Privacy infusion in ubiquitous computing

被引:0
|
作者
Pallapa, Gautham [1 ]
Kumar, Mohan [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
privacy; context; information fusion; middleware; ubiquitous computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [21] PERCEPTIONS OF PRIVACY IN HOME-BASED UBIQUITOUS COMPUTING
    Lorenzen-Huber, L.
    Boutain, M.
    GERONTOLOGIST, 2008, 48 : 25 - 25
  • [22] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [23] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [24] Entropy Based Personal Privacy Measurement in Ubiquitous Computing
    Ma, Tinghuai
    Cao, Jie
    Otgonbayar, Ankhbayar
    2014 7TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UMEDIA), 2014, : 33 - 36
  • [25] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [26] Towards an architecture for balancing privacy and traceability in ubiquitous computing environments
    Weber, Stefan G.
    Heinemann, Andreas
    Muehlhaeuser, Max
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 958 - 964
  • [27] A privacy agent in context-aware ubiquitous computing environments
    Zhang, Ni
    Todd, Chris
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
  • [28] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
  • [29] Who, How, and Why? Enhancing Privacy Awareness in Ubiquitous Computing
    Koenings, Bastian
    Schaub, Florian
    Weber, Michael
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 364 - 367
  • [30] Devices that tell on you: Privacy trends in consumer ubiquitous computing
    Saponas, T. Scott
    Lester, Jonathan
    Hartung, Carl
    Agarwal, Sarneer
    Kohno, Tadayoshi
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 55 - 70