Protection of privacy in pervasive computing environments

被引:16
|
作者
Cheng, HS [1 ]
Zhang, DQ [1 ]
Tan, JG [1 ]
机构
[1] Inst Infocomm Res, Context Aware Syst Dept, Singapore 119613, Singapore
关键词
D O I
10.1109/ITCC.2005.233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two techniques. The first technique called Privacy Sensitive Information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [1] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [2] Enabling Personal Privacy for Pervasive Computing Environments
    Baguees, Susana Alcalde
    Zeidler, Andreas
    Klein, Cornel
    Fernandez Valdivielso, Carlos
    Matias, Ignacio R.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 16 (03) : 341 - 371
  • [3] Reusable Pseudonym Privacy Protection in Pervasive Computing
    Guo, Yimin
    Guo, Yajun
    [J]. ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 201 - 205
  • [4] A generic privacy enhancing technology for pervasive computing environments
    Dritsas, Stelios
    Tsaparas, John
    Gritzalis, Dimitris
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 103 - 113
  • [5] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [6] Extending context models for privacy in pervasive computing environments
    Henricksen, K
    Wishart, R
    McFadden, T
    Indulska, J
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 20 - 24
  • [7] Data Security and Privacy Protection in Pervasive Computing Environments J.UCS Special Issue
    Koh, Byoung-Soo
    Denko, Mieso
    Gritzalis, Stefanos
    Hsu, Ching-Hsien
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 967 - 969
  • [8] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    [J]. INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [9] Shadow: A middleware in pervasive computing environment for user controllable privacy protection
    Lu, Wentian
    Li, Jun
    Tao, Xianping
    Ma, Xiaoxing
    Lu, Jian
    [J]. SMART SENSING AND CONTEXT, PROCEEDINGS, 2006, 4272 : 143 - +
  • [10] Research of privacy protection in smart space model based on Pervasive Computing
    Jia, Zongpu
    Li, Gang
    Wang, Hongmei
    Fu, Caihong Huang
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 508 - 511