Protection of privacy in pervasive computing environments

被引:16
|
作者
Cheng, HS [1 ]
Zhang, DQ [1 ]
Tan, JG [1 ]
机构
[1] Inst Infocomm Res, Context Aware Syst Dept, Singapore 119613, Singapore
关键词
D O I
10.1109/ITCC.2005.233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two techniques. The first technique called Privacy Sensitive Information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 50 条
  • [31] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [32] Provably Correct Pervasive Computing Environments
    Ranganathan, Anand
    Campbell, Roy H.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 160 - +
  • [33] A trust model for pervasive computing environments
    Yin, Shuxin
    Ray, Indrakshi
    Ray, Indrajit
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 340 - +
  • [34] A trust framework for pervasive computing environments
    Wolfe, Steven T.
    Ahamed, Sheikh I.
    Zulkernine, Mohammad
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
  • [35] A Trust Framework for Pervasive Computing Environments
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225
  • [36] Agile middleware of pervasive computing environments
    Niemelä, E
    Vaskivuo, T
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
  • [37] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [38] An Open Interactive Survey Platform to Collect and Analyse Users' Privacy Decisions in Pervasive Computing Environments
    Kim, Seung-Hyun
    Ko, In-Young
    Kim, Soo-Hyung
    [J]. 2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 744 - 750
  • [39] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [40] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424