Abstract
In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirement of the sensitive information illegally but also forbidding abuse of the information obtained legally is important to protect user privacy. In order to satisfy this claim, we propose a new privacy-aware service protocol for a ubiquitous computing environment. The proposed protocol decouples the relation between a user’s identity and location. Moreover, it uses anonymous communication channel to hide the user’s service consume pattern.
This research is supported by the ubiquitous Computing and Network (UCN) Project, the Ministry of Information and Communication (MIC) 21 st Century Frontier R&D Program in Korea.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Computer 35, 22–26 (2002)
Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, Springer, Heidelberg (2002)
Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proc. of SACMAT 2004, NewYork, USA, pp. 11–20 (2004)
Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy, CERCS Technical Reports, GIT-CERCS-04-15 (2004)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)
Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)
Hong, J., Landay, J.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2004)
Díaz, C., Preneel, B.: Taxonomy of Mixes and Dummy Traffic. In: Proc. of I-NetSec 2004: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, Toulouse, France (2004)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1982)
Danezis, G., Dingledine, R., Mathewson, N., Hopwood, D.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy, pp. 2–15 (2003)
Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proc. of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, pp. 91–102 (2002)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (2004)
Garlan, D., Siewiorek, D.P.: Project Aura: Toward Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 22–31 (2002)
The OpenSSL Project, http://www.openssl.org/
Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity - a proposal for terminology. In: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pp. 1–9 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, G., Chae, Sh., Hwang, I., Hong, M. (2006). A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. In: Zhou, X., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11807964_63
Download citation
DOI: https://doi.org/10.1007/11807964_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36850-2
Online ISBN: 978-3-540-36851-9
eBook Packages: Computer ScienceComputer Science (R0)