Managing Pervasive Environment Privacy Using the "fair trade" Metaphor

This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. This implies a risk to privacy that might not be assumed if a clear and trustable privacy management model is not provided. However, since this kind of environments posses a set of highly heterogeneous sensing techniques, even basic privacy policies require a great management effort. Therefore, there is a tradeoff between providing automatic privacy configuration mechanisms and granting trustable privacy management models. Following the "fair-trade" metaphor, this paper presents a privacy solution dealing with user's privacy as a tradable good for obtaining environment's services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and logging mechanisms, enhances users' confidence in the system while encouraging them to share their information.

[1]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[2]  Geoffrey H. Kuenning,et al.  Automated hoarding for mobile computers , 1997, SOSP.

[3]  Adam Stone The dark side of pervasive computing , 2003, IEEE Pervasive Computing.

[4]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[5]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[6]  Jason Hong,et al.  Towards Everyday Privacy for Ubiquitous Computing , 2003 .

[7]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[8]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[9]  Peter Steenkiste,et al.  Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[10]  Harry Chen,et al.  Semantic Web in the context broker architecture , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[11]  Gaetano Borriello,et al.  UbiComp 2002: Ubiquitous Computing: 4th International Conference Göteborg, Sweden, September 29 – October 1, 2002 Proceedings , 2002, Lecture Notes in Computer Science.

[12]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[13]  Jonathan Grudin Presenting choices in context: approaches to information sharing , 2003 .

[14]  Miguel Artola Gallego,et al.  Francisco Tomás y Valiente , 1996 .

[15]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[16]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[17]  Marco Gruteser,et al.  USENIX Association , 1992 .

[18]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[19]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[20]  Gregory D. Abowd,et al.  The Conference Assistant: combining context-awareness with wearable computing , 1999, Digest of Papers. Third International Symposium on Wearable Computers.

[21]  Jonathan Trevor,et al.  Exploiting space and location as a design framework for interactive mobile systems , 2000, TCHI.

[22]  Dean Povey Optimistic security: a new access control paradigm , 1999, NSPW '99.