Uncertain privacy decision about access personal information in pervasive computing environments

被引:0
|
作者
Zhang, Qingsheng [1 ]
Qi, Yong [1 ]
Hou, Di [1 ]
Zhao, Jizhong [1 ]
Han, Huawei [1 ]
机构
[1] Xian Jiaotong Univ, Sch Elect & Informat Engn, Xian 710049, Shaanxi, Peoples R China
关键词
D O I
10.1109/FSKD.2007.598
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In pervasive computing environments, context-aware applications provide services for people by using personal information. People also make privacy decision about personal information disclosure as privacy concerns. Privacy decision depends on people's interaction situation. The trust of information collector and personal information sensitivity often enable people to make uncertain privacy decision. Therefore, we construct a fuzzy objective information system that consists of personal interaction situation history. The privacy disclosure policies are extracted from this information system under using rough set theory. The context-aware applications are assigned to an adequate privacy role with the privacy disclosure policies and situation of people's interaction. Finally, we provide a working example and the initial performance evaluation.
引用
收藏
页码:156 / 160
页数:5
相关论文
共 50 条
  • [1] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [2] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [3] Reasoning about Context in Uncertain Pervasive Computing Environments
    Haghighi, Pari Delir
    Krishnaswamy, Shonali
    Zaslavsky, Arkady
    Gaber, Mohamed Medhat
    [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2008, 5279 : 112 - 125
  • [4] Reasoning about uncertain contexts in pervasive computing environments
    Ranganathan, A
    Al-Muhtadi, J
    Campbell, RH
    [J]. IEEE PERVASIVE COMPUTING, 2004, 3 (02) : 62 - 70
  • [5] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [6] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    [J]. INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [7] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [8] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [9] SCN-SI-021 Achieving privacy and access control in pervasive computing environments
    Magkos, Emmanouil
    Kotzanikolaou, Panayiotis
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 94 - 105
  • [10] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244