Skip to main content

A Glance of Child’s Play Privacy in Smart Toys

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Abstract

A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the Cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. Referring to the direction of the United States Federal Trade Commission Children’s Online Privacy Protection Act (COPPA) and the European Union Data Protection Directive (EUDPD), this study adopts the definition of a child to be an individual under the age of 13 years old. In this study, the first assumption is that children do not understand the concept of privacy. The second assumption is that children will disclose as much information to smart toys as they can trust. Breaches of privacy can result in physical safety of child user, e.g., child predators. While the parents/legal guardians of a child strive to ensure their child’s physical and online safety and privacy, there is no common approach for these parents/guardians to study the information flow between their child and the smart toys they interact with. This paper discusses related privacy requirements for smart toys in a toy computing environment with a case study on a commercial smart toy called Hello Barbie from Mattel.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • AlHarthy, K., Shawkat, W.: Implement network security control solutions in BYOD environment. In: The 2013 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 7–11 (2013)

    Google Scholar 

  • Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: The 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)

    Google Scholar 

  • Armando, A., Costa, G., Verderame, L., Merlo, A.: Securing the bring your own device paradigm. Computer 47(6), 48–56 (2014)

    Article  Google Scholar 

  • Chakraborty, S., Raghavan, K.R., Johnson, M.P., Srivastava, M.B.: A framework for context-aware privacy of sensor data on mobile systems. In: The Fourteenth Workshop on Mobile Computing Systems and Applications (HotMobile2013) (2013)

    Google Scholar 

  • Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness, Georgia Institute of Technology, College of Computing (1999)

    Google Scholar 

  • Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015)

    Google Scholar 

  • Hadzovic, S., Serval, D., Kovacevic, S.: Regulatory aspects of child online protection. In: The 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 409–412 (2015)

    Google Scholar 

  • Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)

    Article  Google Scholar 

  • Hinske, S., Langheinrich, M.: An infrastructure for interactive and playful learning in augmented toy environments. In: The IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), pp. 1–6 (2009)

    Google Scholar 

  • Hung, P.C.K.: Mobile Services for Toy Computing. Applications and Trends in Computer Science. Springer International Publishing, Switzerland (2015)

    Book  Google Scholar 

  • Hung, P.C.K., Cheng, V.S.Y.: Privacy, Encyclopedia of Database Systems, pp. 2136–2137. Springer, New York (2009)

    Google Scholar 

  • Livingstone, S., Haddon, L., Gorzig, A., Olafsson, K.: Risks and Safety on the Internet: The Perspective of Europan Children, Full findings and policy implications from the EU Kids Online survey of 9–16 year olds and their parents in 25 countries, London School of Economics and Political Science, London (2011)

    Google Scholar 

  • Noor, R., Sahila, S., Jamal, S., Zakaria K.H.: Parental module control system for children’s internet use. In: The 2012 International Conference on Information Society (i-society), pp. 511–513 (2012)

    Google Scholar 

  • Peng, W., Li, F., Han, K.J., Zou, X.K., Wu, J.: T-dominance: prioritized defense deployment for BYOD security. In: The 2013 IEEE Conference on Communications and Network Security (CNS), pp. 37–45 (2013)

    Google Scholar 

  • Plowman, L., Luckin, R.: Interactivity, interfaces, and smart toys. Computer 37(2), 98–100 (2004)

    Article  Google Scholar 

  • Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  • Salah, A.A., Lepri, B., Pentland, A., Canny, J.: Understanding and changing behavior. Pervasive Comput. 12(3), 18–20 (2013)

    Article  Google Scholar 

  • Salomon, D.: Privacy and Trust, Elements of Computer Security, pp. 273–290 (2010)

    Google Scholar 

  • Schmidt, A.: “Interactive Context-Aware Systems Interacting with Ambient Intelligence,” Ambient Intelligence. IOS Press, pp. 159–178 (2005)

    Google Scholar 

  • Schell, B.H., Martin, M.V., Hung, P.C.K., Rueda, L.: Cyber child pornography: a review paper of the social and legal issues and remedies, aggression and violent behavior. Elsevier 12(1), 45–63 (2007)

    Google Scholar 

  • Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: The First Workshop on Mobile Computing Systems and Applications, pp. 85–90 (1994)

    Google Scholar 

  • Shen, J., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)

    Article  Google Scholar 

  • Sun, G., Huang, S., Bao, W., Yang, Y., Wang, Z.: A privacy protection policy combined with privacy homomorphism in the internet of things. In: The 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2014)

    Google Scholar 

  • Tanaka, F., Kimura, T.: The use of robots in early education: a scenario based on ethical consideration. In: The 18th IEEE International Symposium on Robot and Human Interactive Communication, pp. 558–560 (2009)

    Google Scholar 

  • Tath, E.I.: Context data model for privacy. In: PRIME Standardization Workshop, IBM Zurich, 6 pages (2006)

    Google Scholar 

  • Taylor, E., Michael, K.: Smart toys that are the stuff of nightmares. IEEE Technol. Soc. Mag. 35(1), 8–10 (2016)

    Article  Google Scholar 

  • Tracy, L., Westeyn, G.D.: Monitoring children’s developmental progress using augmented toys and activity recognition. Pers. Ubiquit. Comput. 16(2), 169–191 (2012)

    Article  Google Scholar 

  • World Economic Forum. Personal Data: The Emergence of a New Asset Class, World Economic Forum (2011)

    Google Scholar 

  • W3C. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, World Wide Web Consortium (W3C) Recommendation (2002)

    Google Scholar 

  • Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgement

This work was supported by the Ministry of Science and Technology (MOST), Taiwan, under MOST Grants: 105-2923-E-027 -001 -MY3, 105-2221-E-027 -113, 105-2811-E-027 -001, 104-2221-E-027 -020, 103-2221-E-027 -031 -MY2, 103-2923-E-002 -011 -MY3, & 103-2221-E-027 -030 -MY2; the Research Office - Zayed University, Abu Dhabi, United Arab Emirates, under Research Projects: R15048 & R15046; and the Natural Sciences and Engineering Research Council of Canada (NSERC), under NSERC Discovery Grants Program: RGPIN-2016-05023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick C. K. Hung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Hung, P.C.K., Iqbal, F., Huang, SC., Melaisi, M., Pang, K. (2016). A Glance of Child’s Play Privacy in Smart Toys. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics