Skip to main content

A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments

  • Conference paper
Security Technology (SecTech 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 58))

Included in the following conference series:

  • 784 Accesses

Abstract

As the most often-cited criticism, privacy has been concerned by more and more users who need services supply. In most cases, users can not expect the hazards caused by disclosed data for the lack of specialist knowledge, unless they know the potential threat previously. Besides, users also hope their data can be disclosed in a minimal way thus the potential threats to their data can be decreased as minimum as possible. To address this problem, in this paper, a threat-based model is presented for privacy data management. A key feature of our proposed model is it allows users to customize the services on the basis of their consents to the potential threats. Furthermore, user can select a best service from a trustable company with reference to other users’ feedback. To evaluate the proposed system, three simulations for selecting optimal services are performed in this research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jones, K.S.: Privacy: What’ different now? Interdiscip. Sci. Rev. 28(4), 287–292 (2003)

    Article  Google Scholar 

  2. Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Information and Software Technology, pp. 337–350. Butterworth-Heinemann, Newton (2009)

    Google Scholar 

  3. Byun, J., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Symposium on Access Control Models and Technologies, pp. 102–110. ACM, New York (2005)

    Google Scholar 

  4. Byun, J.-W., Li, N.: Purpose Based Access Control for Privacy Protection in Relational Database, vol. 17(4), pp. 603–619. Springer, Heidelberg (2008)

    Google Scholar 

  5. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 143–154 (2002)

    Google Scholar 

  6. Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An agent-oriented software development methodology. JAAMAS 8(3), 203–236 (2004)

    Google Scholar 

  7. Lin, C.-C., Wang, W.-C., Yu, W.-D.: Improving AHP for construction with an adaptive AHP approach(A3). Automation in Construction 17(2), 180–187 (2008)

    Article  MathSciNet  Google Scholar 

  8. Massacci, F., Mylopoulos, J.P., Zannone, N.: Hierarchical hippocratic databases with mnimal disclosure for virtual organizations. Springer, Heidelberg

    Google Scholar 

  9. Federal Trade Commission. Privacy online: Fair information practices in the electronic marketplace: A report to congress (May 2000), http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

  10. Tian, Y., Song, B., Huh, E.-n.: A Threat-based Privacy Preservation System in Untrusted Environment (in press)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tian, Y., Song, B., Huh, EN. (2009). A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10847-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10846-4

  • Online ISBN: 978-3-642-10847-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics