Skip to main content

Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare

  • Conference paper
Smart Homes and Health Telematics (ICOST 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5120))

Included in the following conference series:

Abstract

After more than fifty years of designing computers that require users to adapt to them, we now enter the epoch of human-centric computing, where systems are designed to adapt to users. A primary concern in ubiquitous computing research is to understand the potential relationship between computation and embedded context. Developers currently face challenges in interpreting context and incorporate little support in designing frameworks that help end-users manage their privacy in an intuitive way. In this paper, we investigate context in assisted healthcare, and provide a more comprehensive definition of context. Based on this, we present the major challenges faced by developers in creating privacy enhanced context aware ubiquitous middleware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Winograd, T.: Architectures for context. Human-Computer Interaction 16(2–4), 401–419 (2001)

    Google Scholar 

  2. Dey, A.K.: Providing Architectural Support for Building Context Aware Applications. Ph.D. Thesis (2000)

    Google Scholar 

  3. Schmidt, A., Beigl, M., Gellersen, H.-W.: There is more to context than location. Journal of Computers and Graphics 23(6), 893–901 (1999)

    Article  Google Scholar 

  4. Choi, O.-H., Lim, J.-E., Na, H.-S., Baik, D.-K.: Modeling of Situation-Middleware for TPO metadata based on Event-Condition-Action Rule. In: Fourth International Conference on Software Engineering Research, Management and Applications, pp. 423–427 (2006)

    Google Scholar 

  5. Shchzad, A., Ngo, H.Q., Lee, S.Y., Lee, Y.-K.: A comprehensive middleware architecture for context-aware ubiquitous computing systems. In: Fourth Annual ACIS International Conference on Computer and Information Science, pp. 251–256 (2005)

    Google Scholar 

  6. Hopper, A.: Sentient Computing. The Royal Society Clifford Patterson Lecture (1999)

    Google Scholar 

  7. Cooperstock, J., et al.: Reactive environments: Throwing away your keyboard and mouse. CACM 40(9), 65–73 (1997)

    Google Scholar 

  8. Mozer, M.C.: The neural network house: An environment that adapts to its inhabitants. In: Proc. of the AAAI Spring Symposium on Intelligent Environments, pp. 110–114 (1998)

    Google Scholar 

  9. Coen, M.: The future of human-computer interaction or how I learnt to stop worrying and love my intelligent room. IEEE Intelligent systems 14(2), 8–10 (1999)

    Article  Google Scholar 

  10. Intille, S.S.: The goal: smart people, not smart homes. In: Proc. International Conference on Smart Homes and Health Telematics, IOS Press, Amsterdam (2006)

    Google Scholar 

  11. Beckwith, R.: Designing for ubiquity: the perception of privacy. IEEE Pervasive Computing 2(2), 40–46 (2003)

    Article  Google Scholar 

  12. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 86–97. ACM Press, New York (2003)

    Chapter  Google Scholar 

  13. Tentori, M., Favela, J., Gonzalez, V.: Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications. Journal of Universal Computer Science 12(3), 252–269 (2006)

    Google Scholar 

  14. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177–189 (2004)

    Google Scholar 

  15. Heiber, T., Marron, P.J.: Exploring the Relationship between Context and Privacy. In: Privacy, Security and Trust within the Context of Pervasive Computing, January 2005. the Kluwer International Series in Engineering and Computer Science. Springer, Heidelberg (2005)

    Google Scholar 

  16. Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of the 2004 conference on Designing interactive systems, pp. 91–100 (2004)

    Google Scholar 

  17. Gross, R., Acquisti, A., Heinz, H.J.: Information revelation and privacy in online social networks. In: Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES 2005), pp. 71–80 (2005)

    Google Scholar 

  18. Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8(6), 440–454 (2004)

    Article  Google Scholar 

  19. Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sumi Helal Simanta Mitra Johnny Wong Carl K. Chang Mounir Mokhtari

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pallapa, G., Das, S.K. (2008). Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare. In: Helal, S., Mitra, S., Wong, J., Chang, C.K., Mokhtari, M. (eds) Smart Homes and Health Telematics. ICOST 2008. Lecture Notes in Computer Science, vol 5120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69916-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69916-3_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69914-9

  • Online ISBN: 978-3-540-69916-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics