Location-aware and privacy-preserving approach for child-care and safety in ubiquitous computing environment

نویسندگان

  • Jangseong KIM
  • Taeshik SHON
  • Kwangjo KIM
چکیده

In this paper, we establish our system model over the sensor network addressing contradictory issue caused by mutual authentication and privacy protection of an end-user. Based on the system model, we propose the protocol for a location-aware and privacy-preserving approach for child-care and safety over wireless sensor networks. Although we illustrate our protocol over the sensor network, our protocol can be operated over various networks (e.g., WiFi and UWB) which can provide RSSI (Received Signal Strength Indication). Compared to previous work, our protocol can enhance the accuracy of location information, preserve privacy of an enduser, and give the capability of controlling the child-care and safety service to an end-user. key words: Privacy protection, location supporting protocol, ubiquitous, child-care

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

Recently, the technologies for child care and safety have been developing rapidly, together with the various IT convergence services. In particular, several mobile operators (e.g., SKT, KTF, and LGT) in Korea and Gangnam province in Seoul provide their own child-care services. However, someproblems such as incorrect location information, privacy violation, and difficulty of an end-user to contr...

متن کامل

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirem...

متن کامل

Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

A Testbed for Ubiquitous Computing using Next Generation Mobile Networks

Ubiquitous Computing becomes feasible in an environment where the user is always and everywhere surrounded by an environment that is able to determine the location and plans of the user. It is therefore able to provide services that are tailored to the user’s preferences. This paper describes work in progress to develop a testbed consisting of various mobile networks (WiFi, GPRS, and Bluetooth)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010