Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments

نویسندگان

  • Jalal Al-Muhtadi
  • Roy H. Campbell
  • Apu Kapadia
  • M. Dennis Mickunas
  • Seung Yi
چکیده

* Jalal Al-Muhtadi is funded by a grant from the National Science Foundation, NSF CCR 0086094 ITR. ∇ These authors are supported by grants from the National Science Foundation, NSF CCR 00-86094 ITR, NSF EIA 98-70736, NSF EIA 99-72884 EQ, and NSF CCR 00-86094. † Apu Kapadia is funded by the Department of Energy High Performance Computer Science Fellowship through Los Alamos National Laboratory, Lawrence Livermore National Laboratory, and Sandia National Laboratories. Abstract Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be a dream come true for electronic stalkers and “big brothers.” We present a protocol, which preserves the privacy of users and keeps their communication anonymous. In effect, we create a “mist” that conceals users from the system and other users. Yet, users will still be able to enjoy seamless interaction with services and other entities that wander within the ubiquitous computing environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing through the Mist: Design and Implementation

* Jalal Al-Muhtadi is funded by a grant from the National Science Foundation, NSF CCR 0086094 ITR. ∇ These authors are supported by grants from the National Science Foundation, NSF CCR 00-86094 ITR, NSF EIA 98-70736, NSF EIA 99-72884 EQ, and NSF CCR 00-86094. † Apu Kapadia is funded by the Department of Energy High Performance Computer Science Fellowship through Los Alamos National Laboratory, ...

متن کامل

Privacy Preserving Collaborative Filtering using Biclustering in Ubiquitous Computing Environments

Privacy concerns are a major hurdle in the success of personalized services in ubiquitous computing environments. Personalized recommendations are usually served using Collaborative Filtering techniques. In this paper, we propose a framework for privacy preserving collaborative filtering in ubiquitous computing environments. The proposed framework is based on a biclustering algorithm which empl...

متن کامل

Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...

متن کامل

A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments

* This research is supported by a grant from the National Science Foundation, NSF CCR 0086094 ITR and NSF 99-72884 EQ. Abstract The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into “Active Information Spaces” augmented with intelligence and enhanced with servi...

متن کامل

SCN-SI-021 achieving privacy and access control in pervasive computing environments

This paper focuses on the inherent trade-off between privacy and access control in Pervasive Computing Environments (PCEs). On one hand, service providers require user authentication and authorization for the provision of a service, while at the same time end users require untraceability and unlinkability for their transactions. There are also cases where the anonymity of a specific credential ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002