Advertisement

Privacy

  • Paulo Ferreira
  • Pedro Alves
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

The issue of privacy is well known and, for obvious reasons, distributed context-aware systems are not an exception. As a matter of fact, people are sensitive about revealing their location or activities (and other types of context information) which are often transmitted by such context-aware systems. In addition, such transmission is often done without requiring a specific user action, in order to increase the usability of such systems. In this chapter we define what privacy means within the realm of distributed context-aware systems; then, we describe the several privacy management techniques available: privacy policies, data perturbation, anonymization, and lookup notification.

Keywords

Context Information Privacy Policy Social Application Data Perturbation Personal Context 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 2.
    Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439–450 (2000). doi:10.1145/335191.335438. http://doi.acm.org/10.1145/335191.335438 Google Scholar
  2. 3.
    Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: Proceedings of 22nd International Conference on Distributed Computing Systems 2002, pp. 74–83 (2002). doi:10.1109/ICDCS.2002.1022244Google Scholar
  3. 5.
    Altman, I., Vinsel, A., Brown, B.: Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv. Exp. Soc. Psychol. 14, 107–160 (1981)CrossRefGoogle Scholar
  4. 10.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003). doi:10.1109/MPRV.2003.1186725CrossRefGoogle Scholar
  5. 21.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24(2), 84–90 (1981). doi:10.1145/358549.358563. http://doi.acm.org/10.1145/358549.358563
  6. 28.
    Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, and what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’05, pp. 81–90. ACM, New York (2005). doi:10.1145/1054972.1054985. http://doi.acm.org/10.1145/1054972.1054985
  7. 29.
    Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proceedings of the 6th International Conference on Mobile systems, Applications, and Services, MobiSys ’08, pp. 211–224. ACM, New York (2008). doi:10.1145/1378600.1378624. http://doi.acm.org/10.1145/1378600.1378624
  8. 30.
    Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-controllable security and privacy for pervasive computing. In: Mobile Computing Systems and Applications, 2007. The 8th IEEE Workshop on HotMobile 2007, pp. 14–19 (2007). doi:10.1109/HotMobile.2007.9Google Scholar
  9. 35.
    Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Dynamic and Mobile GIS: Investigating Change in Space and Time, pp. 34–51. CRC Press, Boca Raton (2006)Google Scholar
  10. 41.
    Ganti, R.K., Pham, N., Tsai, Y.E., Abdelzaher, T.F.: Poolview: stream privacy for grassroots participatory sensing. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ’08, pp. 281–294. ACM, New York (2008). doi:10.1145/1460412.1460440. http://doi.acm.org/10.1145/1460412.1460440
  11. 42.
    Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES ’05, pp. 71–80. ACM, New York (2005). doi:10.1145/1102199.1102214. http://doi.acm.org/10.1145/1102199.1102214
  12. 43.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys ’03, pp. 31–42. ACM, New York (2003). doi:10.1145/1066116.1189037. http://doi.acm.org/10.1145/1066116.1189037
  13. 45.
    Henricksen, K., Indulska, J., McFadden, T., Balasubramaniam, S.: Middleware for distributed context-aware systems. In: Meersman, R., Tari, Z. (eds.) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. Lecture Notes in Computer Science, vol. 3760, pp. 846–863. Springer, Berlin (2005). doi:10.1007/11575771_53. http://dx.doi.org/10.1007/11575771_53
  14. 48.
    Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.D.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS ’05, pp. 65–76. ACM, New York (2005). doi:10.1145/1073001.1073008. http://doi.acm.org/10.1145/1073001.1073008
  15. 51.
    Kapadia, A., Henderson, T., Fielding, J., Kotz, D.: Virtual walls: Protecting digital privacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K. (eds.) Pervasive Computing. Lecture Notes in Computer Science, vol. 4480, pp. 162–179. Springer, Berlin (2007). doi:10.1007/978-3-540-72037-9_10. http://dx.doi.org/10.1007/978-3-540-72037-9_10
