Towards an architecture for balancing privacy and traceability in ubiquitous computing environments

被引:4
|
作者
Weber, Stefan G. [1 ]
Heinemann, Andreas [1 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Germany
关键词
D O I
10.1109/ARES.2008.195
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy Preservation has been identified as an important factor to the success and acceptance of Ubiquitous Computing systems. Traceability, i.e. attributing events and actions to those who caused them, seems to be a directly contradicting goal. However harnessing sensitive data collected by Ubiquitous Computing infrastructures for traceability applications in a privacy-respecting manner may clearly bring further benefits, for different concerned parties. Automated working hours recording and personalized insurances are first examples of such applications. To contribute to this matter this paper presents an architecture that allows for balancing between privacy and traceability in Ubiquitous Computing environments. We describe its foundations and components and illustrate its benefits. Moreover we discuss important existing research approaches on privacy protection and traceability applications in Ubiquitous Computing settings.
引用
收藏
页码:958 / 964
页数:7
相关论文
共 50 条
  • [31] Taxonomy for Ubiquitous Computing Environments
    Lupiana, Dennis
    O'Driscoll, Ciaran
    Mtenzi, Fredrick
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 469 - 475
  • [32] Printing in Ubiquitous Computing Environments
    Karapantelakis, Athanasios
    Devlic, Alisa
    Zarify, Mohammad
    Khamit, Saltanat
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 83 - +
  • [33] SoundPark: Towards Highly Collaborative Game Support in a Ubiquitous Computing Architecture
    Pellerin, Romain
    Bouillot, Nicolas
    Pietkiewicz, Tatiana
    Wozniewski, Mike
    Settel, Zack
    Gressier-Soudan, Eric
    Cooperstock, Jeremy R.
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, PROCESSINGS, 2009, 5523 : 157 - +
  • [34] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [35] Privacy Factors for Successful Ubiquitous Computing
    Little, Linda
    Briggs, Pam
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2009, 5 (02) : 1 - 20
  • [36] Quantizing Personal Privacy in Ubiquitous Computing
    Ma, Tinghuai
    Tian, Wei
    Guan, Donghai
    Lee, Sungyoung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1653 - 1667
  • [37] Privacy-preserving ID-based service provision in ubiquitous computing environments
    Lee, KM
    Lee, SH
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: OTM 2004 WORKSHOPS, PROCEEDINGS, 2004, 3292 : 21 - 22
  • [38] Context Integrity Measurement Architecture A privacy-preserving strategy for the era of ubiquitous computing
    Morrison, John
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [39] Architecture of an LBS platform to support privacy control for tracking moving objects in a ubiquitous environments
    Jo, JungHee
    Min, KyoungWook
    Lee, YongJoon
    UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 273 - +
  • [40] Towards a collaborative reputation based service provider selection in ubiquitous computing environments
    Louta, Malamati
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 520 - 534