Abstract
The vision of upcoming ubiquitous computing environment allows us to exchange and share information with any parties any time, anywhere if we want. However, the widespread use of computing devices and sensors networked together could be a considerable threat to the privacy of individuals living in the ubiquitous computing environment. In the paper, we investigate privacy issues in the ubiquitous computing environment and present a model of privacy protection and an example architecture to support it. The proposed architecture ensures that individuals not only get benefits and services from ubiquitous environment by freely exchanging and sharing information, but they also preserve their own privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing 1(3) (July-September 2002)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Gulcu, C., Tsudik, G.: Mixing Email with Babel. In: 1996 Symposium on Network and Distributed System Security, San Diego (February 1996)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-Mixes:Untraceable Communication with Very Small Bandwidth Overhead. In: GI/ITG Conference: Communication in Distributed Systems, Mannheim (February 1991)
Chuang, S.: Security Management of ATM Networks, Ph.D. thesis, Cambridge University
Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceablity. Jr. of Cryptography 1(1), 66–75 (1988)
Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability and Pseudonymity – A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing (January-March 2003)
Shannon, C.: A Mathematical Theory of Communication. Bell System Tech. Jr. 27, 379–423, 623–656 (1948)
Jiang, X., Landay, J.: Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing (July-September 2002)
Denning, D.E.: Crptography and Security. Addison-Wesley, Reading (1982)
Special Issue: Issues and challenges in ubiquitous computing, Communications of the ACM 45(12) (December 2002)
Special Issue: Technical and social components of peer-to-peer computing, Communications of the ACM 46(2) (February 2003)
Bell, D.E., La Padula, L.: Secure Computer Systems: A Mathematical Model, Mitre Corporation, Bedford, Mass. 01730 (January 1973)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, S.O., Yoon, K.S. (2004). Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24709-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-24709-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22056-5
Online ISBN: 978-3-540-24709-8
eBook Packages: Springer Book Archive