Privacy infusion in ubiquitous computing

被引:0
|
作者
Pallapa, Gautham [1 ]
Kumar, Mohan [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
privacy; context; information fusion; middleware; ubiquitous computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [1] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [2] Privacy in a World of Ubiquitous Computing
    Rossnagel, Alexander
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 83 - 90
  • [3] An update on privacy in ubiquitous computing
    Spiekermann, Sarah
    Langheinrich, Marc
    PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) : 389 - 390
  • [4] An update on privacy in ubiquitous computing
    Sarah Spiekermann
    Marc Langheinrich
    Personal and Ubiquitous Computing, 2009, 13 : 389 - 390
  • [5] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [6] Privacy Factors for Successful Ubiquitous Computing
    Little, Linda
    Briggs, Pam
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2009, 5 (02) : 1 - 20
  • [7] Quantizing Personal Privacy in Ubiquitous Computing
    Ma, Tinghuai
    Tian, Wei
    Guan, Donghai
    Lee, Sungyoung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1653 - 1667
  • [8] Privacy Context Model for Dynamic Privacy Adaptation in Ubiquitous Computing
    Schaub, Florian
    Koenings, Bastian
    Dietzel, Stefan
    Weber, Michael
    Kargl, Frank
    UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2012, : 752 - 757
  • [9] Privacy, trust, and identity issues for ubiquitous computing
    Little, Linda
    SOCIAL SCIENCE COMPUTER REVIEW, 2008, 26 (01) : 3 - 5
  • [10] Smart Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INFORMATION AND INTERACTION, PT II, 2009, 5618 : 131 - 139