Abstract
Serious games are a promising approach for diagnostic and therapeutic as well as educational purposes. Capturing player performance and behavior along with details of gameplay directly from the game is a valuable data source for evaluating serious games and for their iterative refinement. In many serious games, the collected data can however be especially sensitive for privacy, as it may imply learning or health state progression, and thus should be strongly protected. In this paper, we specify goals for a security-enhanced game telemetry system, model a security architecture based on them, and present the design of such a system, which we implemented for evaluation of health games in our research group. The presented system is designed to be applicable for various types of serious games. It employs end-to-end encryption, signatures, and data separation to improve protection of collected data without the addition of usability burdens on players from these security measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.: Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography. Technical report, SP 800–56A, NIST (2018). https://doi.org/10.6028/nist.sp.800-56ar3
Dworkin, M.J.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. Technical report, SP 800–38C, NIST (2007). https://doi.org/10.6028/nist.sp.800-38c
Freire, M., Serrano-Laguna, Á., Iglesias, B.M., Martínez-Ortiz, I., Moreno-Ger, P., Fernández-Manjón, B.: Game learning analytics: learning analytics for serious games. In: Spector, M.J., Lockee, B.B., Childress, M.D. (eds.) Learning, Design, and Technology, pp. 1–29. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-17727-4_21-1
Hansen, T., Eastlake, 3rd, D.E.: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). RFC 6234 (2011). https://doi.org/10.17487/RFC6234
Heimo, O.I., et al.: Ethical gathering of exercise metrics from elderly: case jumppatikku. In: Kreps, D., Fletcher, G., Griffiths, M. (eds.) HCC 2016. IAICT, vol. 474, pp. 14–24. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44805-3_2
ISO/IEC JTC 1/SC 27: Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. Standard ISO/IEC 18033–2:2006, ISO, Geneva, CH (2006)
ITU-T: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. Standard ITU-T X.509 (10/2019) / ISO/IEC 9594–8, ITU (2019). https://handle.itu.int/11.1002/1000/14033
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987). https://doi.org/10.1090/s0025-5718-1987-0866109-5
Moriarty, K., Kaliski, B., Jonsson, J., Rusch, A.: PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017 (2016). https://doi.org/10.17487/RFC8017
NIST: Advanced Encryption Standard (AES). Standard FIPS 197, NIST (2023). https://doi.org/10.6028/NIST.FIPS.197-upd1
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). https://doi.org/10.1145/359340.359342
Acknowledgements
Our research project Senior Health Games is partially funded by the Carl Zeiss Foundation (CZS Transfer program).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bodenschatz, S., Mentler, T., Rezk-Salama, C. (2024). A Security-Focused Architecture for Gameplay Telemetry in Serious Games. In: Dondio, P., et al. Games and Learning Alliance. GALA 2023. Lecture Notes in Computer Science, vol 14475. Springer, Cham. https://doi.org/10.1007/978-3-031-49065-1_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-49065-1_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49064-4
Online ISBN: 978-3-031-49065-1
eBook Packages: Computer ScienceComputer Science (R0)