On the Security and Privacy Challenges of Virtual Assistants

被引:54
作者
Bolton, Tom [1 ]
Dargahi, Tooska [1 ]
Belguith, Sana [1 ]
Al-Rakhami, Mabrook S. [2 ]
Sodhro, Ali Hassan [3 ,4 ,5 ]
机构
[1] Univ Salford, Sch Sci Environm & Engn, Salford M5 4WT, Lancs, England
[2] King Saud Univ, Dept Informat Syst, Coll Comp & Informat Sci, Res Chair Pervas & Mobile Comp, Riyadh 11543, Saudi Arabia
[3] Mid Sweden Univ, Dept Comp & Syst Sci, SE-83125 Ostersund, Sweden
[4] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518000, Peoples R China
[5] Sukkur IBA Univ, Dept Elect Engn, Sukkur 65200, Pakistan
关键词
virtual assistant; data security; privacy; GDPR; internet of things; smart homes; PERSONAL ASSISTANTS; ALEXA; SIRI; CORTANA;
D O I
10.3390/s21072312
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to interact with them conversationally, almost as they would with another human. To service user voice requests, VAs transmit large amounts of data to their vendors; these data are processed and stored in the Cloud. The potential data security and privacy issues involved in this process provided the motivation to examine the current state of the art in VA research. In this study, we identify peer-reviewed literature that focuses on security and privacy concerns surrounding these assistants, including current trends in addressing how voice assistants are vulnerable to malicious attacks and worries that the VA is recording without the user's knowledge or consent. The findings show that not only are these worries manifold, but there is a gap in the current state of the art, and no current literature reviews on the topic exist. This review sheds light on future research directions, such as providing solutions to perform voice authentication without an external device, and the compliance of VAs with privacy regulations.
引用
收藏
页数:19
相关论文
共 31 条
[1]  
Barlet-Ros P., 2019, P CONEXT 19 P ORL FL
[2]  
Bathla R., 2019, P 2019 4 INT C INF S
[3]  
Blue J., 2019, P 2019 INT S NETW CO
[4]   "Hey, Siri", "Ok, Google", "Alexa". Acceptance-Relevant Factors of Virtual Voice-Assistants [J].
Burbach, Laura ;
Halbach, Patrick ;
Plettenberg, Nils ;
Nakayama, Johannes ;
Ziefle, Martina ;
Valdez, Andre Calero .
2019 IEEE INTERNATIONAL PROFESSIONAL COMMUNICATION CONFERENCE (PROCOMM), 2019, :101-111
[5]  
Chalhoub G., 2020, P INT C HUMAN COMPUT, P305
[6]   Digital forensic approaches for Amazon Alexa ecosystem [J].
Chung, Hyunji ;
Park, Jungheum ;
Lee, Sangjin .
DIGITAL INVESTIGATION, 2017, 22 :S15-S25
[7]  
Cook J., 2019, PREACHING POPULAR CH
[8]   Continuous Authentication for Voice Assistants [J].
Feng, Huan ;
Fawaz, Kassem ;
Shin, Kang G. .
PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, :343-355
[9]   Alexa, are you listening to me? An analysis of Alexa voice service network traffic [J].
Ford, Marcia ;
Palmer, William .
PERSONAL AND UBIQUITOUS COMPUTING, 2019, 23 (01) :67-79
[10]  
Guzel M.S., 2019, P 2019 4 INT C COMP