Privacy Preserving in Ubiquitous Computing: Challenges & Issues

被引:2
|
作者
Ma, Tinghuai [1 ]
Kim, Shin-Dug [2 ]
Wang, Jun [1 ]
Zhao, Yawei [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing, Peoples R China
[2] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
[3] Grad Univ, Chinese Acad Sci, Beijing 100864, Peoples R China
来源
PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING | 2008年
关键词
D O I
10.1109/ICEBE.2008.55
中图分类号
F [经济];
学科分类号
02 ;
摘要
Privacy preservation is crucial in ubiquitous computing environment. Without this, users feel uneasy to use and live in the UC environment. The implementation of privacy safeguard or privacy enhancing technologies is going to be a long road Understanding the challenges & issues of privacy protected in ubiquitous computing, is helpful to design and implement privacy aware system. In this paper, we try to describe privacy in ubiquitous computing briefly. The challenges, which are different from usually system, are presented. In the implementation view, some issues are addressed.
引用
收藏
页码:297 / +
页数:3
相关论文
共 50 条
  • [1] Issues and challenges in ubiquitous computing
    Lyytinen, K
    Yoo, YJ
    COMMUNICATIONS OF THE ACM, 2002, 45 (12) : 62 - 65
  • [2] Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy
    Ma, Tinghuai
    Yan, Sen
    Wang, Jin
    Lee, Sungyoung
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1185 - 1206
  • [3] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [4] Privacy, trust, and identity issues for ubiquitous computing
    Little, Linda
    SOCIAL SCIENCE COMPUTER REVIEW, 2008, 26 (01) : 3 - 5
  • [5] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
  • [6] Routing through the mist: Privacy preserving communication in ubiquitous computing environments
    Al-Muhtadi, J
    Campbell, R
    Kapadia, A
    Mickunas, MD
    Yi, S
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
  • [7] A flexible, privacy-preserving authentication framework for ubiquitous computing environments
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
  • [8] An efficient privacy preserving Pub-Sub system for ubiquitous computing
    Tian, Yuan
    Song, Biao
    Hassan, Mohammad Mehedi
    Huh, Eui-nam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 23 - 33
  • [9] Cloud Computing Privacy Issues, Challenges and Solutions
    El-Zoghby, Ayman M.
    Azer, Marianne A.
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 154 - 160
  • [10] A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
    Kim, Jangseong
    Baek, Joonsang
    Kim, Kwangjo
    Zhou, Jianying
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 45 - +