A Generic Privacy Enhancing Technology for Pervasive Computing Environments

Pervasive computing is an emerging computing paradigm, which is expected to be part of our everyday life in the foreseeable future. Despite its huge potential value, one can foresee considerable drawbacks and undesirable potential uses of it in terms of privacy. In specific, the pervasive computing paradigm raises the level of the challenge to protect privacy of end-users, mainly due to the fact that devices operating in such an environment will be embedded in the fabric of the everyday life and will exhibit enhanced tracking and profiling capabilities. What is needed, inter alia, is appropriate mechanisms that are able to evolve with the needs of the users and interact with them in order to meet their privacy requirements. In this paper we suggest the foundations of a new Privacy Enhancing Technology (PET), with respect to the basic characteristics and implications introduced by pervasive environments.

[1]  Anind K. Dey,et al.  Everyday Privacy in Ubiquitous Computing Environments , 2002 .

[2]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[3]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[4]  Marc Langheinrich,et al.  Privacy and trust issues with invisible computers , 2005, CACM.

[5]  Norbert A. Streitz,et al.  Building disappearing computers , 2005, CACM.

[6]  Simone Fischer-Hübner,et al.  IT-Security and Privacy , 2001, Lecture Notes in Computer Science.

[7]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[8]  Elizabeth D. Mynatt,et al.  STRAP: A Structured Analysis Framework for Privacy , 2005 .

[9]  Mark Weiser The computer for the 21st century , 1991 .

[10]  Roy H. Campbell,et al.  Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[11]  Marc Langheinrich,et al.  When Trust Does Not Compute - The Role of Trust in Ubiquitous Computing , 2003 .

[12]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[13]  Jessica Staddon,et al.  Proactive Data Sharing to Enhance Privacy in Ubicomp Environments , 2004 .

[14]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[15]  Anind K. Dey,et al.  A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments , 2002 .