DoCoDeMo Phone: An Imperceptible Approach for Privacy Protection
نویسندگان
چکیده
Privacy protection on user context is one of the most important issues in ubiquitous and pervasive computing. This paper describes a new privacy protection approach that not only filters and reduces the granularity of context information to correct access level granularity, but also intelligently replace the filtered-out context information with the artificial context information considered appropriate by its user. The benefit of this new approach is that people who are accessing the filtered context information cannot detect if the context information has been filtered, i.e., filtering becomes imperceptible. Based on this new approach, we have designed, implemented, and conducted preliminary evaluation of the DoCoDeMo phone, which allows a user to imperceptibly conceal his/her surrounding ambient sound from the callers, without the callers knowing the presence of filtering.
منابع مشابه
A Collaborative Privacy-Enhanced Alibi Phone
This paper presents a collaborative privacy protection approach that not only filters context information and reduces its granularity, but also intelligently replaces the filtered-out context with an artificial context considered appropriate by its user. The benefit of this approach is that individuals accessing the filtered context cannot detect the presence of filtering, namely, filtering bec...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملEffective Anonymous Imperceptible Secure Re-active Routing (isrr) Protocol for Manet
In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn’t need to consider the mobility of the node. But in wireless network it needs to keep the mobility information in the protected way. To give a privacy protection in th...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملDoes the Android Permission System Provide Adequate Information Privacy Protection for End-users of Mobile Apps?
This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...
متن کامل