Skip to main content

Methods for Privacy Protection Considering Status of Service Provider and User Community

  • Conference paper
Information Security Technology for Applications (NordSec 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7161))

Included in the following conference series:

  • 1740 Accesses

Abstract

Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. That becomes serious especially when a user receives user centric services from a service provider by offering personal information, because the service can be of a higher quality if the user provides more personal information despite the increase of privacy violation risk. Therefore, this paper proposes a privacy protection method that realizes avoidance of unwanted information disclosure by controlling disclosable attributes according to the results from monitoring two elements: user background information of the provider and user community status. The monitoring is done before disclosing individual attributes corresponding to the privacy policy (i.e., the required anonymity level) by each user. The validity of the proposed methods was confirmed by a desk model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yamabe, T., Fujinami, K., Shoji, T., Nakamura, N., Nakajima, T.: PENATES: Privacy Protection Architecture for Context-Aware Environments. In: Computer Symposium, Tokyo, pp. 55–64 (2004)

    Google Scholar 

  2. Tamaru, S., Iwaya, A., Takashio, K., Tokuda, H.: An application Framework for Personalized Public Space Considering Privacy. IPSJ report in Japan, pp. 49–56, 2003-OS-93

    Google Scholar 

  3. Miyamoto, T., Takeuchi, T., Okuda, T., Harumoto, K., Ariyoshi, Y., Shimojo, S.: Proposal for profile control mechanism considering privacy and quality of personalization services. In: DEWS 2005, Japan, 6-A-01 (2005)

    Google Scholar 

  4. Imada, M., Takasugi, K., Ohta, M., Koyanagi, K.: LOOM: A Loosely managed privacy protection method for ubiquitous networking environments. IEICE Journal B in Japan J88-B(3), 563–573 (2005)

    Google Scholar 

  5. Nakanishi, K., Takashio, K., Tokuda, H.: A concept of location anonymization. IPSJ Journal in Japan 46(9), 2260–2268 (2005)

    Google Scholar 

  6. Hirotaka, N., Nobuhiro, N.: Service platform for privacy Controllable Tag. IPSJ report in Japan, 2007-UBI-16, pp. 57–63 (2007)

    Google Scholar 

  7. Sanda, T., Yamada, S., Kamioka, E.: Proposal for a method of privacy protection in ubiquitous computing environments. IPSJ Journal in Japan 2003(93(MLB-26)), 45–51 (2003)

    Google Scholar 

  8. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Myles, G., Friday, A., Davies, N.: Protection Privacy in environments with location-based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  10. Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based System 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  11. Pareschi, L., Riboni, D., Bettini, C.: Protecting users’ anonymity in pervasive computing environments. In: Sixth Annual IEEE International Conf. on Per. Com. and Communications, pp. 11–19 (2008)

    Google Scholar 

  12. Hong J. I., Landy, J.A.: An architecture for privacy-sensitive ubiquitous computing. In MobiSYS 2004, Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services, pp. 177–189 (2004)

    Google Scholar 

  13. Sato, K.: Life-log: About the Profit Use of the Cellular Phone Behavional Data that Considers the Privacy Protection. IPSJ Magazine in Japan 50(7), 598–602 (2009)

    Google Scholar 

  14. P3P, http://www.w3.org/P3P/

  15. Seigneur, J.-M., Jensen, C.D.: Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 93–107. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Matsuo, Y., Tomobe, H., Hasida, K., Nakajima, H., Ishizuka, M.: Social Network Extraction from the Web information. JSAI Journal in Japan 20, 46–56 (2005)

    Google Scholar 

  17. ArtiSoc, http://mas.kke.co.jp/

  18. Hamamoto, K., Tahara, Y., Ohsuga, A.: Proposal for Profile Opening Method Considering Privacy by Anonymization. In: JWEIN 2010 Symposium in Japan, Proceeding 2010 (August 2010)

    Google Scholar 

  19. Kato, Y., Hasegawa, T.: Effect of Advanced Demand Signals scheme. In: IEEE VTS 54th Vehicular Technology Conference, VTC 2001 Fall, pp. 708–712 (2002)

    Google Scholar 

  20. Kaneda, T.: Kozo Keikaku Engineering Inc., Nagoya-Ins.of Tech. Univ.: Pedestrian Simulation by Artisoc, Japan, pp. 79–114 (2010) ISBN 978-4-904701-17-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hamamoto, K., Tahara, Y., Ohsuga, A. (2012). Methods for Privacy Protection Considering Status of Service Provider and User Community. In: Laud, P. (eds) Information Security Technology for Applications. NordSec 2011. Lecture Notes in Computer Science, vol 7161. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29615-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29615-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29614-7

  • Online ISBN: 978-3-642-29615-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics