Virtual Walls: Protecting Digital Privacy in Pervasive Environments

As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users' contextual information, leading to users unwittingly leaving "digital footprints." Users must thus be allowed to control how their digital footprints are reported to third parties. While a significant amount of prior work has focused on location privacy, location is only one type of footprint, and we expect most users to be incapable of specifying fine-grained policies for a multitude of footprints. In this paper we present a policy language based on the metaphor of physical walls, and posit that users will find this abstraction to be an intuitive way to control access to their digital footprints. For example, users understand the privacy implications of meeting in a room enclosed by physical walls. By allowing users to deploy "virtual walls," they can control the privacy of their digital footprints much in the same way they control their privacy in the physical world. We present a policy framework and model for virtual walls with three levels of transparency that correspond to intuitive levels of privacy, and the results of a user study that indicates that our model is easy to understand and use.

[1]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[2]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[3]  Kori Inkpen Quinn,et al.  Privacy gradients: exploring ways to manage incidental information during co-located collaboration , 2005, CHI EA '05.

[4]  Ann Blair,et al.  Too much information , 2007, Nature.

[5]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[6]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[7]  Matthai Philipose,et al.  Building Reliable Activity Models Using Hierarchical Shrinkage and Mined Ontology , 2006, Pervasive.

[8]  Shirley Dex,et al.  JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .

[9]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[10]  Marco Gruteser,et al.  USENIX Association , 1992 .

[11]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[12]  Austin Henderson,et al.  Rooms: the use of multiple virtual workspaces to reduce space contention in a window-based graphical user interface , 1986, TOGS.

[13]  Ming Li,et al.  Design and implementation of a large-scale context fusion network , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[14]  Gregory D. Abowd,et al.  Providing architectural support for building context-aware applications , 2000 .

[15]  Gaetano Borriello,et al.  A Practical Approach to Recognizing Physical Activities , 2006, Pervasive.

[16]  Peter Steenkiste,et al.  Protecting Access to People Location Information , 2003, SPC.

[17]  Deirdre K. Mulligan,et al.  Geopriv Requirements , 2004, RFC.

[18]  Roy H. Campbell,et al.  Reasoning about Uncertain Contexts in Pervasive Computing Environments , 2004, IEEE Pervasive Comput..

[19]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[20]  Gregory D. Abowd,et al.  Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.

[21]  Carman Neustaedter,et al.  Time, Ownership and Awareness: The Value of Contextual Locations in the Home , 2005, UbiComp.

[22]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[23]  Nalini Venkatasubramanian,et al.  Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.