Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-based Services

In the near future, everyday objects like cars and home appliances will connect the living environment to information networks. Pervasive computing devices will allow applications to gather and share a large amount of information. This may then open up a market for a large range of new services and applications. With a world densely populated by ‘smart dust’ sensor devices, no single part of our life will be able to escape from digitisation. Soon, sensor networks will be able to track everything from our feelings to our behaviour. Besides the enormous potential value, we can foresee many undesirable uses. In a worst-case scenario, privacy implications, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing. In this paper, we introduce the privacy issues found in the field of pervasive computing in two parts. The first part provides a brief look at the understanding of privacy, factors that can be used to control privacy, and the development of fair information practices and how they relate to the world of pervasive computing. The second part introduces technology that can provide a tool-set to support these fair information practices, and maintain the role of the data subject in the management of their private information.

[1]  Fred H. Cate,et al.  Principles for Protecting Privacy , 2002 .

[2]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[3]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[4]  Bennett Daviss The net comes home , 2003 .

[5]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[6]  Marco Gruteser,et al.  USENIX Association , 1992 .

[7]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[8]  G. Vattimo The Transparent Society , 1992 .

[9]  Joachim Biskup,et al.  Secure Mediation: Requirements, Design, and Architecture , 2003, J. Comput. Secur..

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  J. Michael,et al.  Privacy and human rights , 1994 .

[12]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[13]  J. Rubenfeld The Right of Privacy , 1989 .

[14]  Michael Waidner,et al.  Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.

[15]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[16]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[17]  Anne Adams,et al.  Multimedia information changes the whole privacy ballgame , 2000, CFP '00.

[18]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[19]  Daniel W. Engels,et al.  I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .

[20]  Randy H. Katz,et al.  Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.

[21]  Michael Kirby Privacy Protection-A New Beginning? , 2000 .

[22]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[23]  Ari Juels,et al.  Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.

[24]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[25]  Daniel Guérin,et al.  Anarchism: From Theory to Practice , 1970 .

[26]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[27]  Anind K. Dey,et al.  Everyday Privacy in Ubiquitous Computing Environments , 2002 .

[28]  Siani Pearson,et al.  Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[29]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[30]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.