In the recent past we have witnessed a quick rise of smart devices, including smart phones, tablets, smart watch, smart television as well as other smart devices. The smart devices store quite a lot of sensitive personal data (e.g., private photos). These devices can breach one's privacy if information in the devices are accessed by unauthorized users. Therefore, smart devices are facing threats of privacy leaking and how to protect privacy of smart devices is regarded as an important research challenge. In this paper, we propose a system, coined as SmartSec, which employs secret sharing techniques among multiple smart devices to enhance privacy protection. In particular, SmartSec can achieve privacy enhancement by storing sensitive data (e.g., photos) on at least three devices and requiring at least two of them to access the original data. This will thus secure the data from any unauthorized attackers because any leakage of one piece of secret is meaningless. Further, secret sharing will introduce extra computation and transmission overhead. To reduce such an overhead and optimize the performance, another important feature of SmartSec is that it could recognize and classify different locations by exploiting location tags and then apply different security policy to different locations to achieve the tradeoff of security and performance. For example, a user can demarcate safe regions (e.g., home area) and the sensitive data will be automatically recovered in home region, distributed and stored/masked at different devices in public regions, where the process is automated which provides the user a transparent experience. We implement the system and conducted a series of experiments on the prototype to evaluate the results.
[1]
Moni Naor,et al.
Visual Cryptography
,
1994,
Encyclopedia of Multimedia.
[2]
Dan Boneh,et al.
Location Privacy via Private Proximity Testing
,
2011,
NDSS.
[3]
Yuguang Fang,et al.
SPREAD: enhancing data confidentiality in mobile ad hoc networks
,
2004,
IEEE INFOCOM 2004.
[4]
Tzungher Chen,et al.
Efficient multi-secret image sharing based on Boolean operations
,
2011,
Signal Process..
[5]
Wei Sun,et al.
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
,
2012,
J. Syst. Softw..
[6]
G. R. BLAKLEY.
Safeguarding cryptographic keys
,
1979,
1979 International Workshop on Managing Requirements Knowledge (MARK).
[7]
Howard M. Heys,et al.
A novel visual secret sharing scheme without image size expansion
,
2012,
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[8]
Guohong Cao,et al.
APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services
,
2011,
2011 Proceedings IEEE INFOCOM.
[9]
Yao Zheng,et al.
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags
,
2012,
ESORICS.
[10]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[11]
Chin-Chen Chang,et al.
A hierarchical threshold secret image sharing
,
2012,
Pattern Recognit. Lett..
[12]
Yajin Zhou,et al.
Systematic Detection of Capability Leaks in Stock Android Smartphones
,
2012,
NDSS.
[13]
Per Enge,et al.
Robust Location Tag Generation from Noisy Location Data for Security Applications
,
2009
.