Usable Privacy Mechanisms in Home Security Camera Systems

Authors

  • Muhammad Dahiru Liman Department of Computer Science, Faculty of Computing, Federal University of Lafia, P.M.B. 146, Lafia, Nasarawa State, Nigeria.
  • Binta Ali Shuwa Department of Cyber Security, Faculty of Military Sciences and Interdisciplinary Studies, Nigerian Defence Academy, P.M.B 2109, Kaduna, Nigeria
  • Muhammed Abubakar
  • Salamatu Osanga Ibrahim Department of Computer Science, Faculty of Computing, Federal University of Lafia, P.M.B. 146, Lafia, Nasarawa State, Nigeria.

Keywords:

IoT, Smart Home, Usability, Security, Privacy, Camera, Prototype

Abstract

IoT is the interconnection of People and things. When our home is connected to IoT devices it is referred to as smart home. The idea behind smart home is to make life easier such that there is little human intervention. The IoT devices in our smart home exchange data for storage and processing. This exchange of data leads to users concerns on data security and privacy. In this work, we implemented home security camera systems in such a way that the data is encrypted first before being sent to the cloud in a very simplified and almost automatic encryption process. This implementation was done putting in mind usability. A questionnaire was used to gather results on users’ perception about the system. The user study conducted yielded positive result.

References

H. Lin and N. Bergmann, "IoT Privacy and Security Challenges for Smart Home Environments", Information, vol. 7, no. 3, p. 44, 2016. Available: 10.3390/info7030044.

Z. Shouran, A. Ashari and T. Kuntoro, "Internet of Things (IoT) of Smart Home: Privacy and Security", International Journal of Computer Applications, vol. 182, no. 39, pp. 3-8, 2019. Available: 10.5120/ijca2019918450.

K. Beckers, Pattern and security requirements. Cham: Springer, 2015, p. 100.

A.Whitten and J. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0", in Proceedings of the 8th USENIX Security Symposium, Washington, D.C., 1999, pp. 169–184.

E. W, "Security and usability: you CAN have it all!", National Cyber Security Center, 2018. .

S. Shea and I. Wigmore, "What is IoT Security?", IoT Agenda, 2021. [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security. [Accessed: 01- Mar- 2022].

A.Gillis, "What is IoT (Internet of Things) and How Does it Work?", IoT Agenda, 2021. [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT. [Accessed: 01- Mar- 2022].

C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey", IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 414-454, 2014. Available: 10.1109/surv.2013.042313.00197.

H. Atlam and G. Wills, "IoT Security, Privacy, Safety and Ethics", Internet of Things, pp. 123-149, 2019. Available: 10.1007/978-3-030-18732-3_8 [Accessed 1 March 2022].

O. Vermesan, P. Friess and A. Furness, The Internet of Things 2012 - New Horizon, 3rd ed. Halifax, UK: Internet of things European Research cluster, 2012.

J. SathishKumar and D. R. Patel, "A Survey on Internet of Things: Security and Privacy Issues", International Journal of Computer Applications, vol. 90, no. 11, pp. 20-26, 2014. Available: 10.5120/15764-4454.

P. Kumar and U. Pati, "IoT Based Monitoring and Control of Appliances for Smart Home", in IEEE International Conference On Recent Trends In Electronics Information Communication Technology, India, 2016, pp. 1145 - 1150.

M. Pawar and P. Umale, "Internet of Things Based Home Security Using Raspberry Pi", in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), India, 2018.

G. Mantas, D. Lymberopoulos, and N. Komninos, “Security in Smart Home Environment,” 2011.

C. Lee, L. Zappaterra, K. Choi and H. Choi, "Securing smart home: Technologies, security challenges, and security requirements", in 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, 2014, pp. 67–72.

S. Lee, J. Kim and T. Shon, "User privacy-enhanced security architecture for home area network of Smartgrid", Multimedia Tools and Applications, vol. 75, no. 20, pp. 12749-12764, 2016. Available: 10.1007/s11042-016-3252-2.

S. Chitnis, N. Deshpande and A. Shaligram, "An Investigative Study for Smart Home Security: Issues, Challenges and Countermeasures", Wireless Sensor Network, vol. 08, no. 04, pp. 61-68, 2016. Available: 10.4236/wsn.2016.84006.

C. Chhetri and V. Motti, "Eliciting Privacy Concerns for Smart Home Devices from a User Centered Perspective", Information in Contemporary Society, pp. 91-101, 2019. Available: 10.1007/978-3-030-15742-5_8 [Accessed 1 March 2020].

V. Sivaraman, H. Gharakheili, C. Fernandes, N. Clark and T. Karliychuk, "Smart IoT Devices in the Home: Security and Privacy Implications", IEEE Technology and Society Magazine, vol. 37, no. 2, pp. 71-79, 2018. Available: 10.1109/mts.2018.2826079 [Accessed 1 March 2020].

M. Plachkinova, A. Vo and A. Alluhaidan, "Emerging Trends in Smart Home Security, Privacy, and Digital Forensics", San Diego, 2016.

Downloads

Published

2022-03-13

How to Cite

Liman, M. D., Binta Ali Shuwa, Muhammed Abubakar, & Salamatu Osanga Ibrahim. (2022). Usable Privacy Mechanisms in Home Security Camera Systems. International Journal of Sciences: Basic and Applied Research (IJSBAR), 62(1), 37–54. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/13896

Issue

Section

Articles