Skip to main content

A Privacy Awareness System for Ubiquitous Computing Environments

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2498))

Abstract

Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ronald Bourret. XML-DBMS. Homepage at http://www.rpbourret.com/xmldbms/.

  2. David Brin. The Transparent Society. Perseus Books, Reading MA, 1998.

    Google Scholar 

  3. Allen Brown, Barbara Fox, Satoshi Hada, Brian LaMacchia, and Hiroshi Maruyama. SOAPsecurity extensions: Digital signature. See http://www.w3.org/TR/SOAP-dsig, February 2001.

  4. ContentGuard, Inc. XrML-the extensible rights markup language. See http://www.xrml.org.

  5. Lorrie Cranor, Marc Langheinrich, and Massimo Marchiori. A P3P preference exchangelanguage 1.0 (APPEL1.0). See http://www.w3.org/TR/P3P-preferences, April 2002.

  6. Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, and Joseph Reagle. The platformfor privacy preferences 1.0 (P3P1.0) specification. W3C Recommendation, HTML Versionat http://www.w3.org/TR/P3P/, April 2002.

  7. J.J. Borking et al. Intelligent software agents: Turning a privacy threat into a privacy protector.Available at: http://www.ipc.on.ca/english/pubpres/papers/isat_OnlinePDF.pdf,April1999.

  8. Marc Langheinrich. Privacy by design-principles of privacy-aware ubiquitous systems. InProceedings ofUbicomp, pages 273–291. Springer LNCS, September 2001.

    Google Scholar 

  9. NCR Teradata Division. NCR launches first privacy product for the data warehousing industry. Data Warehousing Report, 2(3), October 2000. Article available online at http://www.teradata.com/dwr/dwr6/article5.html.

  10. Mark Stefik. Trusted systems. Scientific American, pages 78–81, March 1997. Also availableonline at http://www.sciam.com/0397issue/0397stefik.html.

  11. TUDresden. JAP-Java Anomyzing Proxy. Homepage at http://anon.inf.tu-dresden.de.

  12. Jim Waldo. The Jini Architecture for Network-centric Computing. Communications of the ACM, 42(7):76–82, July 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Langheinrich, M. (2002). A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds) UbiComp 2002: Ubiquitous Computing. UbiComp 2002. Lecture Notes in Computer Science, vol 2498. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45809-3_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45809-3_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44267-7

  • Online ISBN: 978-3-540-45809-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics