Abstract
Maintaining user privacy is a well-known challenge and obstacle to the acceptance of pervasive computing. Privacy has been researched from various perspectives by social science, legislative, and technological communities resulting in an information-centric approach that regulates of the collection and use of personal information. However, through the actuation of devices and objects in the user’s physical environment, pervasive computing also introduces other significant challenges to a user’s physical privacy. Our research introduces an environment-centric approach to modeling user privacy and regulating intrusions to physical privacy. We introduce four principles to guide the construction of physical privacy policies and demonstrate how existing information privacy models can be extended to address these aspects of physical privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Babbitt, R., Lu, D., Chang, C., Wong, J.: Requirements Engineering for Smart Homes to Support Successful Aging, Disability, and Independence. European Academy of Sciences Annals, 107–127 (2005)
Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Organisation for Economic Co-operation and Development (OECD). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (2001), http://www1.oecd.org/publications/ebook/9302011E.PDF
Federal Trade Commission. Privacy Online: A report to Congress (1998), http://www.ftc.gov/reports/privacy3/fairinfo.htm
Canadian Standards Association. Model Code for the Protection of Personal Information (March 1996), http://www.csa.ca/standards/privacy/code/Default.asp?articleID=5286&language=English
Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 273. Springer, Heidelberg (2001)
Cranor, L., et al.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, World Wide Web Consortium Recommendation (April 2002), www.w3.org/TR/P3P/
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)
Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing 8, 430–439 (2004)
Hong, D., Yuan, M., Shen, V.Y.: Dynamic Privacy Management: a Plug-in Service for the Middleware in Pervasive Computing. In: Proc. of 7th International Conference on Human Computer Interaction with Mobile Devices and Services, September 2005, pp. 1–8 (2005)
Enterprise Privacy Authorization Language (EPAL),Version 1.2, 2003; the version submitted to the W3C, http://www.w3.org/Submission/2003/SUBMEPAL-20031110/
Ashley, P., Hada, S., Karjoth, G.: E-P3P Policies and Privacy Authorization, Workshop of Privacy. In: Workshop on Privacy and the Electronic Society, WPES 2002 (November 2002)
Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Journal of Computer Systems Science and Engineering 21(5), 339–352 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Babbitt, R., Yang, HI., Wong, J., Chang, C. (2009). Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing. In: Mokhtari, M., Khalil, I., Bauchet, J., Zhang, D., Nugent, C. (eds) Ambient Assistive Health and Wellness Management in the Heart of the City. ICOST 2009. Lecture Notes in Computer Science, vol 5597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02868-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-02868-7_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02867-0
Online ISBN: 978-3-642-02868-7
eBook Packages: Computer ScienceComputer Science (R0)