Crowdsourcing privacy preferences in context-aware applications

被引:0
作者
Eran Toch
机构
[1] Tel Aviv University,Faculty of Engineering
来源
Personal and Ubiquitous Computing | 2014年 / 18卷
关键词
Context awareness; Privacy; Crowdsourcing; Usability;
D O I
暂无
中图分类号
学科分类号
摘要
Developers of context-aware applications are faced with a tough challenge: powerful privacy controls are essential to maintain user trust, but they are also hard to use and not adequate in all situations. To address this tradeoff, we present Super-Ego, a crowdsourcing framework for privacy management of location information in ubiquitous environment. We study how crowdsourcing can be used to predict the user’s privacy preferences for different location on the basis of the general user population. The crowdsourcing methods are evaluated in a 2-week user study in which we tracked the locations of 30 subjects and asked them to provide privacy preferences for the locations they had visited. Our results show that by employing simple methods for semantic analysis of locations and by profiling the user’s privacy inclination, our methods can accurately predict the privacy preferences for 80 % of the user’s locations. By employing semi-automatic decision strategies, which ask the user to decide regarding the privacy of some of the locations, the accuracy rate raises to 90 %.
引用
收藏
页码:129 / 141
页数:12
相关论文
共 25 条
  • [1] Anthony D(2007)Privacy in location-aware computing environments IEEE Pervasive Comput 6 64-72
  • [2] Kotz D(2010)Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs Pers Ubiquit Comput 15 679-694
  • [3] Henderson T(2001)A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications Human Comput Interact 16 97-166
  • [4] Benisch M(2008)Protecting location privacy with personalized k-anonymity: architecture and algorithms IEEE Trans Mobile Comput 7 1-18
  • [5] Kelley P(2010)Crowdsourcing geospatial data ISPRS J Photogramm Remote Sens 65 550-557
  • [6] Sadeh N(2007)L-diversity: privacy beyond k-anonymity ACM Trans Knowl Discov Data (TKDD) 1 1-52
  • [7] Cranor L(2004)Privacy as contextual integrity Wash Law Rev Assoc 79 119-158
  • [8] Dey A(2009)Understanding and capturing people’s privacy policies in a mobile social networking application Pers Ubiquit Comput 13 401-412
  • [9] Abowd G(undefined)undefined undefined undefined undefined-undefined
  • [10] Salber D(undefined)undefined undefined undefined undefined-undefined