Privacy infusion in ubiquitous computing

被引:0
|
作者
Pallapa, Gautham [1 ]
Kumar, Mohan [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
privacy; context; information fusion; middleware; ubiquitous computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [31] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [32] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
  • [33] Special issue: Security and privacy in WoT, ubiquitous and mobile computing
    Akshi Kumar
    Personal and Ubiquitous Computing, 2024, 28 (1) : 109 - 109
  • [34] A privacy-aware service protocol for ubiquitous computing environments
    Lee, Gunhee
    Chae, Song-hwa
    Hwang, Inwhan
    Hong, Manpyo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 619 - 628
  • [35] Keeping ubiquitous computing to yourself: A practical model for user control of privacy
    Price, BA
    Adam, K
    Nuseibeh, B
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 228 - 253
  • [36] Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"
    Liu, Peng
    Molva, Refik
    Jing, Jiwu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1522 - 1523
  • [37] Routing through the mist: Privacy preserving communication in ubiquitous computing environments
    Al-Muhtadi, J
    Campbell, R
    Kapadia, A
    Mickunas, MD
    Yi, S
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
  • [38] A flexible, privacy-preserving authentication framework for ubiquitous computing environments
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
  • [39] Personalization and privacy in ubiquitous computing resolving the conflict by legally binding commitments
    Sackmann, Stefan
    9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 447 - 450
  • [40] Composite Sensor Model and Security Agent to Improve Privacy of Ubiquitous Computing
    Xu, Yusheng
    Ma, Zhixin
    Chen, Xiaoyun
    Li, Lian
    2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 159 - 164