Privacy infusion in ubiquitous computing

被引:0
|
作者
Pallapa, Gautham [1 ]
Kumar, Mohan [1 ]
Das, Sajal K. [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
privacy; context; information fusion; middleware; ubiquitous computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [41] An efficient privacy preserving Pub-Sub system for ubiquitous computing
    Tian, Yuan
    Song, Biao
    Hassan, Mohammad Mehedi
    Huh, Eui-nam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 23 - 33
  • [42] Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems
    Fernandez, Alfredo Perez
    Sindre, Guttorm
    DIGITAL TRANSFORMATION FOR A SUSTAINABLE SOCIETY IN THE 21ST CENTURY, 2020, 573 : 60 - 71
  • [43] A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments
    Kim, Jangseong
    Baek, Joonsang
    Kim, Kwangjo
    Zhou, Jianying
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2011, 6711 : 45 - +
  • [44] A trust-based approach to control privacy exposure in Ubiquitous Computing Environments
    Giang, Pho Duc
    Hung, Le Xuan
    Shaikh, Riaz Ahmed
    Zhung, Yonil
    Lee, Sungyoung
    Lee, Young-Koo
    Lee, Heejo
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 149 - +
  • [45] Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues
    Gustavo López
    Gabriela Marín
    Marta Calderón
    Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 497 - 511
  • [46] Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues
    Lopez, Gustavo
    Marin, Gabriela
    Calderon, Marta
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (04) : 497 - 511
  • [47] A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment
    Kim, Jangseong
    Kim, Zeen
    Kim, Kwangjo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 37 - 48
  • [48] World without secrets: Business, crime, and privacy in the age of ubiquitous computing.
    Heckman, L
    LIBRARY JOURNAL, 2002, 127 (09) : 105 - 105
  • [49] A study on CVMP (Competing values model about privacy) in ubiquitous computing environment
    Kang, Jang Mook
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1659 - 1661
  • [50] RBAC-based access control framework for ensuring privacy in ubiquitous computing
    Hong, Sung-Ho
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 278 - +