Protecting user data in ubiquitous computing: Towards trustworthy environments

被引:0
|
作者
Duan, Y [1 ]
Canny, J [1 ]
机构
[1] Univ Calif Berkeley, Dept Comp Sci, Berkeley, CA 94720 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and audio) and it must be dealt with in real-time. Protecting the privacy of users is of central importance. Dealing with these issues will be a central challenge for ubicomp for some time to come. Here we propose some simple design principles which address several of these issues. We illustrate them through the design of a smart room capture system we are building. The main design principle is "data discretion:" users should have access and control of data about them, and should be able to determine how it is used. We show how data discretion supports both personal and collaborative uses. In our implementation, the data discretion principle is enforced with cryptographic techniques. Unlike ACL based access control systems, our scheme embeds access rights of legitimate users within the data. An important property of the method is that it hides meta-information about data access: no user can determine who (else) has access to any given datum. Access information is sensitive because it discloses information about which and when users were in the room. We have implemented a prototype system in the smart room equipped with several cameras, and we give data throughput rates under various degrees of protection. Finally we describe ongoing work towards a trustworthy ubicomp environment whose discretion is realistically checkable.
引用
收藏
页码:167 / 185
页数:19
相关论文
共 50 条
  • [21] Printing in Ubiquitous Computing Environments
    Karapantelakis, Athanasios
    Devlic, Alisa
    Zarify, Mohammad
    Khamit, Saltanat
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 83 - +
  • [22] Programming Ubiquitous Computing Environments
    Schmidt, Albrecht
    [J]. END-USER DEVELOPMENT (IS-EUD 2015), 2015, 9083 : 3 - 6
  • [23] Learning in Ubiquitous Computing Environments
    Victoria Barbosa, Jorge Luis
    Ferrari Barbosa, Debora Nice
    Wagner, Andre
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY EDUCATION, 2012, 8 (03) : 64 - 77
  • [24] Towards Causal Models For Building Behavioral User Profile in Ubiquitous Computing Applications
    Chikhaoui, Belkacem
    Wang, Shengrui
    Pigot, Helene
    [J]. UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, : 598 - 599
  • [25] Studying Natural User Interfaces for Smart Video Annotation towards Ubiquitous Environments
    Rodrigues, Rui
    Madeira, Rui Neves
    Correia, Nuno
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA, MUM 2021, 2021, : 158 - 168
  • [26] Towards Trustworthy Integrated Clinical Environments
    Zhao, Wenbing
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 452 - 459
  • [27] Towards a collaborative reputation based service provider selection in ubiquitous computing environments
    Louta, Malamati
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 520 - 534
  • [28] Service Composition Techniques Using Data Mining for Ubiquitous Computing Environments
    Lee, Sun Young
    Lee, Jong Yun
    Lee, Byung Il
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 110 - 117
  • [29] Editorial: Special Issue on "Trustworthy and Intelligent Services for Ubiquitous Computing"
    Jeong, Young-Sik
    Chao, Han-Chieh
    Denko, Mieso
    Patrikakis, Charalampos Z.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 1 - 4