{"id":726,"date":"2024-11-20T11:38:35","date_gmt":"2024-11-20T16:38:35","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?p=726"},"modified":"2024-11-22T13:51:13","modified_gmt":"2024-11-22T18:51:13","slug":"privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach","status":"publish","type":"post","link":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/","title":{"rendered":"Privacy in IoT Systems"},"content":{"rendered":"<h2>Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach<\/h2>\n<p><span data-contrast=\"auto\">Addressing privacy concerns in Smart Home (SH) systems is essential, however, more research is needed in analyzing and evaluation of privacy threats for effective risk management. Although there has been some research on privacy in SH, most existing research primarily focuses on user privacy, while often neglecting the importance privacy of device data especially device identity privacy. This oversight can significantly impact overall user privacy within the SH system. This study incorporates privacy engineering (PE) principles into SH systems, considering user and device data privacy. We have developed a comprehensive reference model for a typical SH system, shown in Figure 1.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-729 size-full\" src=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg\" alt=\"\" width=\"800\" height=\"598\" srcset=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg 800w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-240x179.jpg 240w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-400x299.jpg 400w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-160x120.jpg 160w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-768x574.jpg 768w, https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-360x269.jpg 360w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span data-contrast=\"auto\">Using the initial stage (Model the system) of the <\/span><a href=\"https:\/\/linddun.org\/instructions-for-pro\/\"><span data-contrast=\"none\">LINDDUN PRO PE<\/span><\/a><span data-contrast=\"auto\"> framework for privacy engineering, we present a data flow diagram (DFD) based on this reference model to enhance our understanding of how SH systems operate.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We utilize the LINDDUN PRO threat model to identify potential privacy threats and conduct a privacy threat analysis (PTA) which the second stage (Elicit threat). After this, we conduct a privacy impact assessment (PIA) to manage privacy risks by prioritizing threats based on their likelihood of occurrence and potential impact. Finally, we recommend various privacy-enhancing techniques (PETs) that can help mitigate these threats which concluded the last stage (manage threats) of the LINDDUN PE PRO framework.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This approach expresses the correlation between Privacy engineering (PE), privacy threat analysis (PTA), and privacy impact assessment (PIA).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Alalade, E. D., Mahyoub, M., &amp; Matrawy, A. (2024). <\/span><a href=\"https:\/\/arxiv.org\/pdf\/2401.09519\"><span data-contrast=\"none\">Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach<\/span><\/a><span data-contrast=\"none\">.\u202f<\/span><i><span data-contrast=\"none\">arXiv preprint arXiv:2401.09519<\/span><\/i><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart Home (SH) systems is essential, however, more research is needed in analyzing and evaluation of privacy threats for effective risk management. Although there has been some research on privacy in SH, most existing research [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[23],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy in IoT Systems - Next Generation Networks Lab<\/title>\n<meta name=\"description\" content=\"Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EMMANUELALALADE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/\",\"name\":\"Privacy in IoT Systems - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2024-11-20T16:38:35+00:00\",\"dateModified\":\"2024-11-22T18:51:13+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba\"},\"description\":\"Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/carleton.ca\/ngn\/category\/projects\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy in IoT Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba\",\"name\":\"EMMANUELALALADE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g\",\"caption\":\"EMMANUELALALADE\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy in IoT Systems - Next Generation Networks Lab","description":"Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/","twitter_misc":{"Written by":"EMMANUELALALADE","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/","url":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/","name":"Privacy in IoT Systems - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2024-11-20T16:38:35+00:00","dateModified":"2024-11-22T18:51:13+00:00","author":{"@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba"},"description":"Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/carleton.ca\/ngn\/category\/projects\/"},{"@type":"ListItem","position":3,"name":"Privacy in IoT Systems"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/e9f1cb85a289e5c4a84d31fd7eaa19ba","name":"EMMANUELALALADE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/ngn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/135680cf7581dbe522d4016ee5d6cf16?s=96&d=mm&r=g","caption":"EMMANUELALALADE"}}]}},"acf":{"Post Thumbnail Icon":"","Post Thumbnail":{"ID":729,"id":729,"title":"Reference Model2","filename":"Reference-Model2.jpg","filesize":70806,"url":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg","link":"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/reference-model2\/","alt":"","author":"8","description":"","caption":"","name":"reference-model2","status":"inherit","uploaded_to":726,"date":"2024-11-20 16:41:37","modified":"2024-11-20 16:42:02","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/ngn\/wp\/wp-includes\/images\/media\/default.png","width":800,"height":598,"sizes":{"thumbnail":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-160x120.jpg","thumbnail-width":160,"thumbnail-height":120,"medium":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-240x179.jpg","medium-width":240,"medium-height":179,"medium_large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-768x574.jpg","medium_large-width":768,"medium_large-height":574,"large":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-400x299.jpg","large-width":400,"large-height":299,"gallery-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg","1536x1536-width":800,"1536x1536-height":598,"2048x2048":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg","2048x2048-width":800,"2048x2048-height":598,"banner":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg","banner-width":800,"banner-height":598,"people":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2.jpg","rotator-image-width":800,"rotator-image-height":598,"video-thumb":"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Reference-Model2-360x269.jpg","video-thumb-width":360,"video-thumb-height":269}}},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/726"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=726"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/726\/revisions"}],"predecessor-version":[{"id":753,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/posts\/726\/revisions\/753"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/categories?post=726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/tags?post=726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}