Privacy in pervasive computing and open issues

被引:0
|
作者
Bhaskar, Pankaj [1 ]
Ahamed, Sheikh I. [1 ]
机构
[1] Marquette Univ, Dept Math Stat & Comp Sci, Milwaukee, WI 53233 USA
关键词
pervasive computing; trust; privacy; security; location privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that pervasive systems are typically embedded or invisible, making it difficult for users to know when these devices are present and colleciting data. As users have a limited understanding of; the technology several privacy, design, and safety issues are raised. This paper discusses how privacy might be preserved in a pervasive computing, environment. It presents some research developments in these areas to address privacy concerns Open issues and challenges are also examined.
引用
收藏
页码:147 / +
页数:3
相关论文
共 50 条
  • [1] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [2] Philosophy, privacy, and pervasive computing
    Michelfelder, Diane
    AI & SOCIETY, 2010, 25 (01) : 61 - 70
  • [3] The Privacy Landscape of Pervasive Computing
    Hong, Jason
    IEEE PERVASIVE COMPUTING, 2017, 16 (03) : 40 - 48
  • [4] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [5] Privacy preserving protocol for pervasive computing
    Guo, Yajun
    He, Yanxiang
    Qi, Mei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (11): : 103 - 105
  • [6] Privacy: The Achilles heel of pervasive computing?
    Satyanarayanan, M
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 2 - 3
  • [7] Survey on location privacy in pervasive computing
    Görlach, A
    Heinemann, A
    Terpstra, WW
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
  • [8] Pervasive Computing, Privacy and Distribution of the Self
    Hongladarom, Soraj
    INFORMATION, 2011, 2 (02) : 360 - 371
  • [9] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
  • [10] Service Composition Issues in Pervasive Computing
    Bronsted, Jeppe
    Hansen, Klaus Marius
    Ingstrup, Mads
    IEEE PERVASIVE COMPUTING, 2010, 9 (01) : 62 - 70