Enabling Personal Privacy for Pervasive Computing Environments

被引:0
|
作者
Baguees, Susana Alcalde [1 ]
Zeidler, Andreas [1 ]
Klein, Cornel [1 ]
Fernandez Valdivielso, Carlos [2 ]
Matias, Ignacio R. [2 ]
机构
[1] Siemens AG, Corp Technol, D-8000 Munich, Germany
[2] Univ Publ Navarra, Dept Elect & Elect Engn, Navarra, Spain
关键词
personal privacy; pervasive computing; privacy architecture; user manageability;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the terms of use. Once discovered, they are forced to make a '''take or leave''' decision. In future living and working environments, where sensors and context-aware services are pervasive, this becomes an even greater challenge and annoyance. The environment is much more personalized and users cannot just '''leave'''. They require measures to prevent, avoid and detect misuse of sensitive data, as well as to be able to negotiate the purpose of use of data. We present a novel model of privacy protection, complementing the notion of enterprise privacy with the incorporation of personal privacy towards a holistic privacy management system. Our approach allows non-expert users not only to negotiate the desired level of privacy in a rather automated and simple way, but also to track and monitor the whole life-cycle of data.
引用
收藏
页码:341 / 371
页数:31
相关论文
共 50 条
  • [1] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [2] Uncertain privacy decision about access personal information in pervasive computing environments
    Zhang, Qingsheng
    Qi, Yong
    Hou, Di
    Zhao, Jizhong
    Han, Huawei
    [J]. FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 3, PROCEEDINGS, 2007, : 156 - 160
  • [3] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33
  • [4] A generic privacy enhancing technology for pervasive computing environments
    Dritsas, Stelios
    Tsaparas, John
    Gritzalis, Dimitris
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 103 - 113
  • [5] Extending context models for privacy in pervasive computing environments
    Henricksen, K
    Wishart, R
    McFadden, T
    Indulska, J
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 20 - 24
  • [6] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [7] Enabling Location Privacy in Pervasive Computing by Fragmenting Location Information of Users
    Jacob, Jeeva Susan
    Preetha, K. G.
    [J]. ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 364 - 371
  • [8] Obligations: Building a bridge between personal and enterprise privacy in pervasive computing
    Baguees, Susana Alcalde
    Mitic, Jelena
    Zeidler, Andreas
    Tejada, Marta
    Matias, Ignacio R.
    Valdivielso, Carlos Fernandez
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 173 - +
  • [9] Maintaining privacy in pervasive computing - enabling acceptance of sensor-based services
    Soppera, A
    Burbridge, T
    [J]. BT TECHNOLOGY JOURNAL, 2004, 22 (03) : 106 - 118
  • [10] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +