DoCoDeMo Phone: An Imperceptible Approach for Privacy Protection

نویسندگان

  • Hsien-Ting Cheng
  • Ching-Lun Lin
  • Hao-hua Chu
چکیده

Privacy protection on user context is one of the most important issues in ubiquitous and pervasive computing. This paper describes a new privacy protection approach that not only filters and reduces the granularity of context information to correct access level granularity, but also intelligently replace the filtered-out context information with the artificial context information considered appropriate by its user. The benefit of this new approach is that people who are accessing the filtered context information cannot detect if the context information has been filtered, i.e., filtering becomes imperceptible. Based on this new approach, we have designed, implemented, and conducted preliminary evaluation of the DoCoDeMo phone, which allows a user to imperceptibly conceal his/her surrounding ambient sound from the callers, without the callers knowing the presence of filtering.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Collaborative Privacy-Enhanced Alibi Phone

This paper presents a collaborative privacy protection approach that not only filters context information and reduces its granularity, but also intelligently replaces the filtered-out context with an artificial context considered appropriate by its user. The benefit of this approach is that individuals accessing the filtered context cannot detect the presence of filtering, namely, filtering bec...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Effective Anonymous Imperceptible Secure Re-active Routing (isrr) Protocol for Manet

In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn’t need to consider the mobility of the node. But in wireless network it needs to keep the mobility information in the protected way. To give a privacy protection in th...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Does the Android Permission System Provide Adequate Information Privacy Protection for End-users of Mobile Apps?

This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004