In Search of User Privacy Protection in Ubiquitous Computing

被引:0
作者
Cleveland, Simon [1 ]
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
来源
2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI) | 2012年
关键词
privacy technologies; mobile privacy solutions; participatory sensing applications; social computing; ubiquitous computing; INFORMATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Participatory applications provide users with value-added and reusable information; however, collection of this information comes at the expense of the participants' privacy. Preserving the mobile participants' privacy is a key concern of mobile computing. This paper outlines current participatory application system model, privacy weaknesses, and existing privacy enhancing technologies. Next, it proposes a study to address mobile privacy protection by educating participants of exploitable privacy areas of their participatory applications. The contribution of the paper is two-fold: it provides a review of the existing privacy weaknesses of PS applications and demonstrates that participants' wanting to know more about these weaknesses warrants further study.
引用
收藏
页码:694 / 699
页数:6
相关论文
共 45 条
[1]   Mobiscopes for human spaces [J].
Abdelzaher, Tarek ;
Anokwa, Yaw ;
Boda, Peter ;
Burke, Jeff ;
Estrin, Deborah ;
Guibas, Leonidas ;
Kansal, Aman ;
Madden, Samuel ;
Reich, Jim .
IEEE PERVASIVE COMPUTING, 2007, 6 (02) :20-29
[2]   Privacy and rationality in individual decision making [J].
Acquisti, A ;
Grossklags, J .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :26-33
[3]  
Acquisti A., 2005, Proceedings of WPES05, P71
[4]  
[Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
[5]  
[Anonymous], P INT WORKSH MOB DEV
[6]  
[Anonymous], P INT WORKSH MOB DEV
[7]  
[Anonymous], 1990, Research in Personnel and Human Resources Management
[8]  
Balebako R., 2011, 2 INT WORKSH PERS IN
[9]   Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs [J].
Benisch, Michael ;
Kelley, Patrick Gage ;
Sadeh, Norman ;
Cranor, Lorrie Faith .
PERSONAL AND UBIQUITOUS COMPUTING, 2011, 15 (07) :679-694
[10]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55