Privacy Infusion in Ubiquitous Computing

In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.

[1]  Doo-Kwon Baik,et al.  Modeling of Situation-Middleware for TPO metadata based on Event-Condition-Action Rule , 2006, Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06).

[2]  Olaf Drögehorn,et al.  Framework for middleware in ubiquitous computing systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Young-Koo Lee,et al.  A comprehensive middleware architecture for context-aware ubiquitous computing systems , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[4]  Y. Murakami Legal issues for realizing ubiquitous information society , 2004, SICE 2004 Annual Conference.

[5]  Mark Weiser,et al.  The future of ubiquitous computing on campus , 1998, CACM.

[6]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[7]  Elizabeth D. Mynatt,et al.  Secrets to success and fatal flaws: the design of large-display groupware , 2006, IEEE Computer Graphics and Applications.

[8]  Jennifer G. Sheridan,et al.  Public Ubiquitous Computing Systems: Lessons from the e-Campus Display Deployments , 2006, IEEE Pervasive Computing.

[9]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[10]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[11]  Yong Liu,et al.  SmartContacts: a large scale social context service discovery system , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[12]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[13]  Linda Smith,et al.  A Jini/sup TM/ lookup service for resource-constrained devices , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[14]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[15]  Kavi Kumar Khedo Context-Aware Systems for Mobile and Ubiquitous Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[16]  Gabriele Lenzini,et al.  Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems , 2006, MTW.

[17]  Jesús Favela,et al.  Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications , 2006, J. Univers. Comput. Sci..

[18]  M. Weiser,et al.  Hot topics-ubiquitous computing , 1993 .

[19]  Pedro José Marrón,et al.  Exploring the Relationship Between Context and Privacy , 2005 .

[20]  Roland L. Trope A warranty of cyberworthiness , 2004, IEEE Security & Privacy Magazine.

[21]  Frank P. Coyle,et al.  XML, Web Services, and the Data Revolution , 2002 .

[22]  Christian Damsgaard Jensen,et al.  Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.

[23]  Genevieve Bell,et al.  Auspicious computing? , 2004, IEEE Internet Computing.

[24]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[25]  Eun-Sun Cho,et al.  An ECA rule-based task programming language for ubiquitous environments , 2006, 2006 8th International Conference Advanced Communication Technology.

[26]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[27]  Hyggo Oliveira de Almeida,et al.  A flexible middleware for service provision over heterogeneous pervasive networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[28]  Wolfgang Hoschek The Web Service Discovery Architecture , 2002, ACM/IEEE SC 2002 Conference (SC'02).

[29]  Milena Radenkovic,et al.  Engaging the public through mass-scale multimedia networks , 2006, IEEE MultiMedia.

[30]  Chris Dix,et al.  Professional XML Web Services , 2001 .