Modeling Privacy Control in Context-Aware Systems

نویسندگان

  • Xiaodong Jiang
  • James A. Landay
چکیده

M any worry that existing privacy problems will only worsen in context-aware pervasive computing environments. 1,2 Ubiquitous sensing and the invisible form factor of embedded computing devices have made it easier than ever to collect and use information about individuals without their knowledge. Sensitive private information might live indefinitely and appear anywhere at anytime. Moreover, the ability of context-aware systems to infer revealing information from loosely related personal data has even more troubling implications for individual privacy. The risks are high: even a few privacy violations could lead to user distrust and abandonment of context-aware systems and to lost opportunities for great enhancements. In this article, we describe a theoretical model for privacy control in context-aware systems based on a core abstraction of information spaces. We have previously focused on deriving socially based privacy objectives in pervasive computing environments. 3 Building on Ravi Sandhu's four-layer OM-AM (objectives, models, architectures, and mechanisms) idea, 4 we aim to use information spaces to construct a model for privacy control that supports our socially based privacy objectives. 3 We also discuss how we can introduce decentralization, a desirable property for many pervasive computing systems, into our information space model, using unified privacy tagging. We use a hypothetical example to illustrate how you can use decentralized information spaces to model privacy control in a smart office environment. Imagine that Bob, a sales representative from company A, visits Carol, company B's senior manager , at B's headquarters to discuss a potential deal. Bob brings his own laptop, on which a trusted privacy runtime system has been preinstalled. On entering the building, Bob was given a visitor badge and an ID tag for his laptop, both enabled by radio frequency technologies, so that RF readers in the building constantly track his laptop's location. Bob first meets Carol in her office. As part of the discussion, Carol sends Bob's laptop some internal documents to review and specifies that these documents should only persist for the period of their meeting. The trusted privacy runtime system on Bob's laptop can enforce Carol's preference over data persistence if all documents were properly tagged. Although these documents reside on Bob's laptop, these " privacy tags " dictate that Carol controls them. In effect, such tags define an information space that Carol owns. After the meeting, Bob and Carol head toward a meeting where employees in Carol's department will discuss the deal with …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a privacy ontology for privacy control in context-aware systems

This paper concerns personal privacy and privacy protection in context-aware ubiquitous computing environments. It proposes a privacy ontology solution to facilitate automated processes in privacy control. The development of the privacy ontology is an integrated part of our ongoing effort towards a privacy-respecting middleware solution for context-aware systems.

متن کامل

Wagealla, W. and Terzis, S. and English, C. (2003) Trust-Based Model for Privacy Control in Context Aware Systems. In: Second Workshop on Security in Ubiquitous Computing at the Fifth Annual Conference

In context-aware systems, there is a high demand on providing privacy solutions to users when they are interacting and exchanging personal information. Privacy in this context encompasses reasoning about trust and risk involved in interactions between users. Trust, therefore, controls the amount of information that can be revealed, and risk analysis allows us to evaluate the expected benefit th...

متن کامل

Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...

متن کامل

SURVEY PAPER A survey on context-aware web service systems

Purpose – This survey aims to study and analyze current techniques and methods for context-aware web service systems, to discuss future trends and propose further steps on making web services systems context-aware. Design/methodology/approach – The paper analyzes and compares existing context-aware web service-based systems based on techniques they support, such as context information modeling,...

متن کامل

An Intelligent Broker Architecture for Context-Aware Systems

Context-aware computing is an emerging paradigm to free everyday users from manually configuring and instructing computer systems. As the general trend of computing is progressing towards an open and dynamic infrastructure, building context-aware systems can be difficult and costly. In order to build successful context-aware systems, we must develop an architecture to reduce the difficulty and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Pervasive Computing

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2002