Skip to main content

Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing

  • Conference paper
Book cover Ambient Assistive Health and Wellness Management in the Heart of the City (ICOST 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5597))

Included in the following conference series:

Abstract

Maintaining user privacy is a well-known challenge and obstacle to the acceptance of pervasive computing. Privacy has been researched from various perspectives by social science, legislative, and technological communities resulting in an information-centric approach that regulates of the collection and use of personal information. However, through the actuation of devices and objects in the user’s physical environment, pervasive computing also introduces other significant challenges to a user’s physical privacy. Our research introduces an environment-centric approach to modeling user privacy and regulating intrusions to physical privacy. We introduce four principles to guide the construction of physical privacy policies and demonstrate how existing information privacy models can be extended to address these aspects of physical privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babbitt, R., Lu, D., Chang, C., Wong, J.: Requirements Engineering for Smart Homes to Support Successful Aging, Disability, and Independence. European Academy of Sciences Annals, 107–127 (2005)

    Google Scholar 

  2. Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  3. Organisation for Economic Co-operation and Development (OECD). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (2001), http://www1.oecd.org/publications/ebook/9302011E.PDF

  4. Federal Trade Commission. Privacy Online: A report to Congress (1998), http://www.ftc.gov/reports/privacy3/fairinfo.htm

  5. Canadian Standards Association. Model Code for the Protection of Personal Information (March 1996), http://www.csa.ca/standards/privacy/code/Default.asp?articleID=5286&language=English

  6. Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 273. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Cranor, L., et al.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, World Wide Web Consortium Recommendation (April 2002), www.w3.org/TR/P3P/

  8. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing 8, 430–439 (2004)

    Article  Google Scholar 

  10. Hong, D., Yuan, M., Shen, V.Y.: Dynamic Privacy Management: a Plug-in Service for the Middleware in Pervasive Computing. In: Proc. of 7th International Conference on Human Computer Interaction with Mobile Devices and Services, September 2005, pp. 1–8 (2005)

    Google Scholar 

  11. Enterprise Privacy Authorization Language (EPAL),Version 1.2, 2003; the version submitted to the W3C, http://www.w3.org/Submission/2003/SUBMEPAL-20031110/

  12. Ashley, P., Hada, S., Karjoth, G.: E-P3P Policies and Privacy Authorization, Workshop of Privacy. In: Workshop on Privacy and the Electronic Society, WPES 2002 (November 2002)

    Google Scholar 

  13. Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Journal of Computer Systems Science and Engineering 21(5), 339–352 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Babbitt, R., Yang, HI., Wong, J., Chang, C. (2009). Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing. In: Mokhtari, M., Khalil, I., Bauchet, J., Zhang, D., Nugent, C. (eds) Ambient Assistive Health and Wellness Management in the Heart of the City. ICOST 2009. Lecture Notes in Computer Science, vol 5597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02868-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02868-7_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02867-0

  • Online ISBN: 978-3-642-02868-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics