Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach

@article{Solanas2021PrivacyOrientedAO,
  title={Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach},
  author={Agusti Solanas and Edgar Batista and Fran Casino and Achilleas Papageorgiou and Constantinos Patsakis},
  journal={Security of Ubiquitous Computing Systems},
  year={2021}
}
Ubiquitous computing systems are commonplace. They have opened the door to great benefits for society as a whole. However, they have to be used with care, otherwise they can cause serious risks for their users. In this chapter, we analyze the privacy risks of ubiquitous computing systems from a new individual-centred perspective based on five privacy dimensions, namely identity, location, footprint, query and intelligence. We describe each dimension and provide an introductory view of the main… 

A Survey on Privacy Properties for Data Publishing of Relational Data

TLDR
An in-depth overview of the current state of the art in Privacy-Preserving Data Publishing (PPDP) for relational data is provided to facilitate the reader to understand the different usage scenarios in which each of them can be applied.

References

SHOWING 1-10 OF 46 REFERENCES

A Privacy Awareness System for Ubiquitous Computing Environments

TLDR
This work introduces a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system.

Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making

TLDR
The authors present an operationalization of Irwin Altman's privacy regulation theory for this purpose, describing how individual phases of the process can be supported and their experiences in developing context-adaptive privacy mechanisms for different applications and domains.

Location Privacy Through Users' Collaboration: A Distributed Pseudonymizer

TLDR
This article presents a (trusted third party)-free, distributed, collaborative method to preserve the location privacy of LBS users.

Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments

TLDR
A prototype system in the smart room equipped with several cameras is implemented, a scheme embeds access rights of legitimate users within the data, and ongoing work towards a trustworthy ubicomp environment whose discretion is realistically checkable is described.

Why privacy is not enough privacy in the context of "ubiquitous computing" and "big data"

TLDR
It is argued that people acting in full conformity to privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.

Location Privacy in Location-Based Services: Beyond TTP-based Schemes

TLDR
The most relevant techniques for guaranteeing location privacy to LBS users are surveyed and the rigid dichotomy between schemes which rely on Trusted Third Parties (TTP-based) and those which do not (T TP-free) is emphasised.

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges, and Countermeasures

TLDR
This paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks that are proposed in literature and open research areas are identified.

Ephemerality Is the New Black: A Novel Perspective on Location Data Management and Location Privacy in LBS

TLDR
An approach based on privacy-by-design principles is proposed and a conceptual model is introduced to facilitate the implementation of those principles and propose the concept of temporal and spatial ephemerality to improve location privacy in the context of a location-based service.

A Three-Dimensional Conceptual Framework for Database Privacy

TLDR
A conceptual framework for technologies in database privacy in terms of three dimensions is given, depending on whose privacy is considered: i) respondent privacy (to avoid reidentification of patients or other individuals to whom the database records refer); ii) owner privacy (To ensure that the owner must not give away his dataset); and iii) user privacy ( to preserve the privacy of queries submitted by a data user.

Privacy Preservation in Location-Based Services

TLDR
A query content preservation approach is proposed with the aim of providing accurate LBS answer with zero server knowledge on query content in order to protect privacy in LBSs.