Literature DB >> 33810212

On the Security and Privacy Challenges of Virtual Assistants.

Tom Bolton1, Tooska Dargahi1, Sana Belguith1, Mabrook S Al-Rakhami2, Ali Hassan Sodhro3,4,5.   

Abstract

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to interact with them conversationally, almost as they would with another human. To service user voice requests, VAs transmit large amounts of data to their vendors; these data are processed and stored in the Cloud. The potential data security and privacy issues involved in this process provided the motivation to examine the current state of the art in VA research. In this study, we identify peer-reviewed literature that focuses on security and privacy concerns surrounding these assistants, including current trends in addressing how voice assistants are vulnerable to malicious attacks and worries that the VA is recording without the user's knowledge or consent. The findings show that not only are these worries manifold, but there is a gap in the current state of the art, and no current literature reviews on the topic exist. This review sheds light on future research directions, such as providing solutions to perform voice authentication without an external device, and the compliance of VAs with privacy regulations.

Entities:  

Keywords:  GDPR; data security; internet of things; privacy; smart homes; virtual assistant

Year:  2021        PMID: 33810212     DOI: 10.3390/s21072312

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  3 in total

1.  A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog.

Authors:  Shilan S Hameed; Ali Selamat; Liza Abdul Latiff; Shukor A Razak; Ondrej Krejcar; Hamido Fujita; Mohammad Nazir Ahmad Sharif; Sigeru Omatu
Journal:  Sensors (Basel)       Date:  2021-12-11       Impact factor: 3.576

2.  A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography.

Authors:  Rose Adee; Haralambos Mouratidis
Journal:  Sensors (Basel)       Date:  2022-02-01       Impact factor: 3.576

3.  Towards Cognitive Authentication for Smart Healthcare Applications.

Authors:  Ali Hassan Sodhro; Charlotte Sennersten; Awais Ahmad
Journal:  Sensors (Basel)       Date:  2022-03-09       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.