Protecting user data in ubiquitous computing: Towards trustworthy environments

被引:0
|
作者
Duan, Y [1 ]
Canny, J [1 ]
机构
[1] Univ Calif Berkeley, Dept Comp Sci, Berkeley, CA 94720 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and audio) and it must be dealt with in real-time. Protecting the privacy of users is of central importance. Dealing with these issues will be a central challenge for ubicomp for some time to come. Here we propose some simple design principles which address several of these issues. We illustrate them through the design of a smart room capture system we are building. The main design principle is "data discretion:" users should have access and control of data about them, and should be able to determine how it is used. We show how data discretion supports both personal and collaborative uses. In our implementation, the data discretion principle is enforced with cryptographic techniques. Unlike ACL based access control systems, our scheme embeds access rights of legitimate users within the data. An important property of the method is that it hides meta-information about data access: no user can determine who (else) has access to any given datum. Access information is sensitive because it discloses information about which and when users were in the room. We have implemented a prototype system in the smart room equipped with several cameras, and we give data throughput rates under various degrees of protection. Finally we describe ongoing work towards a trustworthy ubicomp environment whose discretion is realistically checkable.
引用
收藏
页码:167 / 185
页数:19
相关论文
共 50 条
  • [1] Towards using data aggregation techniques in ubiquitous computing environments
    Rasheed, F
    Lee, YK
    Lee, S
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 369 - +
  • [2] Towards Data-Centric Security in Ubiquitous Computing Environments
    Ransom, Stefan
    Werner, Christian
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 26 - 30
  • [3] Designing Intelligent User Interface for Ubiquitous Computing Environments
    Roibas, Anxo Cereijo
    Krueger, Antonio
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, 2007, : 12 - 12
  • [4] User expectations for simple mobile ubiquitous computing environments
    Brugnoli, MC
    Hamard, J
    Rukzio, E
    [J]. Second IEEE International Workshop on Mobile Commerce and Services, Proceedings, 2005, : 2 - 10
  • [5] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [6] Towards self-coordinating ubiquitous computing environments
    Rammig, Franz J.
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 2 - 13
  • [7] User profile management on service platforms for ubiquitous computing environments
    Sutterer, Michael
    Droegehorn, Olaf
    David, Klaus
    [J]. 2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 287 - 291
  • [8] A toolkit to design adaptable user interfaces in ubiquitous computing environments
    Debaty, P
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 171 - 175
  • [9] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments
    Weber, Stefan G.
    Heinemann, Andreas
    Muehlhaeuser, Max
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
  • [10] Improving service matching and selection in ubiquitous computing environments: a user study
    Jasper Lindenberg
    Wouter Pasman
    Kim Kranenborg
    Joris Stegeman
    Mark A. Neerincx
    [J]. Personal and Ubiquitous Computing, 2007, 11 : 59 - 68