Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments

In a pervasive system, users have very dynamic and rich interactions with the environment and its elements, including other users. To efficiently support users in such environments, a high-level representation of the system (namely, context) is usually exploited. However, since pervasive environments are inherently people-centric, context might consist of sensitive information. As a consequence, privacy concerns arise, especially in terms of how to control information disclosure to third parties (e.g., other users). In this paper we propose context-aware approaches to privacy preservation in wireless and mobile pervasive environments. Specifically, we design two schemes: (i) to reduce the interactions between the user and the system, and (ii) to exploit the interactions between different users. Both of our solutions are adaptive, thus suitable for dynamic scenarios. In addition, our schemes require limited computational and storage resources, so that they can be implemented on resource-constrained personal and sensing devices. We apply our solutions to a smart healthcare scenario, and show that our schemes not only effectively protect the user privacy, but also significantly reduce the interactions with the system, thus improving the user experience.

[1]  Gautham V. Pallapa,et al.  A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments , 2010 .

[2]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[3]  Peter Steenkiste,et al.  Avoiding Privacy Violations Caused by Context-Sensitive Services , 2006, PerCom.

[4]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[5]  James J. Buckley,et al.  From RFID to the Internet of Things: Pervasive Networked Systems , 2006 .

[6]  Sajal K. Das,et al.  A Middleware Framework for Ambiguous Context Mediation in Smart Healthcare Application , 2007 .

[7]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[8]  Dong-Hee Shin,et al.  Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk , 2010, Int. J. Mob. Commun..

[9]  Diane J. Cook,et al.  How smart are our environments? An updated look at the state of the art , 2007, Pervasive Mob. Comput..

[10]  Minho Shin,et al.  Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.

[11]  Lawrence B. Holder,et al.  Managing Adaptive Versatile Environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[12]  Mark Weiser The computer for the 21st century , 1991 .

[13]  Sajal K. Das,et al.  A scheme for quantizing privacy in context-aware ubiquitous computing , 2008 .

[14]  Paolo Toth,et al.  Knapsack Problems: Algorithms and Computer Implementations , 1990 .

[15]  C. Enrique Ortiz,et al.  Mobile information device profile for Java 2 MicroEdition , 2001 .

[16]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[17]  Stefan Poslad,et al.  Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .