Towards an architecture for balancing privacy and traceability in ubiquitous computing environments

被引:4
|
作者
Weber, Stefan G. [1 ]
Heinemann, Andreas [1 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Germany
关键词
D O I
10.1109/ARES.2008.195
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy Preservation has been identified as an important factor to the success and acceptance of Ubiquitous Computing systems. Traceability, i.e. attributing events and actions to those who caused them, seems to be a directly contradicting goal. However harnessing sensitive data collected by Ubiquitous Computing infrastructures for traceability applications in a privacy-respecting manner may clearly bring further benefits, for different concerned parties. Automated working hours recording and personalized insurances are first examples of such applications. To contribute to this matter this paper presents an architecture that allows for balancing between privacy and traceability in Ubiquitous Computing environments. We describe its foundations and components and illustrate its benefits. Moreover we discuss important existing research approaches on privacy protection and traceability applications in Ubiquitous Computing settings.
引用
收藏
页码:958 / 964
页数:7
相关论文
共 50 条
  • [1] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [2] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +
  • [3] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
  • [4] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [5] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [6] From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS Identity in Ubiquitous Computing
    Phillips, David
    SOCIAL TEXT, 2005, 23 (02) : 95 - 108
  • [7] Cooperation and Ubiquitous Computing: an Architecture Towards their Integration
    Cabitza, Federico
    Locatelli, Marco P.
    Simone, Carla
    COOPERATIVE SYSTEMS DESIGN: SEAMLESS INTEGRATION OF ARTIFACTS AND CONVERSATIONS - ENHANCED CONCEPTS OF INFRASTRUCTURE FOR COMMUNICATION, 2006, 137 : 86 - 101
  • [8] A Biologically Inspired Service Architecture in Ubiquitous Computing Environments
    Chiang, Frank
    Braun, Robin
    ACTIVE AND PROGRAMMABLE NETWORKS, 2009, 4388 : 253 - 258
  • [9] A privacy agent in context-aware ubiquitous computing environments
    Zhang, Ni
    Todd, Chris
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
  • [10] A privacy-aware service protocol for ubiquitous computing environments
    Lee, Gunhee
    Chae, Song-hwa
    Hwang, Inwhan
    Hong, Manpyo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 619 - 628