Protecting privacy and anonymity in pervasive computing: Trends and perspectives

被引:15
作者
Department of Informatics, Athens University of Economics and Business, 76 Patission Avenue, Athens GR-10434, Greece [1 ]
不详 [2 ]
机构
[1] Department of Informatics, Athens University of Economics and Business, Athens GR-10434
[2] Department of Information and Communication Systems Engineering, University of the Aegean
来源
Telematics Inf | 2006年 / 3卷 / 196-210期
关键词
Anonymity; Pervasive computing; Privacy; Privacy principles;
D O I
10.1016/j.tele.2005.07.005
中图分类号
学科分类号
摘要
Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. We identify flaws, these mechanisms suffer by, in terms of the limited anonymity level they offer. We conclude by presenting a set of essential actions one should take into account, in order to ensure user's anonymity in a pervasive computing environment. © 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:196 / 210
页数:14
相关论文
共 25 条
[1]  
Adams A., The implications of users' privacy perception on communication and information privacy policies, Proceedings of Telecommunications Policy Research (TPRC), (1999)
[2]  
Beresford A., Stajano F., Location privacy in pervasive computing, IEEE Pervasive Computing, 2, 1, pp. 46-55, (2003)
[3]  
Chaum D., The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, 1, 1, pp. 65-75, (1988)
[4]  
Fasbender A., Kesdogan D., Kubitz O., Analysis of security and privacy in mobile IP, Proceedings of 4th International Conference on Telecommunication Systems, Modelling and Analysis, (1996)
[5]  
Information Technology-security Techniques-evaluation Criteria for IT Security, (1999)
[6]  
Jendricke U., Kreutzer M., Zugenmaier A., Pervasive privacy with identity management, Proceedings of the Workshop on Security in Ubiquitous Computing, UbiComp 2002, (2002)
[7]  
Jiang X., Landay J., Modelling privacy control in context-aware systems, IEEE Pervasive Computing, 1, 3, pp. 59-63, (2002)
[8]  
Kesdogan D., Reichl P., Junghrtchen K., Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks, Lecture Notes in Computer Science, 1485, pp. 295-312, (1998)
[9]  
Lahlou S., Jegou F., European disappearing computer privacy design guidelines (version 1.1), Ambient Agoras Programme Report (IST-2000-25134), (2004)
[10]  
Lahlou S., Langheinrich M., Rocker C., Privacy and trust issues with invisible computers, Communications of the ACM, 48, 3, pp. 59-60, (2005)