Martina Brachmann, Gregoire Phillips, Utku Gülen, Valentin Tudor
{"title":"Toward Privacy-Preserving Localization and Mapping in eXtended Reality: A Privacy Threat Model","authors":"Martina Brachmann, Gregoire Phillips, Utku Gülen, Valentin Tudor","doi":"10.1109/EuCNC/6GSummit58263.2023.10188227","DOIUrl":null,"url":null,"abstract":"This study focuses on modelling privacy threats in the eXtended Reality (XR) domain with an emphasis on generic localization and mapping processes that run on or are offloaded by widely used equipment such as XR glasses. With the help of a privacy threat assessment framework, we model privacy threats that can affect the different XR processes and equipment. In addition to the threat analysis results, we provide a brief overview of threat mitigation techniques for each threat category. This strengthens privacy in XR processes and equipment and allows for privacy-preserving localization and mapping in XR scenario.","PeriodicalId":65870,"journal":{"name":"公共管理高层论坛","volume":"32 1","pages":"635-640"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"公共管理高层论坛","FirstCategoryId":"96","ListUrlMain":"https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This study focuses on modelling privacy threats in the eXtended Reality (XR) domain with an emphasis on generic localization and mapping processes that run on or are offloaded by widely used equipment such as XR glasses. With the help of a privacy threat assessment framework, we model privacy threats that can affect the different XR processes and equipment. In addition to the threat analysis results, we provide a brief overview of threat mitigation techniques for each threat category. This strengthens privacy in XR processes and equipment and allows for privacy-preserving localization and mapping in XR scenario.