Personal Privacy Management for Common Users

In this work, we introduce the Privacy Manager, a user interface designed to allow nonexpert users to manage privacy in the envisioned era of pervasive computing. The Privacy Manager is part of the implementation of the User-centric Privacy Framework, which was introduced as a novel mechanism to enable personal privacy for the inhabitants of the smart home. The Privacy Manager interface incorporates a set of application parts designed especially to meet the requirements of user friendliness, and privacy awareness, with the goal of making privacy management an affordable task for common users. Our first prototype allows to: i) customize permissions for the disclosure of their personal data, ii) control active and passive interactions with services, iii) define obligations to be negotiated on the usage of the data, upon transmission, iv) be aware of privacy related issues such as granted and denied permissions, v) apply alternative privacy mechanisms to access control, as white lying and obfuscation, vi) adhere to enterprise privacy policies based on a contractual relationship with an enterprise or organization. Providing people with tools to control their privacy is critical to guarantee the success of pervasive computing.

[1]  Peter F. Patel-Schneider,et al.  Enabling context-aware and privacy-conscious user data sharing , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[2]  Wilfred J. Hansen User engineering principles for interactive systems , 1972, AFIPS '71 (Fall).

[3]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[4]  Lorrie Faith Cranor,et al.  User interfaces for privacy agents , 2006, TCHI.

[5]  G. A. Miller THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .

[6]  Martin Rost,et al.  Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technoloqy , 2006 .

[7]  Fabien L. Gandon,et al.  A Semantic E-Wallet to Reconcile Privacy and Context Awareness , 2003, SEMWEB.

[8]  Anind K. Dey,et al.  Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .

[9]  J. C. R. Licklider,et al.  On-line man-computer communication , 1899, AFIPS Spring Joint Computing Conference.

[10]  Jason Hong,et al.  Towards Everyday Privacy for Ubiquitous Computing , 2003 .

[11]  Carlos Fernández-Valdivielso,et al.  Disappearing for a while - using white lies in pervasive computing , 2007, WPES '07.

[12]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[13]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[14]  Carlos Fernández-Valdivielso,et al.  Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing , 2008, TrustBus.

[15]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[16]  Susana Alcalde Bagüés,et al.  Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing , 2007 .

[17]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.