Keywords

1 Introduction

In the last decade, the interest in IoT has tremendously increased, resulting in different products now available for and usable by the general public [7]. IoT is based on a network, where the physical objects of our environment, such as homes and workplaces, gain the ability to provide services and simultaneously play an active role in our environment via embedded systems [7]. The IoT is composed of different smart objects, which adapts to both, users’ behavior and the environment. For example, smart objects include smart lamps, smart fridges, smart door locks, and smart parking systems [7]. This rapid technological development is foreseen to continue in the coming years, reaching billions of smart objects. These objects further contribute in improving our lives in different areas, including our homes and workplaces [7]. Note that smart objects do not only present advantages in households, such as helping in managing our energy consumption, but also in companies, which can benefit from automated context-aware processes [7, 12, 16].

To provide these services, smart objects with embedded sensors continuously collect a vast amount of data about their environments and potential users, thus potentially endangering the privacy of their owners as well as of potential bystanders [36, 38]. Privacy issues especially arise when sensitive personal data are collected and disclosed to third parties without the users’ consent by smart object providers [18, 27, 38]. Cyber attacks caused by security vulnerabilities [28, 38], which among others are enabled by the use of low-power hardware in smart objects, can also result in information leaks and endanger users’ privacy [28, 38]. Recently, Bloomberg reported that thousands of the Amazon workers listen, how the users interact with Alexa, the virtual assistant in Amazon Echo devices [11]. Despite the phenomenon of the privacy paradoxFootnote 1 [10, 20], laws [1] still call for more user involvement in their own privacy protection process, because (1) users have the fundamental right of protecting their personal data [1, 27] and (2) users’ privacy behavior highly depends on the context [10].

Furthermore, the European General Data Protection Regulation (GDPR) with different rights, such as “Right for Access” and “Right to be Forgotten”, calls for giving the users more transparency regarding the personal data processing, empowering users to be responsible and to have more control for the protection of the personal data processing [1]. Therefore, it is important to put the user in the center while designing usable privacy-preserving solutions for smart home environments.

Within the scope of this paper, we primarily focus on (1) the exploration of user’s willingness to control the disclosure of their data and their need for transparency regarding the data collection. Based upon the results, we further focus on (2) identifying requirements in the form of user centric control mechanisms for privacy-preserving solutions for smart home environments.

The remaining paper is structured as follows. We first discuss related work in Sect. 2. We next detail the methodology of our empirical study in Sect. 3. In Sect. 4, we present the demographics and the results of our survey. In Sect. 5, we formulate design requirements based on the survey results for end user-centric-privacy-preserving solutions. Discussions and closing remarks conclude this paper in Sects. 6 and 7, respectively.

2 Related Work

Existing works can be classified as follows: (1) user surveys regarding privacy issues in IoT and (2) technical approaches allowing users to apply control mechanisms for their privacy protection.

The first category includes surveys, which are carried out with smart objects’ consumers in order to find out users’ perception and opinions regarding privacy issues in IoT. Based on interviews with eleven smart home owners, Zheng et al. outline that the users’ primary motivation of using smart objects lies on the convenience and connectedness [37]. They recommend developers to focus on designing (mobile) applications, allowing the users to access and control the collected data [37]. In [36], Zeng et al. also encourage developers to design smart objects considering users’ privacy needs. Additionally, the user study by Martin and Nissenbaum [23] outlines that users find that the usage of their data is more relevant to users’ privacy opinion than the sensitivity level of the collected data. Moreover, few large-scale surveys [3, 21, 25] were also carried out in order to find out users’ privacy preferences while using smart objects. The results of these studies confirm that privacy issues regarding IoT objects highly depend on the context [3, 25]. Some user studies also focus on privacy issues regarding smart watches and toys connected to the Internet [24, 30]. These studies investigate users’ awareness of privacy issues while using such smart objects. They give hints for the designers and smart object providers how to deal with users’ needs regarding such smart objects in order to increase the acceptance of smart objects. In comparison to the previous works, our questionnaire-based approach focuses on identifying control mechanisms that users want to have in the data collection and disclosure process of smart home environments. These control mechanisms should empower users to protect their own privacy in their smart home environment. Additionally, our study helps to understand, whether the users want to have the empowerment to control their personal data protection while living in smart home environments.

In the second category, we consider technical solutions that allow users to apply control mechanisms for their privacy protection. Solutions such as [16, 17, 28, 35] aim at avoiding the misuse of IoT objects and collected data by attackers for burglaries. While [16] implements a strong password authentication policy in their smart home automation system, the approach in [35] includes a set of new security policies for detecting abnormal behavior of each device. In addition, the solution presented in [17] introduces a new context-based permission system, which allows the user to decide based on collected context information, whether an abnormal action will be performed. Perera et al. propose in [28] a Privacy-by-Design framework, allowing the evaluation of IoT applications and middleware platforms based on a set of guidelines. These guidelines can be categorized in four elements: (a) Minimizing data collection, storage and disclosure without users’ consent; (b) reducing the data granularity and controlling data; (c) anonymizing data and encrypting data communication and processing; (d) publishing source code, data flow diagrams of IoT applications, certifications and fulfilled compliance. Few technical frameworks, such as [4, 8, 14, 15, 26], present Role Based Access Control (RBAC) including k-anonymity mechanisms and privacy preserved access control protocols for IoT environments. These frameworks include authentication protocols to identify the user and to allow users the event-based data sharing for user-defined roles, such as doctor, partner, etc. The functionality of the frameworks is mostly explained with the help of the collected sensor data based on smart healthcare systems and other devices, such as wearables as well as few home and hotel automation devices [4, 8, 14, 15, 26]. Further approaches introduce a privacy preserving policy, authentication protocols and data encryption methods in order to protect the collected sensor data and thus users’ privacy [2, 5, 6, 9, 13, 22, 29, 31,32,33,34]. However, most of these solutions reduce the availability of original data with time delay [36]. Finally, in [19], Khan et. al. present a solution to improve the privacy concerns in case of ownership change of the smart objects. These considerations show us that the proposed technical solutions include less user involvement. In comparison to previous works, our survey thus focuses on deriving control mechanisms from the end user perspectives. The proposed technical solutions in this category can be considered in the technical implementation of the derived requirements of this paper.

To the best of our knowledge, the contribution of our research work to this body of literature is two-fold: (1) We show users’ readiness to be involved in their own privacy protection, (2) we derive requirements for end user-centric-privacy-preserving solutions. This lays the ground for our future work.

3 Methodology

In order to gather insights regarding our main objectives, we carried out an online questionnaire based surveyFootnote 2. Our questionnaire including 22 questions is in English and available in Appendix A.

It is structured as follows. It gathers insights in participants’ knowledge and experience with smart objects. Next, it addresses the potential participants’ awareness of data collected and disclosed by smart objects and their related privacy risks. It then focuses on the participants’ potential willingness to inform themselves and control the data collected and shared by smart objects, before analyzing their requirements and motivation to use privacy-preserving solutions. We distributed our questionnaire on online social network platforms, such as Xing, LinkedIn, SurveyCircle, IoT Subreddit and the community platforms of several companies in order to reach frequent Internet users. No incentives were given to the participants. It required approximately ten to fifteen minutes to be answered and consisted of multiple choice and open-ended questions. Main goal of the survey is to conduct a preliminary study as a basis for future studies rather than collecting representative insights, which are valid for the whole population.

In total, 229 participants completed the questionnaire. We have discarded invalid data sets and this resulted in 209 valid data sets. Moreover, during our analysis we derived and tested five hypotheses based on \(Q_{16}\), applied statistical tests, such as Mann-Whitney, multiple linear regression and correlation tests and carried out comparisons of different participant groups in order to get more insight regarding user-centric control mechanisms for privacy-preserving solutions.

4 Results

4.1 Demographics

Our respondents are predominantly male (69%). Most of them are between 26 and 50 years old (58%). 16% are under 26 and 25% over 51. The majority are German citizens (74%) followed by US Americans (7%), Sri Lankans (5%), and British citizens (5%). The remaining citizenships are distributed among 15 other nationalities from all over the world. Among the 209 participants, 166 indicated their annual income range, which ranges between “less than 25.000 Euro” and “more than 100.000 Euro”. However, most of these participants (34%) annually earn “between 40.000 and 75.000 Euro”.

4.2 Knowledge and Experience

In our sample, about 93% of our participants indicated that they have already heard about IoT (\(Q_{1}, n_{Q1}=209\)). In order to get more insight, we asked our participants, in which context they have heard about IoT (\(Q_{2}\)). In \(Q_{2}\), we also specified what we meant by IoT, by giving some examples for orientation, such as smart home, smart factory, smart city, etc. The mentioned answers were smart home (ca. 27%), Industry 4.0 (ca. 20%), smart/intelligent things (ca. 19%), smart city (ca. 19%), and smart factory (ca. 13%) (\(Q_{2}, n_{Q2}=209\)).

In the free text box further answers were given such as smart vehicles, smart clothes, wearables, smart meters, smart grids, smart supply chain, smart campus, smart agriculture, robotic machines, smart logistics, smart health devices, and predictive maintenance. Additionally, 89% of the participants mentioned that they know or use smart objects (\(Q_{3}, n_{Q3}=209\)). The most cited answers were: Controlling home technology apps (12%), smart voice control objects, like Amazon Echo (10%), smart health devices (8%), smart door/window locks (8%), smart bulbs (7.5%), smart fridge (7.2%), augmented /virtual reality glasses (7%), smart washing machine (6%), smart alarm clock (5.7%), smart toothbrush (4%), smart grid apps (3%) and smart scale (2.7%). The majority uses the specific smartphone apps for this purpose (71%), while 11% uses the associated web interface (\(Q_{4}\)). Regarding \(Q_{5}\) with “How frequently do you use a device connected to the Internet, such as smart scale, fridge, wearables, watch, etc.? (smartphone, computer, smart TV does not count as smart devices in this question)”, about 70% of the participants indicated that they use devices connected to the Internet frequently (\(n_{Q_{5}}=206\)). Among the participants frequently using smart objects, 76% use them at least once per day, while the remaining 24% only use them occasionally. The cross tables grouped by gender and age groups show that male participants and participants in general aged between 26 and 50 years significantly use connected devices more frequently than others. Based on the answers to \(Q_{5}\), we derived three user categories that we use in our further analysis.

  1. 1.

    Frequent users: They use connected devices several times a day,

  2. 2.

    Average users: They use connected devices at most once a day or less,

  3. 3.

    Non users: They do not use any connected devices.

One of the questions we asked the participants using a 5-point Likert scaleFootnote 3 was to indicate their degree of agreement regarding the statement: “In a few years, I believe that it will be difficult to live without using smart objects” (\(Q_{11}\), \(n_{Q_{11}}=208\)). About 87% of the participants agreed that it will be difficult to live without smart objects. A majority appreciated the potential advantages offered by smart objects (\(Q_{12}\)), while only 20% of the sample stated that there are no advantages offered by smart objects. The seven most frequently mentioned advantages can be summarized as follows: Facilitating to fulfill routine tasks, high comfort and convenience, low error rates, setting adjustments according to lifestyle, recording interesting personal information, outline the optimization potentials and specific things are automatically done.

4.3 Collection, Disclosure, and Privacy

A large majority (93%) of our participants believe that smart objects collect information about themselves and their environments (\(Q_{6}\), \(n_{Q_{6}}=200\)). However, only 58% agreed with the statement: “I believe that I know the information collected by smart objects.” (\(Q_{7}\), \(n_{Q_{7}}=193\)). Most cited answers were location (29%) and health (25%) followed by browsing (24%) and personal data (19%), like bank details etc. (\(Q_{8}\)). With regard to the derived user profiles in Sect. 4.2, frequent and average users appear to be more aware of the data collection than the non users (Mann-Whitney test frequent users vs. non users: \(p-value = 0.003 < 0.05\), r = 0.248, average users vs. non users: \(p\,-\,value = 0.048 < 0.05\), r = 0.195). The boxplots in Fig. 1 confirm the above mentioned results. The outliers present the divergent answers from the frequently mentioned answers by most users and each number presents the data set of the correspondent anonymous respondent.

Fig. 1.
figure 1

Boxplots regarding “I believe that I know the information collected by smart objects.” (\(Q_{7}\)) clustered by user profiles, derived based on the results of \(Q_{5}\) (1 = strong disagreement, while 5 = strong agreement)

Additionally, only 24% of the sample believe in knowing the third parties, who receive the data collected by smart objects (\(Q_{9}\), \(n_{Q_{9}}=209\): “I believe that I know the parties who have access to collected data and receive the collected data from my smart objects (Parties can be: hospital, doctors, insurance companies, institutes using data for statistics, etc.)”). As expected, the majority (72%) indicated that they do not know the third parties who get access to their collected data. Note that few participants mentioned some of the third parties. The mentioned parties can be clustered as follows: retail companies (like Amazon, Apple, etc.), service providers (like Google), cyber security firms, social media companies (such as Facebook, etc.), several smart object/telco providers, institutes/companies using data for statistics and analyses, (health) insurance companies, hospitals, doctors, manufacturers of the heating systems/cars, banks and government departments.

We further asked the participants to mention potential privacy issues and privacy risks in the context of IoT in a free text box (\(Q_{14}\), \(n_{Q14}=209\)). About 55% of the participants filled it. To sum up their statements, they mentioned that the smart objects on the one hand make their lives and every day routines easier, but on the other hand that those objects collect a vast amount of data and transfer those data to third parties, which are used for personalized services or offers, to create (more or less) detailed personal profiles of the users and to manipulate the smart object owners. Additionally, the participants also indicated that today they actually do not have any means to protect those data, before sharing it with third parties and that there is a lack of strict regulations regarding privacy aspects in smart environments. Moreover, approx. 93% of the participants agreed to the statement: “I believe that smart objects can endanger my privacy.” (\(Q_{15}\), \(n_{Q_{15}}=205\)). The results of the Fisher’s Exact test outline that there is no dependency between the participants’ gender and their answers regarding \(Q_{15}\). While 38% indicated that they take special measures to protect their privacy when using smart objects, 48% denied to do so (\(Q_{10}\), \(n_{Q_{10}}=209\): “I take special measures (such as switching off some services etc.) to protect my privacy when using smart objects.”). The mentioned measures are switching off the objects to avoid the data collection (35%), disuse of cloud connection, using local servers (6%), and checking all the privacy settings and disabling smart objects or features, which are not necessary (57%). One participant mentioned that s/he actually does not know any measures that really help to protect privacy (2%).

4.4 Information and Control Willingness

In the next step, respondents had to rate the following statements on a 5 point Likert scale. Based on the results regarding the statements, we investigate to which degree participants are willing to exercise control over the data collected and shared by smart objects (\(Q_{16}\)). The statements and the distribution of the values regarding those statements are presented in Table 1 and in Fig. 2, respectively.

The outliers present the divergent answers from the frequently mentioned answers of the participants and each number presents the data set of the correspondent anonymous respondent.

Table 1. Submitted statements in the \(Q_{16}\): “Please enter your answer regarding the following statements.”

About 94% of the participants indicated that they want to have more information about the data collected by smart objects about themselves in a smart home environment (\(Q_{16.1}\)). 96% also precised that they want to have an overview of all the information collected by used smart objects (\(Q_{16.2}\)). About 94% of the participants would like to see a summary of the collected data over a given period, such as daily, weekly, monthly (\(Q_{16.3}\)). Additionally, about 84% of the consumers want to have more information about collected data in their own smart home environments in real-time (\(Q_{16.4}\)).

In addition, for more transparency approx. 92% of our sample want to have more information about the associated risks to their privacy resulting from sharing the collected data (\(Q_{16.5}\)). About 87% of the participants also want to have more information about the associated personal and social advantages by sharing the collected data of their own smart home environment (\(Q_{16.6}\)). Further analysis shows that there is a positive correlation between statements \(Q_{16.5}\) and \(Q_{16.6}\) (r = 0.608, significant at the 0.01 level - 2-tailed). This confirms that the users, who want to have information about associated risks to their privacy by data sharing, at the same time also want to have information about the associated personal and social advantages resulting from data sharing.

Fig. 2.
figure 2

Boxplots for submitted statements in the \(Q_{16}\) (1 = strong disagreement, while 5 = strong agreement)

Almost all participants (97%) indicated that they would like to have control about the data collected and shared by smart objects (\(Q_{16.7}\) and \(Q_{16.8}\)). Note that there are no statistically significant differences between the answers given by participants belonging to different user profiles (\(Q_{5}\), Mann-Whitney test, \(p-values > 0.05\)) and users applying special measures to protect their privacy (\(Q_{10}\)), as shown by a multiple linear regression test (\(p-values > 0.05\)).

Additionally, a large majority would like to determine which third parties are able to access their collected data (95% for \(Q_{16.9}\)) and for which purpose (95% for \(Q_{16.10}\)). To exercise this control, only 86% of the participants are willing to spend time on auditing the collected data (\(Q_{16.11}\)). An automated system taking privacy decisions would be supported by 74% of the participants (\(Q_{16.12}\)). About 96% of the participants also mentioned that they are willing to have clear policies with the data provider regarding the data collection in smart home environments (\(Q_{16.13}\)).

We finally asked the participants to indicate their motivating factors to use smart home objects while having the control on the data collected and shared (\(Q_{17}\), \(n_{Q_{17}}=209\)) and most cited reasons were: “Having control about the usage of collected data about me” (32%) followed by “feeling myself secured and protected” (29%) as well as “avoiding to draw a digital biography” (22%) and “having information about the data consumer of my data” (15%). Two participants wrote in the free text box that nothing motivates them to use smart home objects while having the control on the data collected. Two further participants also mentioned that they are not going to use any smart objects because they believe that there is no security while using those objects. One participant explicitly indicated that s/he never wants to waste any time on validating or examining the collected data.

Derived Hypotheses: The analysis of participants’ answers regarding \(Q_{16}\) make it obvious, that the majority of the participants want to have more transparency and associated data sharing information. It is still to be verified whether they want to have these information in order to consider this input while controlling the data sharing process. For this purpose, we derived and tested five hypotheses to verify, whether there is a significant dependency regarding the fact that the users want to have more transparency and associated data sharing information in order to consider this input while controlling the data sharing process. Fisher’s Exact tests confirm the all five hypotheses with \(p= 0.00<0.05\). This means that users want to control the information collected by smart objects (\(H_1\)) and are willing to have an overview of those information (\(H_3\)). The results also confirm that the users are willing to get information regarding the privacy risks arising from the publication of data (\(H_2\)). Similarly, the test results also confirm that the users want to determine who is able to access the shared data (\(H_4\)) and for which purpose the data are used (\(H_5\)), while controlling the data shared with third parties.

5 Derived Requirements for User-Centric-Privacy-Preserving Solutions

We leverage the results of the survey to derive requirements in form of control mechanisms for user-centric-privacy-preserving solutions in what follows. We define the identified control mechanisms as User-Centric-Control-Points (UCCP).

Data Object Tagging: Considering the results of the whole survey, we can derive that it will be useful to allow the user to tag his/her different smart objects as sensitive or non-sensitive object depending on the data the objects collect. For example, in one case a smart table mat could be non-sensitive, because it just collects information whether something is on the mat or not, while in another case smart fridge or calorie scanner could be tagged as sensitive, because those objects collect data regarding the users’ eating and living habits. The users can consider these tagging when they make their decision whether they want to share the data while considering the associated privacy risks and advantages arising from sharing the collected data. These considerations allow us to derive the UCCP 1: Allowing the user to tag the smart object as a sensitive or non-sensitive object.

Data Minimization: Our results in Sects. 4.3 and 4.4 show that the participants do not have transparency and vast experience regarding the data collection and disclosure process in smart home environments. Participants’ answers also outline that they want to have more information regarding the data collection process in smart home environments. Furthermore, the results underline that the participants want to control which information are collected in their smart home environment. These results help us to derive the following UCCP 2: Allowing the user to select which information are collected by the used smart objects in his environment.

Data Granularity: The results in Sect. 4.4 let us conclude that (1) the participants want to have an overview of all collected information and (2) that they want to review the collected data over a preferred period, such as weekly, monthly, and thus to determine the granularity of data collection. Based on these results, we can derive our next UCCP 3: Allowing the user to set in which granularity the data are collected for users’ review.

Data Sharing: The participants’ answers in Sect. 4.4 also outline that they want to have the opportunity to get more information regarding associated privacy risks, personal and social associated advantages resulting from sharing the collected data. This leads us to derive our next UCCP 4: Allowing the user to view the associated risks and social or personal advantages arising by sharing the collected context-data.

Data Disclosure Limitations: The results in Sect. 4.4 show that the users want to control the data shared. In this context, it is to be mentioned that the GDPR also demands to obtain consent for the processing of the personal data in understandable and simply accessible form from the users [1]. These results help us to derive another UCCP 5: Allowing the user to control the data sharing. This UCCP must include at least the following two options: Share the data or delete the data without any third parties getting access to the data.

Table 2. Derived UCCPs for user-centric-privacy-preserving solutions based on the results

Data Access Limitations: The results in Sect. 4.4 show that the participants want to have the control on who is able to access their data and for which purpose in case of data sharing. This leads us to derive the next UCCP 6: Allowing the users to determine who is able to access the data and for which purpose the data are used. This UCCP should also allow the users to set the settings, how the data are disclosed, anonymized or non-anonymized.

As listed above, the results of our survey allowed us to derive six UCCPs as requirements for end user-centric-privacy-preserving solutions for smart home environments. Furthermore, the derived UCCPs can also be categorized into three categories. These categories are transparency of data collection, data implications and data access. In the first category, UCCPs are summarized, which allow users to gain more transparency regarding data collection. The second category includes UCCPs, which provide the data sharing information for users. The third category comprises UCCPs, which allow users to control the data sharing process (Table 2).

In future work, the privacy-preserving solutions with integrated UCCPs must be investigated in terms of their usability and applicability in everyday life.

