Keeping ubiquitous computing to yourself: A practical model for user control of privacy
نویسندگان
چکیده
As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user’s privacy preferences against the applicable privacy regulations and incorporates five types of user controlled “noise” to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملContext-Driven Prevention of Unintended Identity Disclosure
In this paper we discuss the problem of privacy and information disclosure in ubiquitous and pervasive computing environments. We describe a framework that uses context information to selectively disclose personal information to service providers while keeping the humancomputer interaction non-intrusive. For each interaction with a service provider, our framework will take previously disclosed ...
متن کاملPractical Anonymous Access Control Protocols for Ubiquitous Computing
Privacy has been a central concern of ubiquitous (pervasive) computing. The boundary between private and public moves dynamically depending on the context in which the issue is considered. As for access control for ubiquitous computing, the concept of consensual disclosure is an answer to the question of where the boundary should be drawn — Unless a user gives their explicit consent to opening ...
متن کاملEveryday Privacy in Ubiquitous Computing Environments
We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the enduser’s ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and con...
متن کاملA Privacy Preserving Overlay for Active Spaces
Based on our experience in building and deploying ubiquitous computing environments, we identify some design guidelines for privacy. We also propose a novel mechanism that meets these guidelines and provides a practical and reasonable tradeoff between user privacy and environment automation and personalization.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- International Journal of Man-Machine Studies
دوره 63 شماره
صفحات -
تاریخ انتشار 2005