Privacy Preserving in Ubiquitous Computing: Challenges & Issues

被引:2
|
作者
Ma, Tinghuai [1 ]
Kim, Shin-Dug [2 ]
Wang, Jun [1 ]
Zhao, Yawei [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing, Peoples R China
[2] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
[3] Grad Univ, Chinese Acad Sci, Beijing 100864, Peoples R China
来源
PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING | 2008年
关键词
D O I
10.1109/ICEBE.2008.55
中图分类号
F [经济];
学科分类号
02 ;
摘要
Privacy preservation is crucial in ubiquitous computing environment. Without this, users feel uneasy to use and live in the UC environment. The implementation of privacy safeguard or privacy enhancing technologies is going to be a long road Understanding the challenges & issues of privacy protected in ubiquitous computing, is helpful to design and implement privacy aware system. In this paper, we try to describe privacy in ubiquitous computing briefly. The challenges, which are different from usually system, are presented. In the implementation view, some issues are addressed.
引用
收藏
页码:297 / +
页数:3
相关论文
共 50 条
  • [31] Quantizing Personal Privacy in Ubiquitous Computing
    Ma, Tinghuai
    Tian, Wei
    Guan, Donghai
    Lee, Sungyoung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1653 - 1667
  • [32] Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment
    Kim, Jangseong
    Shon, Taeshik
    Kim, Kwangjo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (03): : 686 - 689
  • [33] Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices
    Pradeep, B.H.
    Singh, Sanjay
    1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (13): : 430 - 443
  • [34] Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices
    Pradeep, B.H.
    Singh, Sanjay
    WSEAS Transactions on Communications, 2014, 13 : 430 - 443
  • [35] The Privacy Preserving In Computing Offloading
    Zhao, Meng
    Li, Shuyu
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1102 - 1105
  • [36] A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
    Kim, Jangseong
    Kim, Kwangjo
    Park, Jonghyuk
    Shon, Taeshik
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 45 - 57
  • [37] Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing
    Xing, Michael
    Julien, Christine
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 316 - 329
  • [38] A multiagent architecture for privacy-preserving ID-based service in ubiquitous computing environment
    Lee, KM
    Lee, SH
    AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 14 - 25
  • [39] Ubiquitous privacy-preserving identity managment
    Verslype, Kristof
    De Decker, Bart
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 589 - 603
  • [40] The security challenges of ubiquitous computing
    Stajano, F
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1