Skip to main content

A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment

  • Conference paper
AI 2004: Advances in Artificial Intelligence (AI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3339))

Included in the following conference series:

  • 2581 Accesses

Abstract

Privacy preservation is crucial in the ubiquitous computing because a lot of privacy-sensitive information can be collected and distributed in the ubiquitous computing environment. The anonymity-based approach is one of well-known ones for privacy preservation in ubiquitous computing. It allows users to use pseudonyms when they join in a service area of the ubiquitous computing environment. This approach can protect users’ privacy by hiding the user’s real IDs, but it makes it difficult to provide ID-based services like buddy service, safety alert service, and so on. This paper proposes a multiagent architecture to make it possible to provide ID-based services in the anonymity-based privacy awareness systems. The proposed architecture employs so-called the white page agent   which maintains the current pseudonyms of users and allows users to get the pseudonyms of other users from the agent. Even though the white page agent contains the pseudonyms of users, it is enforced not to disclose the association of real user IDs with pseudonyms by adopting encryption techniques. This paper presents in detail the proposed architecture, its constituent components and their roles and how they provide ID-based services in the anonymity-based system. As an example, it also presents how buddy service can take place in the proposed architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  2. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2002)

    Article  Google Scholar 

  3. Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-Aware Location Sensor Networks (2003), http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.html

  4. Jiang, X., Landay, J.: Modeling Privacy Control in Context-aware Systems. IEEE Pervasive 1(3) (2002)

    Google Scholar 

  5. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Lederer, S., Dey, A.K., Mankoff, J.: Everyday Privacy in Uniquitous Computing Environment. In: Ubicomp 2002 Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing (2002)

    Google Scholar 

  7. Smailagic, A., Siewiorek, D.P., Anhalt, J., Kogan, D., Wang, Y.: Location Sensing and Privacy in a Context Aware Computing Environment. In: Proc. Pervasive Computing (2001)

    Google Scholar 

  8. Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer 34(8), 57–66 (2001)

    Google Scholar 

  9. Prasad, A.R., Schoo, P., Wang, H.: An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. In: Proc. of SAINT 2004: The 2004 Symposium on Applications & Internet (2004)

    Google Scholar 

  10. Hazas, M., Ward, A.: A High Performance Privacy-Oriented Location System. In: Proc. of IEEE International Conference on Pervasive Computing and Communications (2003)

    Google Scholar 

  11. Osbakk, P., Ryan, N.: Expressing Privacy Preferences in terms of Invasiveness. In: Position Paper for the 2nd UK-UbiNet Workshop, University of Cambridge, UK (2004)

    Google Scholar 

  12. Snekkenes, E.: Concepts for Personal Location Privacy Policies. In: Proc. of the 3rd ACM conference on Elctronic Commerce, pp. 48–57. ACM Press, New York (2001)

    Chapter  Google Scholar 

  13. Oriyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket Location-Support System. In: Proc. of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 32–43. ACM Press, New York (2000)

    Chapter  Google Scholar 

  14. Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive Privacy with Identity Management. In: Ubicom 2002 (2002)

    Google Scholar 

  15. Stallings, W.: Cryptography and Network Security. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  16. Zaki, M.J.: Parallel and Distributed Association Mining. In: IEEE Conccurency, pp. 14–25 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K.M., Lee, S.H. (2004). A Multiagent Architecture for Privacy-Preserving ID-Based Service in Ubiquitous Computing Environment. In: Webb, G.I., Yu, X. (eds) AI 2004: Advances in Artificial Intelligence. AI 2004. Lecture Notes in Computer Science(), vol 3339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30549-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30549-1_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24059-4

  • Online ISBN: 978-3-540-30549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics