• Corpus ID: 6529370

The Privacy Coach: Supporting customer privacy in the Internet of Things

  title={The Privacy Coach: Supporting customer privacy in the Internet of Things},
  author={Gerben Broenink and Jaap-Henk Hoepman and Christian van 't Hof and Rob Van Kranenburg and David Smits and T.H.A. Wisman},
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the… 

Figures from this paper

An overview of user privacy preferences modeling and adoption

An overview of different languages and techniques used for user privacy preferences modeling in different domains, along with systems that adopt these languages and consider users’ privacy preferences are presented.

Privacy of the Internet of Things: A Systematic Literature Review

A systematic literature review of privacy-preserving solutions appearing in the research literature and in the media found that very few solutions satisfied all core privacy principles.

Incorporating Individual and Group Privacy Preferences in the Internet of Things

This mechanism allows IoT users to express and enforce their personal privacy preferences in a seamless manner while interacting with IoT deployments and addresses the privacy concerns of individual users as well as a group of users where privacy preferences of all individual users are combined into a group privacy profile to be negotiated with the IoT owner.

Safe Use of the Internet of Things for Privacy Enhancing

Five phases of information flow, involving sensing, identification, storage, processing, and sharing of this information in technical, social, and legal contexts, in the IoT and three areas of privacy controls that may be considered to manage those flows, will be helpful to practitioners and researchers when evaluating the issues involved as the technology advances.

A Privacy Negotiation Mechanism for the Internet of Things

  • Khaled AlaneziShivakant Mishra
  • Computer Science
    2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
  • 2018
A new privacy negotiation mechanism for an IoT environment that is both efficient and practical to cope with the IoT special need of seamlessness and can be used over a user-managed, edge-managed or a cloud-managed IoT architecture.

Privacy agents in the IoT : considerations on how to balance agent autonomy and user control in privacy decisions

This thesis explored aspects that can help balance the level of user control and system autonomy for intelligent privacy agents in the context of the Internet of Things. This proposed balance could

Identifying the causes and effects of poor privacy practices by online social network users: the potential of advisory monitoring software in changing user behaviour

A hypothesis under examination was that personality traits serve to predict the behaviour of online social networks users, and have the potential to identify those users at risk of either carelessly or unknowingly compromising their personal privacy, to inform the design of training materials that attempt to encourage those users to protect their personal information more carefully.



RFID security and privacy: a research survey

  • A. Juels
  • Business
    IEEE Journal on Selected Areas in Communications
  • 2006
This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.

A Platform for RFID Security and Privacy Administration (Awarded Best Paper!)

The RFID Guardian is presented, the first-ever unified platform for RFID security and privacy administration, and offers a glimpse of what system administration may be like in the future, when laymen face the responsibility to manage systems of tiny computers that they are barely aware of.

Practical Schemes For Privacy & Security Enhanced RFID

This paper proposes an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side.

RFID privacy: an overview of problems and proposed solutions

As organizations aggressively deploy radio frequency identification systems, activists are increasingly concerned about RFID's potential to invade user privacy. This overview highlights potential

Critical rfid privacyenhancing technologies

  • IEEE Security & Privacy 11,
  • 2009

P3P — platform for privacy preferences project

Hof, C. van " t, (2007) RFID and Identity Management in Everyday Life

  • Rathenau Isntitute, STOA report assigned by the European Parliament
  • 2007

An overview of problems and proposed solutions

  • Hoepman and R. Joosten. Practical Schemes For Privacy & Security Enhanced RFID

RFID as the Key to the Ubiquitous Network Society. A Japanese Case Study on Identity Man-agement

  • The Hague: Rathenau Institute and the Royal Dutch Embassy in Tokyo
  • 2008

Hof, C. van 't, (2007) RFID and Identity Management in Everyday Life

  • Rathenau Isntitute, STOA report assigned by the European Parliament
  • 2007