Abstract
Ubiquitous computing is quickly becoming mainstream technology and one “killer app” in the field is that it makes unprecedented amounts of data available for data mining purposes. Advanced knowledge discovery techniques make it possible to create detailed profiles of individuals by combining and enriching data collected from a variety of different anonymous data sources. Access to this kind of data may itself become a key driving factor of large-scale ubiquitous computing deployment efforts in the future. Here, a proposal for a set of criteria and enabling technologies for creating low-cost, privacy-preserving grassroots-driven ubiquitous computing applications and infrastructures is outlined. Further, it is argued that a empowered community dedicated to the creation of a privacy-preserving ubiquitous computing ecology might act as a strong-enough counter-force against large-scale industrial deployments that intend to capitalize on this emerging, and potentially fertile market. Additionally, some early results from a real-life deployment of a network of public displays, which implements some of these principles, is also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Langheinrich, M.: Privacy in Ubiquitous Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals, 1st edn. Chapman & Hall/CRC (2010)
Solove, D.J.: The Virtues of Knowing Less: Justifying Privacy Protections Against Disclosure. Duke Law Journal 53, 967 (2003)
Weiser, M.: The Computer for the 21st Century- Scientific American Special Issue on Communications, Computers, and Networks (September 1991)
Agrawal, R., Imieliński, T., Swami, A.: Mining association rules between sets of items in large databases. SIGMOD Rec. 22(2), 207–216 (1993), doi:10.1145/170036.170072
Taipale, K.A.: Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data. Columbia Science and Technology Law Review 5(2) (December 2003)
Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond concern: Understanding net users’ attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs-Research (April 1999)
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1), 50–57 (2004)
Stallman, R.M.: Free Software, Free Society: Selected Essays of Richard M. Stallman, 2nd edn. GNU Press, Boston (2010); ISBN 978-0-9831592-0-9
von Hippel, E.: Democratizing Innovation. MIT Press (2005)
Ojala, T., Kukka, H., Lindén, T., Heikkinen, T., Jurmu, M., Hosio, S., Kruger, F.: UBI-Hotspot 1.0: Large-Scale Long-Term Deployment of Interactive Public Displays in a City Center. In: Fifth International Conference on Internet and Web Applications and Services (ICIW), pp. 285–294 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lindén, T. (2012). A Conceptual Framework for Enabling Community-Driven Extensible, Open and Privacy-Preserving Ubiquitous Computing Networks. In: Rautiainen, M., et al. Grid and Pervasive Computing Workshops. GPC 2011. Lecture Notes in Computer Science, vol 7096. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27916-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-27916-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27915-7
Online ISBN: 978-3-642-27916-4
eBook Packages: Computer ScienceComputer Science (R0)