A fuzzy reasoning scheme for context sharing decision making

In context aware mobile applications users' sensitive information will be available to be collected by a large number of service providers, which might threaten users privacy. In this paper, we propose the use of fuzzy logic in helping automating consent decisions done by end users. The proposed fuzzy approach has been implemented based on Mamdani fuzzy inference systems, and has been integrated in one of the services provided by a real time UMTS mobile platform known as MIES at the university campus with real users. Results obtained give the indication of possibilities of adopting this approach in practical applications.

[1]  L. Zadeh Fuzzy sets as a basis for a theory of possibility , 1999 .

[2]  Judea Pearl,et al.  Bayesian decision methods , 1990 .

[3]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[4]  Judea Pearl,et al.  Decision making under uncertainty , 1996, CSUR.

[5]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[6]  Arkady Bolotin,et al.  A Generalized Uncertainty Function and Fuzzy Modeling , 2001, ISMDA.

[7]  Russell Greiner,et al.  Efficient reasoning , 2001, CSUR.

[8]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[9]  David Chaum,et al.  Security without Identification: Card Computers to make Big Brother Obsolete , 1985 .

[10]  E. H. Mamdani,et al.  Advances in the linguistic synthesis of fuzzy controllers , 1976 .

[11]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[12]  Didier Dubois,et al.  What does fuzzy logic bring to AI? , 1995, CSUR.

[13]  Hairong Yu,et al.  A Combined Approach to Uncertain Data Analysis , 1997, IDA.

[14]  Lotfi A. Zadeh,et al.  Fuzzy Logic for Business, Finance, and Management , 1997, Advances in Fuzzy Systems - Applications and Theory.

[15]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[16]  Amit Konar,et al.  Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human Brain , 1999 .

[17]  Uzay Kaymak,et al.  Probabilistic Reasoning in Fuzzy Rule-Based Systems , 2002 .

[18]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[19]  René W. Wagenaar,et al.  A fuzzy logic based approach to support users self-control of their private contextual data retrieval , 2004, ECIS.

[20]  Amit Sahai,et al.  Pseudonym Systems , 1999, Selected Areas in Cryptography.

[21]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[22]  Willem G. Vree,et al.  Trust metrics for survivable security systems , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[23]  Jan Camenisch,et al.  Design and implementation of the idemix anonymous credential system , 2002, CCS '02.

[24]  E. Mizutani,et al.  Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review] , 1997, IEEE Transactions on Automatic Control.

[25]  Michio Sugeno,et al.  Fuzzy identification of systems and its applications to modeling and control , 1985, IEEE Transactions on Systems, Man, and Cybernetics.