Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing

被引:0
|
作者
Schaub, Florian [1 ]
Koenings, Bastian [1 ]
Dietzel, Stefan [1 ,2 ]
Weber, Michael [1 ]
Kargl, Frank [1 ,2 ]
机构
[1] Ulm Univ, Ulm, Germany
[2] Univ Twente, Enschede, Netherlands
关键词
Context awareness; personalization; pervasive computing; privacy; privacy impact assessment; ubiquitous computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue that context awareness not only enables novel UbiComp applications but can also support dynamic regulation and configuration of privacy mechanisms. We propose a higher level context model that abstracts from low level details and contains only privacy relevant context features. Context changes in our model can trigger reconfiguration of privacy mechanisms or facilitate context-specific privacy recommendations to the user. Based on our model, we analyze potential privacy implications of context changes and discuss how these results could inform actual reconfiguration of privacy mechanisms.
引用
收藏
页码:752 / 757
页数:6
相关论文
共 50 条
  • [31] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [32] Privacy-Related Context Information for Ubiquitous Health
    Seppala, Antto
    Nykanen, Pirkko
    Ruotsalainen, Pekka
    JMIR MHEALTH AND UHEALTH, 2014, 2 (01):
  • [33] Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing
    Xing, Michael
    Julien, Christine
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING, AND SERVICES, 2014, 131 : 316 - 329
  • [34] Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
    Shin, Dong-Hee
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2010, 8 (02) : 169 - 186
  • [35] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments
    Weber, Stefan G.
    Heinemann, Andreas
    Muehlhaeuser, Max
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
  • [36] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
  • [37] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing
    Koenings, Bastian
    Schaub, Florian
    Weber, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
  • [38] Devices that tell on you: Privacy trends in consumer ubiquitous computing
    Saponas, T. Scott
    Lester, Jonathan
    Hartung, Carl
    Agarwal, Sarneer
    Kohno, Tadayoshi
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 55 - 70
  • [39] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [40] Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
    Abi-Char, Pierre E.
    Moukhtari, Mounir
    Mhamed, Abdallah
    El-Hassan, Bachar
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 125 - +