Architecting Pervasive Computing Systems for Privacy: A Survey

In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is still a big issue, despite the growing number of works on this subject as evidenced by this survey. In this paper, we propose a taxonomy for privacy invasion attacks, classify existing privacy enhancing technologies according to the protection provided for those attacks, and introduce a service-oriented privacy-enhanced architecture for pervasive computing.

[1]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[2]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[3]  B. Bhattacharjee,et al.  A Protocol for Scalable Anonymous Communication , 1999 .

[4]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[5]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[6]  Marco Gruteser,et al.  USENIX Association , 1992 .

[7]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[8]  Valérie Issarny,et al.  Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[9]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[10]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[11]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[12]  John T. Stasko,et al.  Evaluating image filtering based techniques in media space applications , 1998, CSCW '98.

[13]  James L. Crowley,et al.  Perceptual user interfaces: things that see , 2000, CACM.

[14]  Carman Neustaedter,et al.  The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.

[15]  Aravind Srinivasan,et al.  P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[16]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[17]  Abhi Shelat,et al.  Privacy and identity management for everyone , 2005, DIM '05.

[18]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[19]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[20]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[21]  James A. Landay,et al.  Development and evaluation of emerging design patterns for ubiquitous computing , 2004, DIS '04.

[22]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[23]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[24]  Alexander Pretschner,et al.  Distributed usage control , 2006, CACM.

[25]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[26]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[27]  Larry Korba,et al.  Towards Meeting the Privacy Challenge: Adapting DRM , 2002, Digital Rights Management Workshop.

[28]  Saadi Lahlou,et al.  European disappearing computer privacy design guidelines, Version 1.1 , 2004 .

[29]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[30]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[31]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.