Location-aware and privacy-preserving approach for child-care and safety in ubiquitous computing environment
نویسندگان
چکیده
In this paper, we establish our system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, we propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks. Although we illustrate our protocol over the sensor network, our protocol can be operated over various networks (e.g., WiFi and UWB) which can provide RSSI (Received Signal Strength Indication). Compared to previous work, our protocol can enhance the accuracy of location information, preserve privacy of an enduser, and give the capability of controlling the child-care and safety service to an end-user. key words: Privacy protection, location supporting protocol, ubiquitous, child-care
منابع مشابه
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
Recently, the technologies for child care and safety have been developing rapidly, together with the various IT convergence services. In particular, several mobile operators (e.g., SKT, KTF, and LGT) in Korea and Gangnam province in Seoul provide their own child-care services. However, someproblems such as incorrect location information, privacy violation, and difficulty of an end-user to contr...
متن کاملA Privacy-Aware Service Protocol for Ubiquitous Computing Environments
In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirem...
متن کاملPrivacy Preserving Association Rule Mining in Ubiquitous Computing Environment
Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملA Testbed for Ubiquitous Computing using Next Generation Mobile Networks
Ubiquitous Computing becomes feasible in an environment where the user is always and everywhere surrounded by an environment that is able to determine the location and plans of the user. It is therefore able to provide services that are tailored to the user’s preferences. This paper describes work in progress to develop a testbed consisting of various mobile networks (WiFi, GPRS, and Bluetooth)...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010