Supporting Quality of Privacy (QoP) in pervasive computing

被引:6
|
作者
Tentori, M [1 ]
Favela, J [1 ]
Gonzalez, VM [1 ]
Rodríguez, MD [1 ]
机构
[1] CICESE, Dept Ciencias Comp, Ensenada, Baja California, Mexico
关键词
D O I
10.1109/ENC.2005.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy might be the greatest barrier to the long-term success of pervasive or ubiquitous computing (ubicomp). The invisibility of embedded computing devices has made it easier to collect and use information about individuals without their knowledge. Sensitive and private information might be stored for long periods of time and appear anywhere at anytime. Thus, a cost, in the form of privacy, might need to be paid to benefit from ubicomp. In this paper, we introduce the concept of Quality of Privacy (QoP) which allows balancing the trade-off between the amount of privacy a user is willing to concede and the value of the services that can be provided by a ubicomp application, in a similar way as that of Quality of Service (QoS). We propose an agent-based architecture that adapts the behavior of the ubicomp application to the users' context, in order to satisfy the level of QoP, that both, the application and the user have agreed upon. To illustrate this architecture, we extend a handheld-based mobile Hospital Information System in order to preserve privacy in a ubicomp hospitals environment.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [1] Quality of Privacy (QoP) for the design of ubiquitous healthcare applications
    Tentori, M
    Favela, J
    González, VM
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2006, 12 (03) : 252 - 269
  • [2] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [3] Philosophy, privacy, and pervasive computing
    Michelfelder, Diane
    [J]. AI & SOCIETY, 2010, 25 (01) : 61 - 70
  • [4] The Privacy Landscape of Pervasive Computing
    Hong, Jason
    [J]. IEEE PERVASIVE COMPUTING, 2017, 16 (03) : 40 - 48
  • [5] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [6] Privacy preserving protocol for pervasive computing
    Guo, Yajun
    He, Yanxiang
    Qi, Mei
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (11): : 103 - 105
  • [7] Privacy in pervasive computing and open issues
    Bhaskar, Pankaj
    Ahamed, Sheikh I.
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 147 - +
  • [8] Privacy: The Achilles heel of pervasive computing?
    Satyanarayanan, M
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 2 - 3
  • [9] Survey on location privacy in pervasive computing
    Görlach, A
    Heinemann, A
    Terpstra, WW
    [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 23 - 34
  • [10] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15