and its labels can transform the way smart home users configure their systems to match individual privacy needs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, Y., et al.: Wearable microphone jamming. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, pp. 1–12. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3313831.3376304
Do, Y., et al.: Smart webcam cover: exploring the design of an intelligent webcam cover to improve usability and trust. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(4) (2022). https://doi.org/10.1145/3494983. https://doi-org.emedien.ub.uni-muenchen.de/10.1145/3494983
Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, pp. 1–12. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3290605.3300764
Obermaier, J., Hutle, M.: Analyzing the security and privacy of cloud-based video surveillance systems. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS 2016, pp. 22–28. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2899007.2899008
Oser, P., et al.: Safer: development and evaluation of an IoT device risk assessment framework in a multinational organization, vol. 4, pp. 1–22. ACM, New York (2020)
Tiefenau, C., Häring, M., Gerlitz, E., von Zezschwitz, E.: Making privacy graspable: can we nudge users to use privacy enhancing techniques? (2019). https://doi.org/10.48550/ARXIV.1911.07701. https://arxiv.org/abs/1911.07701
Windl, M., Schmidt, A., Feger, S.S.: Investigating tangible privacy-preserving mechanisms for future smart homes (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Feger, S.S., Windl, M., Grootjen, J., Schmidt, A. (2023). ConnectivityControl: Providing Smart Home Users with Real Privacy Configuration Options. In: Spano, L.D., Schmidt, A., Santoro, C., Stumpf, S. (eds) End-User Development. IS-EUD 2023. Lecture Notes in Computer Science, vol 13917. Springer, Cham. https://doi.org/10.1007/978-3-031-34433-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-34433-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34432-9
Online ISBN: 978-3-031-34433-6
eBook Packages: Computer ScienceComputer Science (R0)