Shadow: A middleware in pervasive computing environment for user controllable privacy protection

被引:0
|
作者
Lu, Wentian [1 ]
Li, Jun [1 ]
Tao, Xianping [1 ]
Ma, Xiaoxing [1 ]
Lu, Jian [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In ubiquitous and pervasive computing, after data owner's information is collected, data collector should be careful of disclosing data owner's information for privacy reasons. In this paper, we present requirements and challenges when designing solutions for such data collector end protection. Policies, accuracy and anonymity of context should be all taken into account. Based on this, we design a middleware Shadow for user controllable privacy protection, which is deployed on data collectors who have large volume of data and powerful computation abilities. Shadow has a contextual rule based access control policy mechanism, enriched with methods of generating blurred context and guaranteeing information anonymous, and we implement it under an ontology based context model.
引用
收藏
页码:143 / +
页数:3
相关论文
共 50 条
  • [1] User-controllable security and privacy for pervasive computing
    Cornwell, Jason
    Fette, Ian
    Hsieh, Gary
    Prabaker, Madhu
    Rao, Jinghai
    Tang, Karen
    Vaniea, Kami
    Bauer, Lujo
    Cranor, Lorrie
    Hong, Jason
    McLaren, Bruce
    Reiter, Mike
    Sadeh, Norman
    [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +
  • [2] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [3] Middleware for privacy protection of ambient intelligence and pervasive systems
    SETCCE - Security Technology Competence Centre, Jamova 39, SI-1000 Ljubljana, Slovenia
    不详
    [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (03): : 633 - 639
  • [4] Reusable Pseudonym Privacy Protection in Pervasive Computing
    Guo, Yimin
    Guo, Yajun
    [J]. ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 201 - 205
  • [5] Middleware for pervasive computing
    Kumar, Mohan
    Zambonelli, Franco
    [J]. PERVASIVE AND MOBILE COMPUTING, 2007, 3 (04) : 329 - 331
  • [6] User Interest Learning in Pervasive Computing Environment
    Dong, Yongquan
    Li, Qingzhong
    Yan, Zhongmin
    Pan, Peng
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 319 - 322
  • [7] Middleware extensions for pervasive computing
    Doan, Edward D.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PORTABLE INFORMATION DEVICES, 2007, : 63 - 67
  • [8] Middleware for pervasive computing: A survey
    Raychoudhury, Vaskar
    Cao, Jiannong
    Kumar, Mohan
    Zhang, Daqiang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2013, 9 (02) : 177 - 200
  • [9] S-MARKS: A middleware secure by design for the pervasive computing environment
    Ahamed, Sheikh I.
    Haque, Munirul M.
    Asif, K. M. Ibrahim
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 303 - +
  • [10] In Search of User Privacy Protection in Ubiquitous Computing
    Cleveland, Simon
    [J]. 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 694 - 699