Abstract
A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the Cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. Referring to the direction of the United States Federal Trade Commission Children’s Online Privacy Protection Act (COPPA) and the European Union Data Protection Directive (EUDPD), this study adopts the definition of a child to be an individual under the age of 13 years old. In this study, the first assumption is that children do not understand the concept of privacy. The second assumption is that children will disclose as much information to smart toys as they can trust. Breaches of privacy can result in physical safety of child user, e.g., child predators. While the parents/legal guardians of a child strive to ensure their child’s physical and online safety and privacy, there is no common approach for these parents/guardians to study the information flow between their child and the smart toys they interact with. This paper discusses related privacy requirements for smart toys in a toy computing environment with a case study on a commercial smart toy called Hello Barbie from Mattel.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
AlHarthy, K., Shawkat, W.: Implement network security control solutions in BYOD environment. In: The 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 7–11 (2013)
Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: The 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)
Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the bring your own device paradigm. Computer 47(6), 48–56 (2014)
Chakraborty, S., Raghavan, K.R., Johnson, M.P., Srivastava, M.B.: A framework for context-aware privacy of sensor data on mobile systems. In: The Fourteenth Workshop on Mobile Computing Systems and Applications (HotMobile2013) (2013)
Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness, Georgia Institute of Technology, College of Computing (1999)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015)
Hadzovic, S., Serval, D., Kovacevic, S.: Regulatory aspects of child online protection. In: The 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 409–412 (2015)
Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)
Hinske, S., Langheinrich, M.: An infrastructure for interactive and playful learning in augmented toy environments. In: The IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), pp. 1–6 (2009)
Hung, P.C.K.: Mobile Services for Toy Computing. Applications and Trends in Computer Science. Springer International Publishing, Switzerland (2015)
Hung, P.C.K., Cheng, V.S.Y.: Privacy, Encyclopedia of Database Systems, pp. 2136–2137. Springer, New York (2009)
Livingstone, S., Haddon, L., Gorzig, A., Olafsson, K.: Risks and Safety on the Internet: The Perspective of Europan Children, Full findings and policy implications from the EU Kids Online survey of 9–16 year olds and their parents in 25 countries, London School of Economics and Political Science, London (2011)
Noor, R., Sahila, S., Jamal, S., Zakaria K.H.: Parental module control system for children’s internet use. In: The 2012 International Conference on Information Society (i-society), pp. 511–513 (2012)
Peng, W., Li, F., Han, K.J., Zou, X.K., Wu, J.: T-dominance: prioritized defense deployment for BYOD security. In: The 2013 IEEE Conference on Communications and Network Security (CNS), pp. 37–45 (2013)
Plowman, L., Luckin, R.: Interactivity, interfaces, and smart toys. Computer 37(2), 98–100 (2004)
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
Salah, A.A., Lepri, B., Pentland, A., Canny, J.: Understanding and changing behavior. Pervasive Comput. 12(3), 18–20 (2013)
Salomon, D.: Privacy and Trust, Elements of Computer Security, pp. 273–290 (2010)
Schmidt, A.: “Interactive Context-Aware Systems Interacting with Ambient Intelligence,” Ambient Intelligence. IOS Press, pp. 159–178 (2005)
Schell, B.H., Martin, M.V., Hung, P.C.K., Rueda, L.: Cyber child pornography: a review paper of the social and legal issues and remedies, aggression and violent behavior. Elsevier 12(1), 45–63 (2007)
Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: The First Workshop on Mobile Computing Systems and Applications, pp. 85–90 (1994)
Shen, J., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)
Sun, G., Huang, S., Bao, W., Yang, Y., Wang, Z.: A privacy protection policy combined with privacy homomorphism in the internet of things. In: The 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2014)
Tanaka, F., Kimura, T.: The use of robots in early education: a scenario based on ethical consideration. In: The 18th IEEE International Symposium on Robot and Human Interactive Communication, pp. 558–560 (2009)
Tath, E.I.: Context data model for privacy. In: PRIME Standardization Workshop, IBM Zurich, 6 pages (2006)
Taylor, E., Michael, K.: Smart toys that are the stuff of nightmares. IEEE Technol. Soc. Mag. 35(1), 8–10 (2016)
Tracy, L., Westeyn, G.D.: Monitoring children’s developmental progress using augmented toys and activity recognition. Pers. Ubiquit. Comput. 16(2), 169–191 (2012)
World Economic Forum. Personal Data: The Emergence of a New Asset Class, World Economic Forum (2011)
W3C. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, World Wide Web Consortium (W3C) Recommendation (2002)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Acknowledgement
This work was supported by the Ministry of Science and Technology (MOST), Taiwan, under MOST Grants: 105-2923-E-027 -001 -MY3, 105-2221-E-027 -113, 105-2811-E-027 -001, 104-2221-E-027 -020, 103-2221-E-027 -031 -MY2, 103-2923-E-002 -011 -MY3, & 103-2221-E-027 -030 -MY2; the Research Office - Zayed University, Abu Dhabi, United Arab Emirates, under Research Projects: R15048 & R15046; and the Natural Sciences and Engineering Research Council of Canada (NSERC), under NSERC Discovery Grants Program: RGPIN-2016-05023.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Hung, P.C.K., Iqbal, F., Huang, SC., Melaisi, M., Pang, K. (2016). A Glance of Child’s Play Privacy in Smart Toys. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-48674-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48673-4
Online ISBN: 978-3-319-48674-1
eBook Packages: Computer ScienceComputer Science (R0)