Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection

  • Conference paper
Smart Sensing and Context (EuroSSC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4272))

Included in the following conference series:

Abstract

In ubiquitous and pervasive computing, after data owner’s information is collected, data collector should be careful of disclosing data owner’s information for privacy reasons. In this paper, we present requirements and challenges when designing solutions for such data collector end protection. Policies, accuracy and anonymity of context should be all taken into account. Based on this, we design a middleware Shadow for user controllable privacy protection, which is deployed on data collectors who have large volume of data and powerful computation abilities. Shadow has a contextual rule based access control policy mechanism, enriched with methods of generating blurred context and guaranteeing information anonymous, and we implement it under an ontology based context model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Harper, R.H.R.: Why people do and don?t wear active badges: A case study. Computer Supported Cooperative Work 4(4), 297–318 (1995)

    Article  Google Scholar 

  2. Li, J., Bu, Y., Chen, S., Tao, X., Lu, J.: Followme: On research of pluggable infrastructure for context-awareness. In: AINA, vol. (1), pp. 199–204. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  3. Snekkenes, E.: Concepts for personal location privacy policies. In: ACM Conference on Electronic Commerce, pp. 48–57. ACM, New York (2001)

    Chapter  Google Scholar 

  4. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  5. Hengartner, U., Steenkiste, P.: Protecting access to people location information. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 25–38. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)

    Article  Google Scholar 

  7. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing. Commun. ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  8. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  9. Heiber, T., Marron, P.J.: Exploring the relationship between context and privacy. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science, vol. 780 (2005); University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology. Springer-Verlag, ISBN 0-387-23461-6

    Google Scholar 

  10. Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  11. Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249–256. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  12. Sweeney, L.: Datafly: A system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) DBSec. IFIP Conference Proceedings, vol. 113, pp. 356–381. Chapman & Hall, Boca Raton (1997)

    Google Scholar 

  13. Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3), 241–260 (2004)

    Google Scholar 

  16. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys, USENIX (2004)

    Google Scholar 

  17. Zugenmaier, A., Kreuzer, M., Müller, G.: The freiburg privacy diamond: An attacker model for a mobile computing environment. In: Irmscher, K., Fähnrich, K.P. (eds.) KiVS Kurzbeiträge, pp. 131–141. VDE Verlag (2003)

    Google Scholar 

  18. Sweene, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)

    Article  MathSciNet  Google Scholar 

  19. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, USENIX (2003)

    Google Scholar 

  20. Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in locationbased applications. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 93–102. ACM Press, New York (2006)

    Chapter  Google Scholar 

  21. Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting Life-Cycle Privacy Policies in a Context Database. Technical Report TR-CTIT-06-03, CTIT, University of Twente (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, W., Li, J., Tao, X., Ma, X., Lu, J. (2006). Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds) Smart Sensing and Context. EuroSSC 2006. Lecture Notes in Computer Science, vol 4272. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11907503_11

Download citation

  • DOI: https://doi.org/10.1007/11907503_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47842-3

  • Online ISBN: 978-3-540-47845-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics