Trust Based Privacy Protection Method in Pervasive Computing
نویسندگان
چکیده
In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establishment and communication process may involve privacy information exchange. Consequently, a method for integrate the privacy protection methods and deal with privacy and trust tradeoff is necessary. In this paper, we propose a novel trust based privacy protection method by using a three levels trust based privacy protection model (TPPM). Our main contributions include: (1) TPPM can integrate the various privacy protection methods and specify privacy policies; (2) TPPM can automatic make privacy disclose decision with achieving the goal of less privacy information loss and more trust gain during the trust establishment and the interaction process; (3) our method can be used in kinds of applications scenarios flexibly. Simulation results and analysis show our method can accomplish privacy preserving and fast trust establishment well. Index Terms privacy protection; trust; pervasive computing; ontology; privacy loss entropy; trust gain entropy
منابع مشابه
The Role of Identity in Pervasive Computational Trust
A central element in the human notion of trust is to identify whom or what is under consideration. In the digital world, this is harder to achieve due to more or less trustworthy technical infrastructure between interacting parties. However, we argue that uncertain identification may enhance privacy protection. Pervasive computing – digital and real world becoming one – has also good sides: con...
متن کاملPervasive Computing, Privacy and Distribution of the Self
The emergence of what is commonly known as “ambient intelligence” or “ubiquitous computing” means that our conception of privacy and trust needs to be reconsidered. Many have voiced their concerns about the threat to privacy and the more prominent role of trust that have been brought about by emerging technologies. In this paper, I will present an investigation of what this means for the self a...
متن کاملTrustworthiness in Pervasive and Ubiquitous Environment
The technology needed to realize the goal of fully pervasive and mobile computing is rapidly coming together. Its emergence represents an unprecedented opportunity to expand the power of the Internet beyond traditional computing devices, enabling a world of smart spaces and smart appliances providing often invisible support for a variety of context-aware services with tremendous environmental a...
متن کاملPervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection
Today’s mobile and pervasive computing devices are embedded with increasingly powerful sensing capabilities that enable them to provide exceptional spatio-temporal context acquisition that is not possible with traditional static sensor networks alone. As a result, enabling these devices to share context information with one another has a great potential for enabling mobile users to exploit the ...
متن کاملSoftware Behavior Based Trustworthiness Attestation For Computing Platform
With a prevalence of pervasive computing, especially cloud computing , the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the conti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 7 شماره
صفحات -
تاریخ انتشار 2012