Skip to main content

Managing Pervasive Environment Privacy Using the “fair trade” Metaphor

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4806))

Abstract

This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. This implies a risk to privacy that might not be assumed if a clear and trustable privacy management model is not provided. However, since this kind of environments posses a set of highly heterogeneous sensing techniques, even basic privacy policies require a great management effort. Therefore, there is a tradeoff between providing automatic privacy configuration mechanisms and granting trustable privacy management models.

Following the ”fair-trade” metaphor, this paper presents a privacy solution dealing with user’s privacy as a tradable good for obtaining environment’s services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and logging mechanisms, enhances users’ confidence in the system while encouraging them to share their information.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer 34(8), 57–66 (2001)

    Google Scholar 

  2. Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing 2(1), 4–8 (2003)

    Article  Google Scholar 

  3. Dix, A., Rodden, T., Davies, N., Trevor, J., Friday, A., Palfreyman, K.: Exploiting space and location as a design framework for interactive mobile systems. ACM Trans. Comput.-Hum. Interact. 7(3), 285–321 (2000)

    Article  Google Scholar 

  4. Dey, K.A.: Understanding and Using Context. Personal Ubiquitous Computing 5(1) (2001)

    Google Scholar 

  5. Want, R., Hoper, A., Falcao, V., Gibbons, J.: The Active Badge location system. ACM Trans. on Information Systems 10(1), 91–102 (1992)

    Article  Google Scholar 

  6. Westin, A.F.: Privacy and Freedom. Atheneum, NY (1967)

    Google Scholar 

  7. Hengartner, U., Steenkiste, P.: Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. In: 1st IEEE/CreateNet Intl. Conf. on Security and Privacy for Emerging Areas in Communication Nerworks (IEEE/CreateNet SecureComm 2005) (2005)

    Google Scholar 

  8. Kagal, L., Finin, T., Joshi, A.: A Policy Language for a Pervasive Computing Environment. In: IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks (2003)

    Google Scholar 

  9. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of the 1st Intl. Conf. on Mobile Systems, Applications, and Services MobiSys (2003)

    Google Scholar 

  10. Al-Muhtadi, J., Campbell, H.R., Kapadia, A., Dennis, M.M., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22th Intl. Conf. on Distributed Computing Systems (22th ICDCS 2002), Vienna, Austria (2002)

    Google Scholar 

  11. Lederer, S.: Designing Disclosure: Interactive Personal Privacy at the Dawn of Ubiquitous Computing. Research Project Report, Master of Science, Computer Science Division, University of California, Berkeley (2003)

    Google Scholar 

  12. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Robert Meersman Zahir Tari Pilar Herrero

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X. (2007). Managing Pervasive Environment Privacy Using the “fair trade” Metaphor. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. OTM 2007. Lecture Notes in Computer Science, vol 4806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76890-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76890-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76889-0

  • Online ISBN: 978-3-540-76890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics