Skip to main content

Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-based Services

  • Chapter
Intelligent Spaces

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

During the 1980s, Mark Weiser [1] predicted a world in which computing was so pervasive that devices embedded in the environment could sense their relationship to us and to each other. These tiny ubiquitous devices would continually feed information from the physical world into the information world. Twenty years ago, this vision was the exclusive territory of academic computer scientists and science fiction writers. Today this subject has become of interest to business, government, and society. Governmental authorities exercise their power through the networked environment. Credit card databases maintain our credit history and decide whether we are allowed to rent a house or obtain a loan. Mobile telephones can locate us in real time so that we do not miss calls. Within another 10 years, all sorts of devices will be connected through the network. Our fridge, our food, together with our health information, may all be networked for the purpose of maintaining diet and well-being. The Internet will move from being an infrastructure to connect computers, to being an infrastructure to connect everything [2, 3].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser M. The Computer for the 21st Century. Scientific American, 1991:256:3: 94–104.

    Google Scholar 

  2. Krikorian R. The Net Comes Home. New Scientist, February 2003.

    Google Scholar 

  3. Overby C S. The X Internet and Consumer Privacy. Forrester Report, December 2003.

    Google Scholar 

  4. Culler D et al. TinyOS: An Operating System for Sensor Networks. In: Rabaey J (editor). Ambient Intelligence. Springer, 2004.

    Google Scholar 

  5. Sarma S E et al. Radio-Frequency Identification: Security Risks and Challenges. RS A CryptoBytes, 2003:6.

    Google Scholar 

  6. Warren S and Brandeis L. The Right to Privacy. Harvard Law Review, December 1890:IV:5.

    Google Scholar 

  7. Westin A. Privacy and Freedom. Atheneum, New York, 1967.

    Google Scholar 

  8. Laurant C. Privacy and Human Rights: An International Survey of Privacy Laws and Developments. Electronic Privacy Information Center, Washington, DC, 2003.

    Google Scholar 

  9. Marx G. Murky Conceptual Waters: The Private and the Public. Ethics and Information Technology, July 2001.

    Google Scholar 

  10. Adams A. Multimedia Information Changes the Whole Privacy Ballgame. Proceedings of Computers, Freedom, and Privacy, 2000.

    Google Scholar 

  11. Lederer S. Everyday Privacy in Ubiquitous Computing Environments. Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, UbiComp, 2002.

    Google Scholar 

  12. Lessig L. The Architecture of Privacy. Taiwan Net Conference, 1998.

    Google Scholar 

  13. Acquisti A. Privacy and Security of Personal Information: Economic Incentives and Technological Solutions. In: Camp J and Lewis R (editors). The Economics of Information Security. Kluwer Academic Publishers, 2004.

    Google Scholar 

  14. OECD — Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. September 1980.

    Google Scholar 

  15. Greenleaf G. Australia’s APEC Privacy Initiative: The Pros and Cons of OECD Lite. Privacy Law and Policy Reporter, 2003.

    Google Scholar 

  16. OECD — Ministerial Declaration on the Protection of Privacy on Global Networks. October 1998.

    Google Scholar 

  17. Clarke R. Beyond the OECD Guidelines: Privacy Protection for the 21st Century. January 2000 — http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html

    Google Scholar 

  18. Justice M K. Privacy Protection, A New Beginning: OECD Principles 20 Years on. Privacy Law and Policy Reporter, 1999.

    Google Scholar 

  19. EU Directive 1995/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. October 1995.

    Google Scholar 

  20. Pfitzmann A and Köhntopp M. Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, 2002.

    Google Scholar 

  21. Juels A. Privacy and Authentication in Low-Cost RFID Tags. RS A Laboratories, 2003.

    Google Scholar 

  22. Chaum D. Untraceable Electronic Mail: Return Addresses and Digital Pseudonyms. Communications of the ACM, 1981:24:2:84–90.

    Article  Google Scholar 

  23. Reiter M K and Rubin A D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998.

    Google Scholar 

  24. EU Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector. July 2002.

    Google Scholar 

  25. EU Directive 1997/66/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector. December 1997.

    Google Scholar 

  26. Beresford A and Stajano F. Mix Zones: User Privacy in Location-aware Services. IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) 2004.

    Google Scholar 

  27. Gruteser M and Grunwald D. Anonymous Usage of Location-based Services Through Spatial and Temporal Cloaking. ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys) 2003.

    Google Scholar 

  28. Brin D. The Transparent Society. Addison-Wesley, 1998.

    Google Scholar 

  29. Guerin D. Anarchism: From Theory to Practice. Monthly Review Press, 1970.

    Google Scholar 

  30. Federal Trade Commission. Workshop on the Information Marketplace: Merging and Exchanging Consumer Data. Washington DC, March 2001.

    Google Scholar 

  31. Fred H C. Principles for Protecting Privacy. The Cato Journal, March 2002.

    Google Scholar 

  32. Cranor L et al. The Platform for Privacy Preferences 1.0 (P3P 1.0) specification. W3C Recommendation, April 2002 — http://www.w3.org/TR/2002/REC-P3P-20020416

    Google Scholar 

  33. Pedersen A. P3P — Problems, Progress, Potential. Privacy Laws & Business International Newsletter, February 2003.

    Google Scholar 

  34. Thidadeau R. A Critique of P3P: Privacy on the Web. August 2000 — dollar, ecom. emu. edu/p3pcritique/

    Google Scholar 

  35. Birchman J A. Is P3P ‘The Devil’? Law and the Internet Seminars, University of Miami School of Law, May 1998 — http://www.law.miami.edu/~froomkin/sem97/ birchman.html

    Google Scholar 

  36. Langheinrich M. A Privacy Awareness System for Ubiquitous Computing Environments. 4th International Conference on Ubiquitous Computing (UbiComp) 2002.

    Google Scholar 

  37. Juels A and Brainard J. Soft Blocking: Flexible Blocker Tags on the Cheap. Manuscript 2003 — http.V/www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/softblocker/ softblocker.pdf

    Google Scholar 

  38. Casassa-Mont M, Pearson S, and Bramhill P. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. IEEE 14th International Workshop on Database and Expert Systems Applications (DEXA’03) September 2003.

    Google Scholar 

  39. Boneh D and Franklin M. Identity-based Encryption from the Weil Pairing. Crypto, 2001.

    Google Scholar 

  40. Tygar D. Security with Privacy. ISAT 2002 study, December 2002.

    Google Scholar 

  41. Karjoth G, Schunter M, and Waidner M. Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. 2nd Workshop on Privacy Enhancing Technologies, April 2002.

    Google Scholar 

  42. Cui W, Duan Y, and Wei K. Toward Trustworthy Ubiquitous Computing Environments. CS261 Class Project Report, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Fall 2002.

    Google Scholar 

  43. Ferraiolo D and Kuhn R. Role-based Access Control. 15th NIST-NCSC National Computer Security Conference, 1992.

    Google Scholar 

  44. Altenschmidt C, Biskup J, Flegel U, and Karabulut Y Secure Mediation: Requirements, Design and Architecture. Journal of Computer Security, 2003:11:3.

    Google Scholar 

  45. Goecks J and Mynatt E: Enabling Privacy Management in Ubiquitous Computing Environments through Trust and Reputation Systems. Computer Supported Cooperative Work (CSCS 2002 Workshop in Privacy in Digital Environments: Empowering Users), 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this chapter

Cite this chapter

Soppera, A., Burbridge, T. (2006). Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-based Services. In: Steventon, A., Wright, S. (eds) Intelligent Spaces. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84628-429-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-429-8_11

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-002-3

  • Online ISBN: 978-1-84628-429-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics