Abstract
Protecting the user’s digital privacy in today’s increasingly mobile world is a significant challenge. As mobile applications grow in complexity they will exceed the computational capabilities and power limitations of the mobile devices on which they run. To overcome the inherent limitations of mobile devices, mobile application designers are turning to the cloud for solutions. The primary rationale is that by off-loading computationally demanding tasks, mobile applications can provide users with sophisticated features that exceed the device’s capabilities. This research analyzes two impactful mobile computing trends from a privacy-protection perspective: (1) mobile applications are increasingly relying on cloud-based services; and (2) cloud-based services will eventually specialize beyond the expertise of mobile application developers. From a privacy perspective, this increased reliance on cloud computing poses additional challenges. In this research, we propose a model that aims to support mobile users to decide if, when, and how a cloud-based service or resource could be used in a way that protects their privacy. In this paper, we present (1) the model describing the roles of two collaborating components: a mobile device agent and a privacy service mediator, (2) use cases and design considerations, and (3) future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beach A, Gartrell M, Han R Solutions to Security and Privacy Issues in Mobile Social Networking. In: International Conference on Computational Science and Engineering, 2009. pp 1036 – 1042
Bilton N (2012) Girls Around Me: An App Takes Creepy to a New Level New York Times.http://bits.blogs.nytimes.com/2012/03/30/girls-around-me-ios-app-takes-creepy-to-a-new-level/ Accessed July 10, 2012
Cox P, A. (2011) Mobile cloud computing: Devices, trends, issues, and the enabling technologies. IBM
Duhigg C (2012) How Companies Learn Your Secrets. New York Times. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=2&pagewanted=1&hp Accessed July 20, 2012
Kakousis K, Paspallis N, Papadopoulos GA (2010) A survey of software adaptation in mobile and ubiquitous computing. Enterprise Information Systems 4 (4):355–389
Poolsappasit N, Ray I (2009) Towards Achieving Personalized Privacy for Location-Based Services. Transactions on Data Privacy 2 (1):77–99
Satyanarayanan M (2011) Mobile Computing: the Next Decade. Paper presented at the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Steel E (2010) A Web Pioneer Profiles Users by Name Wall Street Journal. http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html. Accessed June 24, 2012
Tomko G, Borrett D, Kwan H, Steffan G (2010) SmartData: Make the Data “Think” for Itself. Identity in the Information Society 3 (2):343–362
Yu WD, Yuan H (2011) An Approach to Explore Mobile Software Engineering Advances in Cloud Computing Environment. Paper presented at the IEEE 35th Annual Conference on Computer Software and Applications Conference Workshops
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Sykes, E.R., Pham, H., Stoica, M., Mahmud, K., Stacey, D. (2013). A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_10
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6409-9_10
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6408-2
Online ISBN: 978-1-4614-6409-9
eBook Packages: Computer ScienceComputer Science (R0)