Ad hoc Privacy Management in Ubiquitous Computing Environments

被引:10
|
作者
Buennig, Christian [1 ]
Cap, Clemens H. [1 ]
机构
[1] Univ Rostock, Dept Comp Sci, D-2500 Rostock 1, Germany
关键词
components; privacy; disclosure control; ubiquitous computing; data mining;
D O I
10.1109/CENTRIC.2009.20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy in ubiquitous computing is often discussed on a technical level with a focus on cryptography and anonymization. On the other side it is equally important to concentrate on user side aspects of privacy control, i.e., to enable users of ubicomp applications to practice privacy dynamically and in an intuitive way. In our work we review previous approaches on user side management of private information in smart environments and motive a new ad hoc based, semi-automatic privacy control. We present a privacy focused, data mining powered interaction model with ubicomp services and provide a prototype environment for evaluating this model. This environment can be used to perform and capture privacy related service interaction in a user study with real users as well as in a simulation with agents simulating users and their privacy related service interaction. Finally we show results of a first simulation which initially tests the proposed interaction model in the prototype environment.
引用
收藏
页码:85 / 90
页数:6
相关论文
共 50 条
  • [1] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139
  • [2] Secure Device Association for Ad Hoc and Ubiquitous Computing Environments
    Malkani, Yasir Arfat
    Das Dhomeja, Lachhman
    ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, : 437 - 442
  • [3] Ad Hoc and Ubiquitous Computing
    Chen, Tzung-Shi
    Chen, Yuh-Shyan
    Chao, Han-Chieh
    Chang, Chih-Yung
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (03): : I - V
  • [4] A lightweight middleware protocol for ad hoc distributed object computing in ubiquitous computing environments
    Yau, SS
    Karim, F
    ISORC 2003: SIXTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2003, : 172 - 179
  • [5] SGR: A shared generic routing support for ad hoc ubiquitous computing environments
    Ko, Yangwoo
    Lee, Dongman
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 360 - 365
  • [6] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [7] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [8] From Privacy to Visibility CONTEXT, IDENTITY, AND POWER IN UBIQUITOUS COMPUTING ENVIRONMENTS Identity in Ubiquitous Computing
    Phillips, David
    SOCIAL TEXT, 2005, 23 (02) : 95 - 108
  • [9] Component-based ad hoc systems for ubiquitous computing
    Ko, Ren-Song
    Lai, Chih-Chung
    Yen, Chia-Kuan
    Mutka, Matt W.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, 4 (04) : 333 - +
  • [10] An ontology for privacy policy management in ubiquitous environments
    Fondazzi Martimiano, Luciana Andreia
    Pereira Goncalves, Mueller Roberto
    Moreira, Edson dos Santos
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 947 - 950