Privacy & Trust in Ambient Intelligence Environments

Privacy and trust are critical factors for the acceptance and success of next generation ambient intelligence environments. Those environments often act autonomously to support a user’s activity based on context information gathered from ubiquitous sensors. The autonomous nature, their accessibility to large amounts of personal information, and the fact that actuators and sensors are invisibly embedded in such environments, raise several privacy issues for participants. Those issues need to be addressed by adequate mechanisms for privacy protection and trust establishment. In this chapter, we provide an overview of existing privacy enhancing technologies (PETs) in the area of ambient intelligence environments and present the ATRACO approach to achieve privacy within those environments. Further, we will discuss how computational trust mechanisms and social trust aspects can be utilized to support privacy protection and the establishment of trust between system components and between the system and participants. After describing the integration of these mechanisms in the overall system architecture of ATRACO, we conclude by giving an outlook on future directions in this area.

[1]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[2]  Jadwiga Indulska,et al.  Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System , 2007, UIC.

[3]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[4]  Michael Rovatsos,et al.  Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..

[5]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[6]  Diana K. Smetters,et al.  How users use access control , 2009, SOUPS.

[7]  Vladimiro Sassone,et al.  Trust models in ubiquitous computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[8]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[9]  Jeffrey S. Rosenschein,et al.  Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.

[10]  N. Shahmehri,et al.  An Integration of Reputation-based and Policy-based Trust Management , 2005 .

[11]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[13]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[14]  Jorge Lobo,et al.  Privacy-aware role based access control , 2009, SACMAT '07.

[15]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[16]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[17]  Robert Ellis Smith,et al.  Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .

[18]  B. Solhaug,et al.  Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[19]  Christian Damsgaard Jensen,et al.  Trading Privacy for Trust , 2004, iTrust.

[20]  Norman L. Chervany,et al.  Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.

[21]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[22]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[23]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[24]  Sandra Steinbrecher Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.

[25]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[26]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[27]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[28]  Ralph Arnote,et al.  Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.

[29]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[30]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[31]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[32]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[33]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[34]  Jaijit Bhattacharya,et al.  Utilizing Network Features for Privacy Violation Detection , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[35]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[36]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[37]  Juan Carlos Augusto,et al.  Learning patterns in ambient intelligence environments: a survey , 2010, Artificial Intelligence Review.

[38]  Michael Rohs,et al.  Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.

[39]  Peter Langendörfer,et al.  Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems , 2007, OTM Workshops.

[40]  Michael Weber,et al.  Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.

[41]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[42]  Carles Sierra,et al.  An information-based model for trust , 2005, AAMAS '05.

[43]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[44]  Ketil Stølen,et al.  Evolution in Relation to Risk and Trust Management , 2010, Computer.

[45]  Marco Gruteser,et al.  USENIX Association , 1992 .

[46]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[47]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[48]  William A. Wallace,et al.  Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[49]  E. Gerck Overview of Certification Systems: X.509, CA, PGP and SKIP , 1999 .

[50]  Javier Carbó,et al.  TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .

[51]  Diane J. Cook,et al.  Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .

[52]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[53]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[54]  J. Simpson,et al.  The Oxford English Dictionary , 1884 .

[55]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[56]  Diego Gambetta Can We Trust Trust , 2000 .

[57]  Nick Cercone,et al.  A Bayesian Network Approach to Detecting Privacy Intrusion , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.