Analysis of security and data control in smart personal assistants from the user's perspective

被引:4
|
作者
Valero, Cayetano [1 ]
Perez, Jaime [1 ]
Solera-Cotanilla, Sonia [2 ]
Vega-Barbas, Mario [2 ]
Suarez-Tangil, Guillermo [3 ]
Alvarez-Campana, Manuel [2 ]
Lopez, Gregorio [1 ]
机构
[1] Univ Pontificia Comillas, Inst Res Technol, ICAI Engn Sch, Madrid 28015, Spain
[2] Univ Politecn Madrid, ETSI Telecomunicac, Madrid 28040, Spain
[3] IMDEA Networks Inst, Leganes 28918, Spain
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Data control; Internet of things; Minors; Smart personal assistants; Testing methodology;
D O I
10.1016/j.future.2023.02.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Advances in the fields of the Internet of Things, Speech Recognition and Artificial Intelligence have facilitated the development of Smart Personal Assistants. As a result, Smart Personal Assistants currently allow requesting a wide range of tasks naturally and intuitively through voice interaction. Their wide popularity, together with the high technological complexity of their environments, have made them an attractive target from a security point of view. Recent works have shown some of the security and privacy issues they stand upon. In this work, we propose a methodology to carry out a systematic security analysis of Smart Personal Assistants using a comprehensive set of tests designed to measure issues around the installation, the interaction, key functionality, and overall Security and Privacy controls. We apply this methodology to analyse security and data control in predominant commercial Smart Personal Assistants (SPA), including Apple HomePod, Google Home and Nest, Amazon Echo (Show and Dot), and Facebook Portal. The main findings of our research are: (i) SPA are not resilient to voice replay attacks; (ii) their skills activation mechanisms can be significantly improved to be more reliable in multi-user households; (iii) the users' control to restrict the collection and access of Personally Identifiable Information can be also improved; (iv) they lack configurations adapted to minors, which should be included to make them more appropriate for a segment of users who interact more and more with them and have especially high regulatory requirements regarding security and data protection. Among the many hot research topics within this area, we find voice authentication and authorization especially interesting since they may push the usability of Smart Personal Assistants further, as long as they are robust enough from the security perspective.(c) 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:12 / 23
页数:12
相关论文
共 50 条
  • [31] Canadian climate data portals: A comparative analysis from a user perspective
    Lavoie, Juliette
    Caron, Louis-Philippe
    Logan, Travis
    Barrow, Elaine
    CLIMATE SERVICES, 2024, 34
  • [32] A User’s Perspective on Data Systems Validation
    Steven Svindland
    Paula Regan
    Drug information journal : DIJ / Drug Information Association, 2001, 35 (3): : 819 - 825
  • [33] A user's perspective on data systems validation
    Svindland, S
    Regan, P
    DRUG INFORMATION JOURNAL, 2001, 35 (03): : 819 - 825
  • [34] A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy
    Lai, Sen-Tarng
    Leu, Fang-Yie
    Lin, Jeng-Wei
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 561 - 571
  • [35] The evolution of systems analysis and control: A personal perspective
    Zadeh, LA
    IEEE CONTROL SYSTEMS MAGAZINE, 1996, 16 (03): : 95 - 98
  • [36] Security Analysis of a Remote User Authentication Scheme Using Smart Card
    Zhu, Canyan
    Zhang, Lihua
    2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 133 - +
  • [37] Usability from the user's perspective
    Sipes, AJ
    CONFERENCE XXI - AM/FM INTERNATIONAL, PROCEEDINGS, 1998, : 709 - 717
  • [38] Benefits of cloud computing adoption for smart grid security from security perspective
    JeongYeon Kim
    Yanghoon Kim
    The Journal of Supercomputing, 2016, 72 : 3522 - 3534
  • [39] Benefits of cloud computing adoption for smart grid security from security perspective
    Kim, JeongYeon
    Kim, Yanghoon
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3522 - 3534
  • [40] A Smart Home Services Demonstration: Monitoring, Control and Security Services Offered to the User
    Botticelli, Martina
    Ciabattoni, Lucio
    Ferracuti, Francesco
    Monteriu, Andrea
    Pizzuti, Stefano
    Romano, Sabrina
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2018,