An architecture for privacy-sensitive ubiquitous computing

  title={An architecture for privacy-sensitive ubiquitous computing},
  author={Jason I. Hong and James A. Landay},
  booktitle={MobiSys '04},
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an… 

Privacy in context: Privacy issues in Ubiquitous Computing applications

  • C. O'Driscoll
  • Computer Science
    2008 Third International Conference on Digital Information Management
  • 2008
A review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications and a survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment.

Models for Privacy in Ubiquitous Computing Environments

This thesis addresses the discretionary privacy demands of users in heterogeneous distributed systems such as ubiquitous computing environments by presenting models for privacy of a user's communication, unlink-ability of a users' accesses, and authorized policy feedback that is both useful and privacy preserving.

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

A new privacy-aware service protocol is proposed that decouples the relation between a user’s identity and location and uses anonymous communication channel to hide the user's service consume pattern.

Towards an Architecture for Balancing Privacy and Traceability in Ubiquitous Computing Environments

An architecture that allows for balancing between privacy and traceability in ubiquitous computing environments is presented and its foundations and components are described and illustrated.

Dynamic privacy management: a plug-in service for the middleware in pervasive computing

The Platform for Privacy Preferences of W3C is extended and a specification for representing user privacy preferences for context-aware applications is defined and a privacy infrastructure is proposed which enables the middleware to automatically generate a privacy policy and the user preference file according to the current context.

Privacy in Pervasive Computing and Open Issues

This paper discusses how privacy might be preserved in a pervasive computing environment and presents some research developments in these areas to address privacy concerns.

A Privacy Service for Context-aware Mobile Computing

CoPS is an optional service of the context-provisioning middleware MoCA and allows users of context- and location-aware applications to define and manage their privacy policies regarding disclosure of their context information.

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

This paper proposes to represent the available context information in each domain as a feature model, so that the developers are able to configure this feature model to get the context information they need, and the users can easily specify the context features they are willing to share.

Towards the Modeling of Personal Privacy in Ubiquitous Computing Environments

This work seeks to propose, verify, and analyze a formal model of privacy for these environments, namely the resources that need to be protected, the guidelines for constructing the model, and the high-level components of the personal privacy model.

Middleware for location privacy: an overview

This paper provides an analysis of various existing privacy-enabling middleware that can be used to provide programming support for location-based tourist information and shows how providing adequate middleware can alleviate the programming burden.



Privacy risk models for designing privacy-sensitive ubiquitous computing systems

This paper proposes privacy risk models as a general method for refining privacy from an abstract concept into concrete issues for specific applications and prioritizing those issues.

A Privacy Awareness System for Ubiquitous Computing Environments

This work introduces a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system.

Design for Privacy in Ubiquitous Computing Environments

A framework for design for privacy in ubiquitous computing environments is described and an example of its application is described, with a description of how the technology attenuates natural mechanisms of feedback and control over information released.

Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems

Six principles for guiding system design are developed, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse.

Enabling context-aware and privacy-conscious user data sharing

  • R. HullB. Kumar A. Vyas
  • Computer Science
    IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004
  • 2004
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, namely the framework to support self-provisioning of preferences, and the performance of the underlying rules engine.

Privacy and Security in the Location-enhanced World Wide Web

This position paper discusses privacy and security issues arising in Place Lab, a multi-organization initiative to bootstrap the location-enhanced web.

Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing

A framework for supporting sociallycompatible privacy objectives in ubiquitous computing settings is proposed and a key objective called the Principle of Minimum Asymmetry, which seeks to minimize the imbalance between the people about whom data is being collected and the systems and people that collect and use that data is developed.

Towards Meeting the Privacy Challenge: Adapting DRM

This paper outlines the legal requirements for privacy under the European Union Data Directive, and describes adaptations for transforming a DRM system into a privacy rights management system.

Privacy Interfaces for Collaboration

The privacy problem is discussed and results from two lab studies that explored methods to overcome this problem are discussed, showing how to create interfaces that facilitate the use of technologies while preserving people’s privacy.

Providing location information in a ubiquitous computing environment (panel session)

This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact.