Privacy threat model in lifelogging


The lifelogging activity enables a user, the lifelogger, to passively capture multimodal records from a first-person perspective and ultimately create a visual diary encompassing every possible aspect of her life with unprecedented details. In recent years it has gained popularity among different groups of users. However, the possibility of ubiquitous presence of lifelogging devices especially in private spheres has raised serious concerns with respect to personal privacy. Different practitioners and active researchers in the field of lifelogging have analysed the issue of privacy in lifelogging and proposed different mitigation strategies. However, none of the existing works has considered a well-defined privacy threat model in the domain of lifelogging. Without a proper threat model, any analysis and discussion of privacy threats in lifelogging remains incomplete. In this paper we aim to fill in this gap by introducing a first-ever privacy threat model identifying several threats with respect to lifelogging. We believe that the introduced threat model will be an essential tool and will act as the basis for any further research within this domain.

Publication DOI:
Divisions: College of Business and Social Sciences > Aston Business School > Operations & Information Management
College of Business and Social Sciences > Aston Business School
Additional Information: -Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Copyright is held by the owner/author(s).
Event Title: 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
Event Type: Other
Event Dates: 2016-09-12 - 2016-09-16
Uncontrolled Keywords: privacy,lifelogging,threats,threat modelling
ISBN: 978-1-450-34462-3
PURE Output Type: Conference contribution
Published Date: 2016-09-12
Accepted Date: 2016-09-01
Authors: Ferdous, Md Sadek
Chowdhury, Soumyadeb (ORCID Profile 0000-0002-8074-248X)
Jose, Joemon M.



Version: Published Version

| Preview

Export / Share Citation


Additional statistics for this record