Privacy challenges in ambient intelligent systems: A critical discussion.

From the “right to be left alone” to a “commodity” that can be traded and exchanged, privacy has been defined many ways over the ages. However, there is still no consensus on one definition. Ambient Intelligence (AmI) systems power context aware, personalized, adaptive and anticipatory services. In such systems, privacy plays a critical role. The human-centered quality of AmI systems has thus prompted the use of a new kind of technology, called Privacy Enhancing Technologies (PET). Furthermore, it has now been propose to include privacy at the onset of such system design. In this survey paper, we raise the question of which specific privacy issues are raised in AmI environments and how they are addressed. We use a literature review in the fields of law, ethics, social sciences and computer sciences. We then proceed with critical discussions. We illustrate our research with a use case from Luxembourg HotCity.

[1]  Gerhard Steinke,et al.  Data privacy approaches from US and EU perspectives , 2002, Telematics Informatics.

[2]  Stefanos Gritzalis,et al.  Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..

[3]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[4]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[5]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[6]  Jun Pang,et al.  Bulletin Boards in Voting Systems: Modelling and Measuring Privacy , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[7]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[8]  Alfred Kobsa,et al.  Privacy-enhancing technologies , 2008 .

[9]  Yves Demazeau,et al.  Representing privacy regulations with deontico-temporal operators , 2011, Web Intell. Agent Syst..

[10]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[11]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[13]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[14]  Grigoris Antoniou,et al.  DEAL: A Distributed Authorization Language for Ambient Intelligence , 2011, Int. J. Ambient Comput. Intell..

[15]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[16]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[17]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[18]  Leon van der Torre,et al.  Convivial Ambient Technologies: Requirements, Ontology and Design , 2010, Comput. J..

[19]  Diane J. Cook,et al.  Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .

[20]  Günter Karjoth,et al.  A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[21]  Philip Brey,et al.  Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.

[22]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[23]  A. Moore Privacy: Its Meaning and Value , 2003 .

[24]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[25]  Timothy W. Finin,et al.  Preserving Privacy in Context-Aware Systems , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.

[26]  Piero A. Bonatti,et al.  Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security , 2008, ICLP.

[27]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[28]  Min Y. Mun,et al.  Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing , 2009 .

[29]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[30]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[31]  Jong Hyuk Park,et al.  Privacy and fair information practices in ubiquitous environments: Research challenges and future directions , 2009, Internet Res..

[32]  Guido Boella,et al.  Privacy Policies with Modal Logic: The Dynamic Turn , 2010, DEON.

[33]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[34]  Marc Langheinrich,et al.  Towards a New Privacy-Aware Location Sharing Platform , 2011, J. Internet Serv. Inf. Secur..

[35]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[36]  Michael Friedewald,et al.  Privacy, trust and policy-making: Challenges and responses , 2009, Comput. Law Secur. Rev..

[37]  Thomas M. Cooley,et al.  A treatise on the law of torts, or, The wrongs which arise independent of contract. , 1993 .

[38]  Nicolas Christin,et al.  Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.

[39]  Guido Boella,et al.  The Coprelobri project: the logical approach to privacy , 2011 .

[40]  Max I. Kanovich,et al.  Collaborative Planning with Confidentiality , 2011, Journal of Automated Reasoning.