Mostrar el registro sencillo del ítem
Analysis of security and data control in smart personal assistants from the user’s perspective
dc.contributor.author | Valero Amores, Cayetano | es-ES |
dc.contributor.author | Pérez Sánchez, Jaime | es-ES |
dc.contributor.author | Solera Cotanilla, Sonia | es-ES |
dc.contributor.author | Vega Barbas, Mario | es-ES |
dc.contributor.author | Suárez de Tangil, Guillermo | es-ES |
dc.contributor.author | Álvarez-Campana Fernández-Corredor, Manuel | es-ES |
dc.contributor.author | López López, Gregorio | es-ES |
dc.date.accessioned | 2024-02-23T13:31:03Z | |
dc.date.available | 2024-02-23T13:31:03Z | |
dc.date.issued | 2023-07-01 | es_ES |
dc.identifier.issn | 0167-739X | es_ES |
dc.identifier.uri | https:doi.org10.1016j.future.2023.02.009 | es_ES |
dc.description | Artículos en revistas | es_ES |
dc.description.abstract | es-ES | |
dc.description.abstract | Advances in the fields of the Internet of Things, Speech Recognition and Artificial Intelligence have facilitated the development of Smart Personal Assistants. As a result, Smart Personal Assistants currently allow requesting a wide range of tasks naturally and intuitively through voice interaction. Their wide popularity, together with the high technological complexity of their environments, have made them an attractive target from a security point of view. Recent works have shown some of the security and privacy issues they stand upon. In this work, we propose a methodology to carry out a systematic security analysis of Smart Personal Assistants using a comprehensive set of tests designed to measure issues around the installation, the interaction, key functionality, and overall Security and Privacy controls. We apply this methodology to analyse security and data control in predominant commercial Smart Personal Assistants (SPA), including Apple HomePod, Google Home and Nest, Amazon Echo (Show and Dot), and Facebook Portal. The main findings of our research are: (i) SPA are not resilient to voice replay attacks; (ii) their skills activation mechanisms can be significantly improved to be more reliable in multi-user households; (iii) the users’ control to restrict the collection and access of Personally Identifiable Information can be also improved; (iv) they lack configurations adapted to minors, which should be included to make them more appropriate for a segment of users who interact more and more with them and have especially high regulatory requirements regarding security and data protection. Among the many hot research topics within this area, we find voice authentication and authorization especially interesting since they may push the usability of Smart Personal Assistants further, as long as they are robust enough from the security perspective. | en-GB |
dc.format.mimetype | application/octet-stream | es_ES |
dc.language.iso | en-GB | es_ES |
dc.source | Revista: Future Generation Computer Systems, Periodo: 1, Volumen: online, Número: , Página inicial: 12, Página final: 23 | es_ES |
dc.subject.other | Instituto de Investigación Tecnológica (IIT) | es_ES |
dc.title | Analysis of security and data control in smart personal assistants from the user’s perspective | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.description.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.rights.holder | es_ES | |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.keywords | es-ES | |
dc.keywords | Cybersecurity; Data control; Internet of things; Minors; Smart personal assistants; Testing methodology | en-GB |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Artículos
Artículos de revista, capítulos de libro y contribuciones en congresos publicadas.