Skip to main content

Privacy and Security in Ubiquitous Knowledge Discovery

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6202))

Abstract

When we consider wearable computers, smart homes, and various sensors omnipresent in our environment and the data collected by such systems, we can see that ensuring privacy and security is a big challenge in ubiquitous computing (UbiComp). This is due to the fact that ubiquitous computing is highly integrated into our daily lives, making the dependability of these systems ever more central and yet difficult to control.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE, 63–69 (1975)

    Google Scholar 

  2. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. IEEE Computer (June 2004)

    Google Scholar 

  3. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 6(22) (1976)

    Google Scholar 

  4. Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)

    Book  Google Scholar 

  5. Robinson, P., Zimmer, T.: Structured analysis of security in ubiquitous computing (2007)

    Google Scholar 

  6. Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing context-aware applications using environment roles. In: ACM Workshop on Role Based Access Control (2001)

    Google Scholar 

  7. for Standardization, I.O.: ISO9 ISO IS 15408 (1999), http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=40613

  8. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity and identity management a consolidated proposal for terminology (May 2006), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  9. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 1(33) (2004)

    Google Scholar 

  10. McGraw, G.: A new class of wireless attacks (2001), http://www.linuxsecurity.com/articles/network_security_article-3858.html

  11. Wang, H., Huang, J., Qu, Y., Xi, J.: Web services: problems and future directions. Journal of Web Semantics 1 (2004)

    Google Scholar 

  12. Orr, R., Abowd, G.: The smart floor: A mechanism for natural user identification and tracking. Technical report, Georgia Institute of Technology (2000)

    Google Scholar 

  13. Lee, W., Stolfo, S., Mok, K.: Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review 16 (2000)

    Google Scholar 

  14. Wood, A., Stankovic, J.: Denial of services in sensor networks. IEEE Computer (October 2002)

    Google Scholar 

  15. Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, SIGMOD 1996 (1996)

    Google Scholar 

  16. O’Leary, D.E.: Knowledge discovery as a threat to database security. In: Knowledge Discovery in Databases. AAAI/MIT Press (1991)

    Google Scholar 

  17. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 439–450 (2000)

    Google Scholar 

  18. Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: Natural Science Foundation Workshop on Next Generation Data Mining, pp. 126–133 (2002)

    Google Scholar 

  19. Zhan, J.Z., Chang, L.W., Matwin, S.: Privacy-preserving collaborative sequential pattern mining. In: Proceedings of Workshop on Link Analysis, Counter-terrorism and Privacy (2004)

    Google Scholar 

  20. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. Technical report, SRI International (1998)

    Google Scholar 

  21. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems 5(10) (2002)

    Google Scholar 

  22. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), pp. 620–629 (2005)

    Google Scholar 

  23. Mokbel, M.F., Chow, C., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006)

    Google Scholar 

  24. Bettini, C., SeanWang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Proceedings of 2nd VLDB Workshop on Secure Data Management, SDM (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Giannotti, F., Saygin, Y. (2010). Privacy and Security in Ubiquitous Knowledge Discovery. In: May, M., Saitta, L. (eds) Ubiquitous Knowledge Discovery. Lecture Notes in Computer Science(), vol 6202. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16392-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16392-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16391-3

  • Online ISBN: 978-3-642-16392-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics