Abstract
In ubiquitous and pervasive computing, after data owner’s information is collected, data collector should be careful of disclosing data owner’s information for privacy reasons. In this paper, we present requirements and challenges when designing solutions for such data collector end protection. Policies, accuracy and anonymity of context should be all taken into account. Based on this, we design a middleware Shadow for user controllable privacy protection, which is deployed on data collectors who have large volume of data and powerful computation abilities. Shadow has a contextual rule based access control policy mechanism, enriched with methods of generating blurred context and guaranteeing information anonymous, and we implement it under an ontology based context model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Harper, R.H.R.: Why people do and don?t wear active badges: A case study. Computer Supported Cooperative Work 4(4), 297–318 (1995)
Li, J., Bu, Y., Chen, S., Tao, X., Lu, J.: Followme: On research of pluggable infrastructure for context-awareness. In: AINA, vol. (1), pp. 199–204. IEEE Computer Society, Los Alamitos (2006)
Snekkenes, E.: Concepts for personal location privacy policies. In: ACM Conference on Electronic Commerce, pp. 48–57. ACM, New York (2001)
Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Hengartner, U., Steenkiste, P.: Protecting access to people location information. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 25–38. Springer, Heidelberg (2004)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing. Commun. ACM 42(2), 39–41 (1999)
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Heiber, T., Marron, P.J.: Exploring the relationship between context and privacy. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science, vol. 780 (2005); University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology. Springer-Verlag, ISBN 0-387-23461-6
Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249–256. IEEE Computer Society, Los Alamitos (2004)
Sweeney, L.: Datafly: A system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) DBSec. IFIP Conference Proceedings, vol. 113, pp. 356–381. Chapman & Hall, Boca Raton (1997)
Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3), 241–260 (2004)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys, USENIX (2004)
Zugenmaier, A., Kreuzer, M., Müller, G.: The freiburg privacy diamond: An attacker model for a mobile computing environment. In: Irmscher, K., Fähnrich, K.P. (eds.) KiVS Kurzbeiträge, pp. 131–141. VDE Verlag (2003)
Sweene, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, USENIX (2003)
Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in locationbased applications. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 93–102. ACM Press, New York (2006)
Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting Life-Cycle Privacy Policies in a Context Database. Technical Report TR-CTIT-06-03, CTIT, University of Twente (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, W., Li, J., Tao, X., Ma, X., Lu, J. (2006). Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds) Smart Sensing and Context. EuroSSC 2006. Lecture Notes in Computer Science, vol 4272. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11907503_11
Download citation
DOI: https://doi.org/10.1007/11907503_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47842-3
Online ISBN: 978-3-540-47845-4
eBook Packages: Computer ScienceComputer Science (R0)