6 Discussion

The answers to the questions on information collection and disclosure (\(Q_{6,7,9}\)) represent an interesting aspect. Regarding the results of \(Q_{6}\) a majority (93%) of the participants are aware about the data collection in smart environments, but only 58% agreed in \(Q_{7}\) that they know the information collected by smart objects. The comparison of the user profiles shows that the frequent and average users are more aware of the data collection than the non users. Furthermore, only 24% of the participants indicated in \(Q_{9}\) that they know the third parties, who receive the data collected by smart objects. By considering these answers, it becomes obvious that the users have a lack of knowledge regarding the sensitive data collected by the smart objects and the third parties receiving those sensitive data without users’ consent. This might have two reasons: (1) users have less transparency about the collected data and/or (2) users put less effort in finding out which information are collected, because they do not receive such information in an understandable way. Although approx. 93% indicated in \(Q_{15}\) that they “...believe that smart objects can endanger my privacy”, only 55% in \(Q_{14}\) mentioned potential privacy risks in IoT-context and only 38% mentioned in \(Q_{10}\) that they are taking special measures to protect their own privacy. Regardless of the derived user profiles and users applying special privacy preserving measures, later in \(Q_{16}\) a majority indicated that they want to have control over data collection and disclosure in their smart home environment. This might mean that the missing transparency about collected as well as disclosed data and missing opportunities for the users to control the data collection and disclosure process give only limited permission for the users to be responsible for their own privacy protection. Additionally, it is not clear whether the 38% of the respondents (\(Q_{10}\)) apply those measures regularly or just once in a while. If the measures are applied regularly, then it is clear that those participants actively protect their privacy. Furthermore, there were also few participants, who mentioned that they do not have any motivation to deal with user-centric-privacy-preserving solutions, because they believe that there is no privacy in today’s data-driven world.

Additionally, testing the five hypotheses (presented at the end of Sect. 4.4) helps us to conclude that users want to have more transparency and information regarding data collection and disclosure process in their smart home environment in order to consciously control the disclosure of the collected data. The results of \(Q_{16.11}\) also provide the insight that the users want to be involved in their privacy protection while living in smart home environments. These results are not surprising and further emphasize that efficient user-centric-privacy-preserving solutions for data control are necessary. Consequently, the majority of our participants mentioned in \(Q_{17}\) that they are motivated to live in smart home environments while having control over the data collected and shared. In contrast, few participants pointed out that they will not use such devices due to privacy issues. Furthermore, based on the results regarding \(Q_{7}\), \(Q_{8}\), \(Q_{9}\), \(Q_{16}\) we were able to derive six UCCPs as requirements for user-centric-privacy-preserving solutions for smart home environments, explained in Sect. 5. The derived UCCPs underline the aspects of GDPR [1] and can only provide added value if they are considered in the whole lifecycle of the personal data processing in smart home environments. Furthermore, the presented technical approaches in the second category in Sect. 2 can be considered in the implementation of the derived UCCPs, for instance RBAC mechanisms in the implementation of UCCP 6. The derived UCCPs based on users’ answers represent their stated opinion and must be evaluated in a real smart home environment scenario. This will help us to find out whether the users accept to spend their time with such solutions in their everyday lives in order to protect their own privacy, as mentioned in \(Q_{16.11}\).

Finally, our questionnaire-based survey has few limitations: As already preluded, the answers of the participants represent their opinion, but not necessarily their actual behavior. The participants may also be biased and not representative of the whole population. Indeed, the fact that they voluntarily answered the questionnaire, which was published on several Internet platforms and invitations sent by emails, may indicate that they may be more altruistic or that they are strongly willing to live or to deal with smart objects and environments than those who have not answered it. Ultimately, our findings mainly reflect the views of participants, who have access to the Internet.

7 Conclusions and Outlook

Within the scope of this paper, we have investigated based on the questionnaire-based survey (1) requirements for end user-centric privacy-preserving solutions and (2) users’ readiness to be involved in their own privacy protection. Overall, our participants have indicated that they would like to have more transparency regarding data collection and more control over data collection and disclosure in smart home environments. Based on their answers, we have developed a set of requirements called UCCPs for privacy-preserving solutions in smart home environments that would allow users to exercise a control over their personal data. Our findings also underline that the participants want to be involved in their own privacy protection.

In future work, we plan to conduct user studies to investigate possible discrepancies between users’ real behavior and stated opinion regarding the utilization of privacy-preserving solution with integrated UCCPs in smart home environments. We further plan to investigate the usability aspects of such solutions. Finally, further research work is needed to develop clear policy frameworks regarding the personal data processing in smart home environments, which have to be taken into account by the smart objects’ providers.