Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts

Shrirang Mare 1 , Franziska Roesner 2  and Tadayoshi Kohno 3
  • 1 University of Washington and Indiana University,
  • 2 University of Washington,
  • 3 University of Washington,

Abstract

Consumer smart home devices are becoming increasingly pervasive. As Airbnb hosts deploy smart devices in spaces shared with guests, we seek to understand the security and privacy implications of these devices for both hosts and guests. We conducted a large-scale survey of 82 hosts and 554 guests to explore their current technology practices, their preferences for smart devices and data collection/sharing, and their privacy and security concerns in the context of Airbnbs. We found that guests preferred smart devices, even viewed them as a luxury, but some guests were concerned that smart devices enable excessive monitoring and control, which could lead to repercussions from hosts (e.g., locked thermostat). On average, the views of guests and hosts on data collection in Airbnb were aligned, but for the data types where differences occur, serious privacy violations might happen. For example, 90% of our guest participants did not want to share their Internet history with hosts, but one in five hosts wanted access to that information. Overall, our findings surface tensions between hosts and guests around the use of smart devices and in-home data collection. We synthesize recommendations to address the surfaced tensions and identify broader research challenges.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Wi-Fi security with RADIUS. Last accessed November 2019, Online at https://networkradius.com/blog/security/wifi-security-with-radius/index.html.

  • [2] Handbook of Survey Research. Elsevier, 1983. DOI 10.1016/C2013-0-11411-0.

  • [3] Airbnb hosting safety. Last accessed May 2019, Online at https://www.airbnb.com/help/article/887/what-areairbnb-s-rules-about-electronic-surveillance-devices-in-listings.

  • [4] Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. SoK: Security evaluation of home-based IoT deployments. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2019. DOI 10.1109/SP.2019. 00013.

  • [5] Virginia Braun and Victoria Clarke. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, January 2006. DOI 10.1191/1478088706qp063oa.

  • [6] L. Jean Camp. Mental models of privacy and security. IEEE Technology and Society Magazine, 2009. DOI 10.1109/MTS. 2009.934142.

  • [7] Filippo Celata, Cary Yungmee Hendrickson, and Venere Stefania Sanna. The sharing economy as community marketplace? Trust, reciprocity and belonging in peer-to-peer accommodation platforms. Cambridge Journal of Regions, Economy and Society, 10(2), 2017. DOI 10.1093/cjres/rsw044.

  • [8] Mingming Cheng and Xin Jin. What do Airbnb users care about? An analysis of online review comments. International Journal of Hospitality Management, 76, January 2019. DOI 10.1016/j.ijhm.2018.04.004.

  • [9] Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Transactions on Mobile Computing, 2019. DOI 10.1109/TMC.2019.2900919.

  • [10] Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. Living in a glass house: A survey of private moments in the home. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp). ACM, 2011. DOI 10.1145/2030112.2030118.

  • [11] Douglas P. Crowne and David Marlowe. A new scale of social desirability independent of psychopathology. Journal of Consulting Psychology, 24(4), 1960. DOI 10.1037/h0047358.

  • [12] Edward E. Cureton. Rank-biserial correlation. Psychometrika, 21(3), September 1956. DOI 10.1007/BF02289138.

  • [13] Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. Computer security and the modern home. Commununications of the ACM, 56(1), January 2013. DOI 10.1145/2398356. 2398377.

  • [14] Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. Security analysis of emerging smart home applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2016. DOI 10.1109/SP.2016.44.

  • [15] Andrey Fradkin, Elena Grewal, and David Holtz. The determinants of online review informativeness: Evidence from field experiments on Airbnb. SSRN Scholarly Paper ID 2939064, April 2018. Online at https://papers.ssrn.com/abstract=2939064.

  • [16] Christine Geeng and Franziska Roesner. Who’s in control?: Interactions in multi-user smart homes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2019. DOI 10.1145/3290605.3300498.

  • [17] Eric A. Greenleaf. Measuring extreme response style. The Public Opinion Quarterly, 56(3), 1992. Online at https://www.jstor.org/stable/2749156.

  • [18] Airbnb: Vacation rentals, homes, experiences & places. Online at https://www.airbnb.com/.

  • [19] HomeExchange – #1 home exchange community. Online at https://www.homeexchange.com/.

  • [20] Homestay accommodation worldwide for short and long term stays. Online at https://www.homestay.com/.

  • [21] Utility smart meter installations worry Rockland and Westchester homeowners on privacy. Last accessed May 2019, Online at https://www.lohud.com/story/news/2018/11/14/smart-meters-pose-privacy-worries-homeowners-o-andr-con-ed/1823505002/.

  • [22] Suman Jana, Arvind Narayanan, and Vitaly Shmatikov. A scanner darkly: Protecting user privacy from perceptual applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2013. DOI 10.1109/SP. 2013.31.

  • [23] Airi Lampinen and Coye Cheshire. Hosting via Airbnb: Motivations and financial assurances in monetized network hospitality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, 2016. DOI 10.1145/2858036.2858092.

  • [24] Josephine Lau, Benjamin J Zimmerman, and Florian Schaub. Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 2(CSCW), 2018. DOI 10.1145/3274371.

  • [25] Paul Lavrakas. Encyclopedia of Survey Research Methods. Sage Publications, Inc., 2008. DOI 10.4135/9781412963947.

  • [26] Xiao Ma, Jeffrey T. Hancock, Kenneth Lim Mingjie, and Mor Naaman. Self-disclosure and perceived trustworthiness of Airbnb host profiles. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW), 2017. DOI 10.1145/2998181.2998269.

  • [27] Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. “What can’t data be used for?” Privacy expectations about smart TVs in the U.S. In Proceedings of the European Workshop on Usable Security (EuroSEC, 2018. DOI 10.14722/eurousec.2018.23016.

  • [28] Kirsten E. Martin and Helen Nissenbaum. Measuring privacy: An empirical test using context to expose confounding variables. SSRN Scholarly Paper ID 2709584, Social Science Research Network, December 2015. Online at https://papers.ssrn.com/abstract=2709584.

  • [29] Airbnb statistics for demographics and growth. Last accessed February 2019, Online at https://ipropertymanagement.com/airbnb-statistics/.

  • [30] Airbnb’s impact on hotels, 2015. Last accessed November 2019, Online at http://res.cloudinary.com/yumyoshojin/image/upload/v1/pdf/future-of-hospitality.pdf.

  • [31] Important reasons why people use Airbnb in the United States and Europe from 2015 to 2017, 2017. Last accessed November 2019, Online at https://www.statista.com/statistics/796866/reasons-people-use-airbnb/.

  • [32] Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman M. Sadeh. Privacy expectations and preferences in an IoT world. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2017. Online at https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeini.

  • [33] Pardis Emami Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. Exploring how privacy and security factor into IoT device purchase behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2019. DOI 10.1145/3290605.3300764.

  • [34] Will Qiu, Paolo Parigi, and Bruno D. Abrahao. More stars or more reviews? Differential effects of reputation on trust in the sharing economy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2018. DOI 10.1145/3173574.3173727.

  • [35] Elissa M. Redmiles, Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. A summary of survey methodology best practices for security and privacy researchers, 2017. DOI 10.13016/M22K2W.

  • [36] Fred B Schneider. Least privilege and more. IEEE Security & Privacy, 99(5), 2003. DOI 10.1109/MSECP.2003.1236236.

  • [37] Richard E Smith. A contemporary look at Saltzer and Schroeder’s 1975 design principles. IEEE Security & Privacy, 10(6), 2012. DOI 10.1109/MSP.2012.85.

  • [38] Sara Sorcher. The Technology 202: Alexa, are you spying on me? Here’s why smart speakers raise serious privacy concerns. The Washington Post, May 2019. Online at https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/05/06/the-technology-202-alexaare-you-spying-on-me-here-s-why-smart-speakers-raise-serious-privacy-concerns/5ccf46a9a7a0a46cfe152c3c/.

  • [39] Aron Szanto and Neel Mehta. A host of troubles: Re-identifying Airbnb hosts using public data. Technology Science, October 2018. Online at https://techscience.org/a/2018100902.

  • [40] Rick Wash. Folk models of home computer security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). ACM, 2010. DOI 10.1145/1837110.1837125.

  • [41] Molly Wood. CES: Security risks from the smart home. The New York Times, January 2018. Online at https://www.nytimes.com/2015/01/08/technology/personaltech/ces-security-risks-from-the-smart-home.html.

  • [42] Kevin Wu and Brent Lagesse. Do you see what I see? Detecting hidden streaming cameras through similarity of simultaneous observation. CoRR, abs/1901.02818, 2019. Online at http://arxiv.org/abs/1901.02818.

  • [43] Eric Zeng, Shrirang Mare, and Franziska Roesner. End user security and privacy concerns with smart homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2017. Online at https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng.

  • [44] Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 2(CSCW), November 2018. DOI 10.1145/3274469.

  • [45] Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. Home, smart home – Exploring end users’ mental models of smart homes. In Raimund Dachselt and Gerhard Weber, editors, Mensch und Computer 2018 - Workshopand. Gesellschaft für Informatik e.V., 2018. DOI 10.18420/muc2018-ws08-0539.

OPEN ACCESS

Journal + Issues

Search