Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing

In this paper, we propose a framework for supporting sociallycompatible privacy objectives in ubiquitous computing settings. Drawing on social science research, we have developed a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected, and the systems and people that collect and use that data. We have also developed Approximate Information Flow (AIF), a model describing the interaction between the various actors and personal data. AIF effectively supports varying degrees of asymmetry for ubicomp systems, suggests new privacy protection mechanisms, and provides a foundation for inspecting privacy-friendliness of ubicomp systems.

[1]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[2]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[3]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[4]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[5]  Philip E. Agre,et al.  Changing Places: Contexts of Awareness in Computing , 2001, Hum. Comput. Interact..

[6]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[7]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[8]  Ivar E. Berg,et al.  Education and Jobs: The Great Training Robbery , 1971 .

[9]  Ravi S. Sandhu,et al.  Engineering authority and trust in cyberspace: the OM-AM and RBAC way , 2000, RBAC '00.

[10]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[11]  J. Meade,et al.  External Economies and Diseconomies in a Competitive Situation , 1952 .

[12]  Pamela Samuelson,et al.  Privacy as intellectual property , 2000 .

[13]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .

[14]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[15]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[16]  J. Horrigan,et al.  Trust and privacy online: Why Americans want to rewrite the rules , 2000 .

[17]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[18]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[19]  Nelson Minar,et al.  Wearable computing meets ubiquitous computing: reaping the best of both worlds , 1999, Digest of Papers. Third International Symposium on Wearable Computers.

[20]  Joachim Biskup,et al.  Threshold-based identity recovery for privacy enhanced applications , 2000, CCS.

[21]  George A. Akerlof The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .

[22]  Kenneth C. Laudon,et al.  Extensions to the Theory of Markets and Privacy: Mechanics of Pricing Information , 1997 .

[23]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[24]  Jonathan Grudin,et al.  Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..

[25]  David Brin,et al.  The Transparent Society , 1998 .

[26]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .