Ad hoc Privacy Management in Ubiquitous Computing Environments

被引:10
|
作者
Buennig, Christian [1 ]
Cap, Clemens H. [1 ]
机构
[1] Univ Rostock, Dept Comp Sci, D-2500 Rostock 1, Germany
关键词
components; privacy; disclosure control; ubiquitous computing; data mining;
D O I
10.1109/CENTRIC.2009.20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy in ubiquitous computing is often discussed on a technical level with a focus on cryptography and anonymization. On the other side it is equally important to concentrate on user side aspects of privacy control, i.e., to enable users of ubicomp applications to practice privacy dynamically and in an intuitive way. In our work we review previous approaches on user side management of private information in smart environments and motive a new ad hoc based, semi-automatic privacy control. We present a privacy focused, data mining powered interaction model with ubicomp services and provide a prototype environment for evaluating this model. This environment can be used to perform and capture privacy related service interaction in a user study with real users as well as in a simulation with agents simulating users and their privacy related service interaction. Finally we show results of a first simulation which initially tests the proposed interaction model in the prototype environment.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [21] Design of a security management middleware in ubiquitous computing environments
    Jiang, Z
    Lee, K
    Kim, S
    Bae, H
    Kim, S
    Kang, S
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 306 - 308
  • [22] Dynamic activity lifecycle management in ubiquitous computing environments
    Kim, Hokyum
    Park, Insuk
    Hyun, Soon J.
    Lee, Dongman
    2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 985 - 990
  • [23] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [24] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [25] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314
  • [26] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [27] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [28] A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
    Kim, Jangseong
    Baek, Joonsang
    Kim, Kwangjo
    Zhou, Jianying
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 45 - +
  • [29] A trust-based approach to control privacy exposure in Ubiquitous Computing Environments
    Giang, Pho Duc
    Hung, Le Xuan
    Shaikh, Riaz Ahmed
    Zhung, Yonil
    Lee, Sungyoung
    Lee, Young-Koo
    Lee, Heejo
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 149 - +
  • [30] Managing Handheld Devices in Ad-Hoc Collaborative Computing Environments
    Alwani, Alaa
    Artail, Hassan
    Safa, Haidar
    Abdallah, Ayman Abi
    Basha, Bashir
    Khalek, Tarek Abdel
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 5, 2005, 5 : 167 - 170