Composite Sensor Model and Security Agent to Improve Privacy of Ubiquitous Computing

被引:1
|
作者
Xu, Yusheng [1 ]
Ma, Zhixin [1 ]
Chen, Xiaoyun [1 ]
Li, Lian [1 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Gansu, Peoples R China
关键词
ubiquitous computing; context model; composite sensor; privacy and security; privacy rule; distributed security agent;
D O I
10.1109/UMEDIA.2008.4570883
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of electronic and networking technologies, ubiquitous computing is now an exploring focused area. Due to characteristics of ubiquitous computing, privacy and security issues are always quite challenging for application development. This paper presents a novel paradigm to enhance the privacy and security in ubiquitous environments. Unlike previous context model, the proposed composite sensor-based context model (ComSensor) captures both complicated context entities and security requirements. Security agent governs security and privacy by privacy rules defined in ComSensor. One security agent is responsible for privacy management for one context objects. Sensitive context raw data and information are kept only in distributed security agents, from which context queries are processed and context information is disclosed in different accurate levels according to privacy rules. Based on ContSensor and security agent, decentralized trust management architecture is proposed, which is appropriate for different kinds of ubiquitous applications. Examining results on a prototype show that this paradigm is scalable and runs in real-time mode.
引用
收藏
页码:159 / 164
页数:6
相关论文
共 50 条
  • [21] Quantizing Personal Privacy in Ubiquitous Computing
    Ma, Tinghuai
    Tian, Wei
    Guan, Donghai
    Lee, Sungyoung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1653 - 1667
  • [22] Personal and Ubiquitous ComputingIssue on privacy and security
    Chris Schmandt
    Mark Ackerman
    Personal and Ubiquitous Computing, 2004, 8 : 389 - 390
  • [23] Keeping ubiquitous computing to yourself: A practical model for user control of privacy
    Price, BA
    Adam, K
    Nuseibeh, B
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) : 228 - 253
  • [24] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [25] An Efficient Model for Privacy and Security in Mobile Cloud Computing
    Ragini
    Mehrotra, Parul
    Venkatesan, S.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [26] Privacy respected ubiquitous sensor environment
    Sakakibara, Hiroshi
    Yonezawa, Takuro
    Nakazawa, Jin
    Tokuda, Hideyuki
    INSS 07: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON NETWORKED SENSING SYSTEMS, 2007, : 297 - 297
  • [27] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [28] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
  • [29] Privacy, trust, and identity issues for ubiquitous computing
    Little, Linda
    SOCIAL SCIENCE COMPUTER REVIEW, 2008, 26 (01) : 3 - 5
  • [30] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222