Abstract
This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. This implies a risk to privacy that might not be assumed if a clear and trustable privacy management model is not provided. However, since this kind of environments posses a set of highly heterogeneous sensing techniques, even basic privacy policies require a great management effort. Therefore, there is a tradeoff between providing automatic privacy configuration mechanisms and granting trustable privacy management models.
Following the ”fair-trade” metaphor, this paper presents a privacy solution dealing with user’s privacy as a tradable good for obtaining environment’s services. Thus, users gain access to more valuable services as they share more personal information. This strategy, combined with optimistic access control and logging mechanisms, enhances users’ confidence in the system while encouraging them to share their information.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer 34(8), 57–66 (2001)
Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing 2(1), 4–8 (2003)
Dix, A., Rodden, T., Davies, N., Trevor, J., Friday, A., Palfreyman, K.: Exploiting space and location as a design framework for interactive mobile systems. ACM Trans. Comput.-Hum. Interact. 7(3), 285–321 (2000)
Dey, K.A.: Understanding and Using Context. Personal Ubiquitous Computing 5(1) (2001)
Want, R., Hoper, A., Falcao, V., Gibbons, J.: The Active Badge location system. ACM Trans. on Information Systems 10(1), 91–102 (1992)
Westin, A.F.: Privacy and Freedom. Atheneum, NY (1967)
Hengartner, U., Steenkiste, P.: Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. In: 1st IEEE/CreateNet Intl. Conf. on Security and Privacy for Emerging Areas in Communication Nerworks (IEEE/CreateNet SecureComm 2005) (2005)
Kagal, L., Finin, T., Joshi, A.: A Policy Language for a Pervasive Computing Environment. In: IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks (2003)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of the 1st Intl. Conf. on Mobile Systems, Applications, and Services MobiSys (2003)
Al-Muhtadi, J., Campbell, H.R., Kapadia, A., Dennis, M.M., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22th Intl. Conf. on Distributed Computing Systems (22th ICDCS 2002), Vienna, Austria (2002)
Lederer, S.: Designing Disclosure: Interactive Personal Privacy at the Dawn of Ubiquitous Computing. Research Project Report, Master of Science, Computer Science Division, University of California, Berkeley (2003)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Esquivel, A., Haya, P.A., García-Herranz, M., Alamán, X. (2007). Managing Pervasive Environment Privacy Using the “fair trade” Metaphor. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. OTM 2007. Lecture Notes in Computer Science, vol 4806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76890-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-76890-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76889-0
Online ISBN: 978-3-540-76890-6
eBook Packages: Computer ScienceComputer Science (R0)