  16. 52.
    Kapadia, A., Kotz, D., Triandopoulos, N.: Opportunistic sensing: Security challenges for the new paradigm. In: The 1st International Conference on Communication Systems and Networks and Workshops COMSNETS 2009, pp. 1–10 (2009). doi:10.1109/COMSNETS.2009.4808850Google Scholar
  17. 53.
    Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Third IEEE International Conference on Data Mining 2003 (ICDM 2003), pp. 99–106 (2003). doi:10.1109/ICDM.2003.1250908Google Scholar
  18. 55.
    Lane, N., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., Campbell, A.: A survey of mobile phone sensing. IEEE Comm. Mag. 48(9), 140–150 (2010). doi:10.1109/MCOM.2010.5560598CrossRefGoogle Scholar
  19. 56.
    Lederer, S., Dey, A.K., Mankoff, J.: A conceptual model and a metaphor of everyday privacy in ubiquitous. Technical Report. University of California at Berkeley, Berkeley (2002)Google Scholar
  20. 59.
    Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ’08, pp. 337–350. ACM, New York (2008). doi:10.1145/1460412.1460445. http://doi.acm.org/10.1145/1460412.1460445
  21. 60.
    Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., West, R., Boda, P.: Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, MobiSys ’09, pp. 55–68. ACM, New York (2009). doi:10.1145/1555816.1555823. http://doi.acm.org/10.1145/1555816.1555823
  22. 61.
    Oliveira, S., Zaïane, O.: Achieving privacy preservation when sharing data for clustering. In: Jonker, W., Petkovic, M. (eds.) Secure Data Management. Lecture Notes in Computer Science, vol. 3178, pp. 67–82. Springer, Berlin (2004). doi:10.1007/978-3-540-30073-1_6. http://dx.doi.org/10.1007/978-3-540-30073-1_6
  23. 63.
    Oyomno, W., Jäppinen, P., Kerttula, E.: Privacy implications of context-aware services. In: Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE ’09, pp. 17:1–17:9. ACM, New York (2009). doi:10.1145/1621890.1621913. http://doi.acm.org/10.1145/1621890.1621913
  24. 67.
    Prinz, W.: Nessie: an awareness environment for cooperative settings. In: Bødker, S., Kyng, M., Schmidt, K. (eds.) ECSCW ’99, pp. 391–410. Springer, Netherlands (2002). doi:10.1007/0-306-47316-X_21. http://dx.doi.org/10.1007/0-306-47316-X_21
  25. 70.
    Puttaswamy, K.P.N., Zhao, B.Y.: Preserving privacy in location-based mobile social applications. In: Proceedings of the 11th Workshop on Mobile Computing Systems &#38, Applications, HotMobile ’10, pp. 1–6. ACM, New York (2010). doi:10.1145/1734583.1734585. http://doi.acm.org/10.1145/1734583.1734585
  26. 72.
    Raento, M., Oulasvirta, A., Petit, R., Toivonen, H.: Contextphone: a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput. 4(2), 51–59 (2005). doi:10.1109/MPRV.2005.29CrossRefGoogle Scholar
  27. 78.
    Rubin, Z.: Disclosing oneself to a stranger: Reciprocity and its limits. J. Exp. Soc. Psychol. 11(3), 233–260 (1975). doi:http://dx.doi.org/10.1016/S0022-1031(75)80025-4. http://www.sciencedirect.com/science/article/pii/S0022103175800254
  28. 79.
    Saint-Andre, P.: Streaming xml with jabber/xmpp. IEEE Internet Comput. 9(5), 82–89 (2005). doi:10.1109/MIC.2005.110CrossRefGoogle Scholar
  29. 89.
    Shirky, C.: A group is its worst enemy. http://www.shirky.com/writings/group_enemy.html (2003).
  30. 90.
    Simão, J., Ribeiro, C., Ferreira, P., Veiga, L.: Jano: location-privacy enforcement in mobile and pervasive environments through declarative policies. J. Internet Serv. Appl. 3, 291–310 (2012). doi:10.1007/s13174-012-0065-z. http://dx.doi.org/10.1007/s13174-012-0065-z
  31. 92.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002). doi:10.1142/S0218488502001648. http://dx.doi.org/10.1142/S0218488502001648
  32. 93.
    Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’06, pp. 93–102. ACM, New York (2006). doi:10.1145/1124772.1124788. http://doi.acm.org/10.1145/1124772.1124788
  33. 96.
    Weiser, M.: The Computer for the 21st Century. Scientific American, New York (1995). http://wiki.daimi.au.dk/pca/_files/weiser-orig.pdf
  34. 98.
    Westin, A.: Privacy and Freedom, vol. 97. Atheneum, New York (1967). http://www.disi.unige.it/person/CaninoD/bibtex/wes67privacy.txt

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Paulo Ferreira
    • 1
  • Pedro Alves
    • 1
  1. 1.INESC ID, Instituto Superior TécnicoUniversidade de LisboaLisboaPortugal

Personalised recommendations