Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing

被引:0
作者
Xing, Michael [1 ]
Julien, Christine [1 ]
机构
[1] Univ Texas Austin, Ctr Adv Res Software Engn, Austin, TX 78712 USA
来源
MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES | 2014年 / 131卷
关键词
FRAMEWORK;
D O I
10.1007/978-3-319-11569-6_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In ubiquitous computing environments, we are surrounded by significant amounts of context information about our individual situations and the situations we share with others around us. Along with the widespread emergence of ubiquitous computing and the availability of context information comes threats to personal privacy that result from sharing information about ourselves with others in the vicinity. We define an individual's context to be a potentially private piece of information. Given the individual context of multiple participants, one can compute an aggregate context that represents a shared state while at the same time preserves individual participants' privacy. In this paper, we describe three approaches to computing an aggregate measure of a group's context while maintaining a balance between the desire to share information and the desire to retain control over private information. Our approaches allow dynamic tuning of information release according to trust levels of the participants within communication range. By evaluating our approaches through simulation, we show that sharing aggregate context can significantly increase the rate at which a group of co-located users learns an aggregate measure of their shared context. Further, our approaches can accomplish high quality context sharing even in situations with low levels of trust, assuming the availability of a small number of highly trustworthy partners.
引用
收藏
页码:316 / 329
页数:14
相关论文
共 26 条
  • [1] Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
  • [2] [Anonymous], P SIMUTOOLS
  • [3] [Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
  • [4] Peer-to-Peer Secure Multi-Party Numerical Computation
    Bickson, Danny
    Dolev, Danny
    Bezman, Genia
    Pinkas, Benny
    [J]. P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 257 - +
  • [5] Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
  • [6] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [7] Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
  • [8] Ganti RK, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P281
  • [9] Grim E., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P475, DOI 10.1109/PerComW.2012.6197539
  • [10] Protecting location privacy through path confusion
    Hoh, B
    Gruteser, M
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 194 - 205