Abstract
As the most often-cited criticism, privacy has been concerned by more and more users who need services supply. In most cases, users can not expect the hazards caused by disclosed data for the lack of specialist knowledge, unless they know the potential threat previously. Besides, users also hope their data can be disclosed in a minimal way thus the potential threats to their data can be decreased as minimum as possible. To address this problem, in this paper, a threat-based model is presented for privacy data management. A key feature of our proposed model is it allows users to customize the services on the basis of their consents to the potential threats. Furthermore, user can select a best service from a trustable company with reference to other users’ feedback. To evaluate the proposed system, three simulations for selecting optimal services are performed in this research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jones, K.S.: Privacy: What’ different now? Interdiscip. Sci. Rev. 28(4), 287–292 (2003)
Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Information and Software Technology, pp. 337–350. Butterworth-Heinemann, Newton (2009)
Byun, J., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Symposium on Access Control Models and Technologies, pp. 102–110. ACM, New York (2005)
Byun, J.-W., Li, N.: Purpose Based Access Control for Privacy Protection in Relational Database, vol. 17(4), pp. 603–619. Springer, Heidelberg (2008)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 143–154 (2002)
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An agent-oriented software development methodology. JAAMAS 8(3), 203–236 (2004)
Lin, C.-C., Wang, W.-C., Yu, W.-D.: Improving AHP for construction with an adaptive AHP approach(A3). Automation in Construction 17(2), 180–187 (2008)
Massacci, F., Mylopoulos, J.P., Zannone, N.: Hierarchical hippocratic databases with mnimal disclosure for virtual organizations. Springer, Heidelberg
Federal Trade Commission. Privacy online: Fair information practices in the electronic marketplace: A report to congress (May 2000), http://www.ftc.gov/reports/privacy2000/privacy2000.pdf
Tian, Y., Song, B., Huh, E.-n.: A Threat-based Privacy Preservation System in Untrusted Environment (in press)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tian, Y., Song, B., Huh, EN. (2009). A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-10847-1_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10846-4
Online ISBN: 978-3-642-10847-1
eBook Packages: Computer ScienceComputer Science (R0)