Protection of privacy in pervasive computing environments

被引:16
作者
Cheng, HS [1 ]
Zhang, DQ [1 ]
Tan, JG [1 ]
机构
[1] Inst Infocomm Res, Context Aware Syst Dept, Singapore 119613, Singapore
来源
ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2 | 2005年
关键词
D O I
10.1109/ITCC.2005.233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two techniques. The first technique called Privacy Sensitive Information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 10 条
[1]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[2]  
CAMPBELL R, 2002, MEXT NSFOJSPS INT S, P1
[3]  
CUELLAR J, 2003, GEOPRIV REQUIREMENTS
[4]  
DIAZ C, 2002, LNCS, V2482
[5]  
DURI S, 2003, MONET SPECIAL ISSUE
[6]  
LANGHEINRICH M, 2000, 4 INT C UB COMP UB 2
[7]  
PFITZMANN A, 2000, P INT WORKSH DES ISS
[8]  
SERJANTOV A, 2002, LNCS, V2482
[9]  
SHANNON C, 1948, BELL SYST TECH J, V30, P50
[10]  
[No title captured]