Ensuring Privacy during Pervasive Logging by a Passerby

نویسندگان

  • Mohsin Ali Memon
  • Jiro Tanaka
چکیده

Pervasive logging devices capture everything along with the public nearby without their consent, thus, possibly troubling people who prefer their privacy. This has issues for privacy and, furthermore, the widespread use of such logging devices may affect people’s behavior, as they may feel uncomfortable that they are constantly being monitored. People may wish to have some control over the lifelogging devices of others and, in this article, we describe a framework to restrict anonymous logging, unless explicitly permitted. Our privacy framework allows the user of a logging device to define privacy policies controlling when, where and who to restrict from logging them. Moreover, it is possible to select which type of logging sensors to apply these restrictions. Evaluation results show that this approach is a practical method of configuring privacy settings and restricting pervasive devices from logging.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity for Users of Ubiquitous Computing

Anonymity is a protection goal that helps to protect the privacy of users by ensuring that their identity remains unknown. As privacy is a grave concern in pervasive computing, the need for suitable anonymity mechanisms is apparent. This contribution uses the Freiburg privacy diamond to analyze the possibilities for anonymity mechanisms in pervasive and highlights the problems that arise out of...

متن کامل

Cardea: Context-Aware Visual Privacy Protection from Pervasive Cameras

The growing popularity of mobile and wearable devices with built–in cameras, the bright prospect of camera related applications such as augmented reality and life–logging system, the increased ease of taking and sharing photos, and advances in computer vision techniques have greatly facilitated people’s lives in many aspects, but have also inevitably raised people’s concerns about visual privac...

متن کامل

Protecting privacy and anonymity in pervasive computing: trends and perspectives

Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in ...

متن کامل

A Cognitive Access Framework for Security and Privacy Protection in Mobile Cloud Computing

Information systems and wireless communications are becoming increasingly present in the everyday life of citizens both from a personal and business point of view. A recent development in this context is Mobile Cloud Computing (MCC), which is the combination of Cloud Computing and pervasive mobile networks. Ensuring the preservation of privacy can be difficult in MCC. Therefore, this chapter pr...

متن کامل

A lightweight framework for secure life-logging in smart environments

As the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users the chance for life-logging in smart environments. However, smart devices have several limitations with regards to memory, resources and computation power, hinderin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JIP

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2014