Abstract
A new visualization user experience is expected to be empowered with XR technologies. XR accommodates a wide range of computerized reality technology, such as AR (Augmented Reality), MR (Mixed Reality), and VR (Virtual Reality). XR is providing more immerse and entertaining user experience. The number of devices increases and it is leveraging a wide range of applications. As consumer XR applications start to grow, it is important to understand the privacy threats. The author describes privacy threats in XR. First, the author discusses privacy threat elements. Second, the author describes a 3-dimensional model of privacy threats in XR. It clarifies the XR-specific privacy threats in addition to other sensor API-enabled applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Desai, B.C.: IoT: imminent ownership threat. In: Proceedings of the 21st International Database Engineering & Applications Symposium, IDEAS 2017, pp. 82–89. ACM, New York (2017)
Dong, R., Ratliff, L.J., Cárdenas, A.A., Ohlsson, H., Sastry, S.S.: Quantifying the utility-privacy tradeoff in the internet of things. ACM Trans. Cyber Phys. Syst. 2(2), 8:1–8:28 (2018)
Ferdous, M.S., Chowdhury, S., Jose, J.M.: Privacy threat model in lifelogging. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, UbiComp 2016, pp. 576–581. ACM, New York (2016)
Jones, B., Waliczek, N.: WebXR device API. In: W3C Working Draft, 10 October 2019. https://www.w3.org/TR/2019/WD-webxr-20191010/
Kettani, H., Cannistra, R.M.: On cyber threats to smart digital environments. In: Proceedings of the 2nd International Conference on Smart Digital Environment, ICSDE 2018, pp. 183–188. ACM, New York (2018)
Lebeck, K., Kohno, T., Roesner, F.: How to safely augment reality: challenges and directions. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, HotMobile 2016, pp. 45–50. ACM, New York (2016)
Moustaka, V., Theodosiou, Z., Vakali, A., Kounoudes, A.: Smart cities at risk!: privacy and security borderlines from social networking in cities. In: Companion Proceedings of the Web Conference 2018, WWW 2018, pp. 905–910. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2018)
Olejnik, L., Novak, J.: Self-review questionnaire: security and privacy, December 2018. https://w3ctag.github.io/security-questionnaire/
Siby, S., Maiti, R.R., Tippenhauer, N.O.: IoTScanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS 2017, pp. 23–30. ACM, New York (2017)
Soh, L., Burke, J., Zhang, L.: Supporting augmented reality: looking beyond performance. In: Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, VR/AR Network 2018, pp. 7–12. ACM, New York (2018)
Waldron, R.: Generic sensor API, November 2018. https://w3c.github.io/sensors/#security-and-privacy
Wuyts, K., Van Landuyt, D., Hovsepyan, A., Joosen, W.: Effective and efficient privacy threat modeling through domain refinements. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1175–1178. ACM, New York (2018)
Zhang, R., Zhang, N., Du, C., Lou, W., Hou, Y.T., Kawamoto, Y.: From electromyogram to password: exploring the privacy impact of wearables in augmented reality. ACM Trans. Intell. Syst. Technol. 9(1), 13:1–13:20 (2017)
Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents’ perception of mobile threats. In: Proceedings of the 15th International Conference on Interaction Design and Children, IDC 2016, pp. 388–399. ACM, New York (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yamakami, T. (2020). A Privacy Threat Model in XR Applications. In: Barolli, L., Okada, Y., Amato, F. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-39746-3_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-39746-3_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39745-6
Online ISBN: 978-3-030-39746-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)