TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones

  • Julian Seifert
  • Alexander De Luca
  • Bettina Conradi
  • Heinrich Hussmann
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6030)

Abstract

Due to increased input and output capabilities, mobile phones hold many different kinds of (mostly private) data. The need for finer grained profiles and integrated data security on mobile phones has already been documented extensively (e.g. [1]). However, there are no appropriate concepts and implementations yet to handle and limit access to data on mobile phones. TreasurePhone has been designed to address this specific problem. It protects the users’ mobile phone data based on their current context. Privacy protection is realized by spheres, which represent the users’ context-specific need for privacy. That is, users can define which data and services are accessible in which sphere. TreasurePhone exploits context information to support authentication and automatic activation of spheres by locations and actions. We conducted a user study with 20 participants to gain insights on how well users accept such a concept. One of the main goals was to find out whether such privacy features are appreciated by the users even though they make interaction slower and might hinder fast access to specific data. Additionally, we showed that integration of context information significantly increases ease-of-use of the system.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Karlson, A.K., Brush, A.J.B., Schechter, S.: Can I Borrow Your Phone?: Understanding Concerns when Sharing Mobile Phones. In: CHI 2009: Proceedings of the 27th international conference on Human factors in computing systems (2009)Google Scholar
  2. 2.
    Stajano, F.: Will Your Digital Butlers Betray You? In: WPES 2004: Proceedings of the 2004 ACM workshop on Privacy in the electronic society. ACM, New York (2004)Google Scholar
  3. 3.
    Lehikoinen, J.T., Lehikoinen, J., Huuskonen, P.: Understanding privacy regulation in ubicomp interactions. Personal Ubiquitous Comput. 12(8), 543–553 (2008)CrossRefGoogle Scholar
  4. 4.
    Stajano, F.: One user, many hats; and, sometimes, no hat - towards a secure yet usable pda. In: 12th Int. Security Protocols Workshop. Springer, Heidelberg (2004)Google Scholar
  5. 5.
    Siewiorek, D., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K., Shaffer, J., Wong, F.L.: SenSay: A Context-Aware Mobile Phone. In: ISWC 2003: Proceedings of the 7th IEEE International Symposium on Wearable Computers, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  6. 6.
    Krishnamurthy, S., Chakraborty, D., Jindal, S., Mittal, S.: Context-Based Adaptation of Mobile Phones Using Near-Field Communication. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 1–10 (2006)Google Scholar
  7. 7.
    Jiang, X., Hong, J.I., Landay, J.A.: Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 176. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    De Luca, A., Hußmann, H.: Threat Awareness - Social Impacts of Privacy Aware Ubiquitous Computing. In: INTER: A European Cultural Studies Conference in Sweden (INTER 2007), Norrköping, Sweden, June 2007, pp. 1650–3686 (2007)Google Scholar
  9. 9.
    Goffman, E.: The Presentation of Self in Everyday Life. Doubleday Anchor Books, New York (1959)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Julian Seifert
    • 1
  • Alexander De Luca
    • 2
  • Bettina Conradi
    • 2
  • Heinrich Hussmann
    • 2
  1. 1.Bauhaus-University WeimarWeimarGermany
  2. 2.University of MunichMunichGermany

Personalised recommendations