Skip to main content
Log in

Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-Based Services

  • Published:
BT Technology Journal

Abstract

In the near future, everyday objects like cars and home appliances will connect the living environment to information networks. Pervasive computing devices will allow applications to gather and share a large amount of information. This may then open up a market for a large range of new services and applications. With a world densely populated by ‘smart dust’ sensor devices, no single part of our life will be able to escape from digitisation. Soon, sensor networks will be able to track everything from our feelings to our behaviour. Besides the enormous potential value, we can foresee many undesirable uses. In a worst-case scenario, privacy implications, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing. In this paper, we introduce the privacy issues found in the field of pervasive computing in two parts. The first part provides a brief look at the understanding of privacy, factors that can be used to control privacy, and the development of fair information practices and how they relate to the world of pervasive computing. The second part introduces technology that can provide a tool-set to support these fair information practices, and maintain the role of the data subject in the management of their private information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kahn R, Katz H and Pister K: 'Emerging challenges: mobile networking for 'Smart Dust'', J Comm Networks, pp 188-196 (September 2000).

  2. Weiser M: 'The computer for the 21st century', Scientific American, 256, No 3, pp 94-104 (1991).

    Google Scholar 

  3. Krikorian R: 'The Net Comes Home', New Scientist (February 2003).

  4. Overby C S: 'The X Internet and consumer privacy', Forrester Report (December 2003).

  5. Culler D et al: 'TinyOS: an operating system for sensor networks', to appear in Rabaey J (Ed): 'Ambient Intelligence', Springer (2004).

  6. Sarma S E et al: 'Radio-frequency identification: security risks and challenges', RSA CryptoBytes, 6, (2003).

  7. Warren S and Brandeis L: 'The Right to Privacy', Harvard Law Review, IV, No 5 (December 1890).

  8. Westin A: 'Privacy and Freedom', Atheneum, New York (1967).

    Google Scholar 

  9. Laurant C: 'Privacy and human rights: an international survey of privacy laws and developments', Electronic Privacy Information Center, Washington, DC, USA (2003).

    Google Scholar 

  10. Marx G: 'Murky conceptual waters: the private and the public', Ethics and Information Technology (July 2001).

  11. Adams A: 'Multimedia information changes the whole privacy ballgame', Proceedings of Computers, Freedom, and Privacy (2000).

  12. Lederer S: 'Everyday privacy in ubiquitous computing environments', Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, UbiComp (2002).

  13. Lessig L: 'The architecture of privacy', Taiwan Net Conference (1998).

  14. US Privacy Act of 1974-http://www.usdoj.gov/foia/privstat.htm

  15. OECD-Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, (September 1980).

  16. Greenleaf G: 'Australia's APEC privacy initiative: the pros and cons of OECD lite', Privacy Law and Policy Reporter (2003).

  17. OECD-Ministerial Declaration on the Protection of Privacy on Global Networks (October 1998).

  18. Clarke R: 'Beyond the OECD guidelines: privacy protection for the 21st century', (January 2000)-http://www.anu.edu.au/people/ Roger.Clarke/DV/PP21C.html

  19. Justice M K: 'Privacy protection, a new beginning: OECD principles 20 years on', Privacy Law and Policy Reporter (1999).

  20. EU Directive 1995/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (October 1995).

  21. Pfitzmann A and Köhntopp M: 'Anonymity, unobservability, and pseudonymity-a proposal for terminology', Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California (2002).

  22. Juels A: 'Privacy and Authentication in Low-Cost RFID Tags', RSA Laboratories (2003).

  23. Chaum D: 'Untraceable electronic mail, return addresses and digital pseudonyms', Communications of the ACM, 24, No 2, pp 84-90 (1981).

    Google Scholar 

  24. Reiter M K and Rubin A D: 'Crowds: Anonymity for Web Transacti ons', ACM Transacti ons on Information and System Security (1998)

  25. EU Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector, (July 2002).

  26. EU Directive 1997/66/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector, December 1997.

  27. Beresford A and Stajano F: 'Mix zones: user privacy in location-aware services', IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) (2004).

  28. Gruteser M and Grunwald D: 'Anonymous usage of location-based services through spatial and temporal cloaking', ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys) (2003).

  29. Brin D: 'The Transparent Society', Addison-Wesley (1998).

  30. Guerin D: 'Anarchism: From Theory to Practice', Monthly Review Press (1970).

  31. Federal Trade Commission: 'Workshop on the information marketplace: merging and exchanging consumer data', Washington DC (March 2001).

  32. Fred H C: 'Principles for protecting privacy', The Cato Journal (March 2002).

  33. Cranor L et al: 'The Platform for Privacy Preferences 1.0 (P3P 1.0) specification', W3C Recommendation (April 2002)-http:// www.w3.org/TR/2002/REC-P3P-20020416

  34. Pedersen A: 'P3P-problems, progress, potential', Privacy Laws & Business International Newsletter (February 2003).

  35. Thidadeau R: 'A critique of P3P: privacy on the Web', (August 2000)-http://dollar.ecom.cmu.edu/p3pcritique/

  36. Birchman J A: 'Is P3P "The devil"?', Law and the Internet Seminars, University of Miami School of Law (May 1998)-http:// www.law.miami.edu/~froomkin/sem97/birchman.html

  37. Langheinrich M: 'A privacy awareness system for ubiquitous computing environments', 4th International Conference on Ubiquitous Computing (UbiComp) (2002).

  38. Juels A and Brainard J: 'Soft blocking: flexible blocker tags on the cheap', Manuscript (2003)-http://www.rsasecurity.com/rsalabs/ staff/bios/ajuels/publications/softblocker/softblocker.pdf

  39. Casassa-Mont M, Pearson S and Bramhill P: 'Towards accountable management of identity and privacy: sticky policies and enforceable tracing services', IEEE 14th International Workshop on Database and Expert Systems Applications (DEXA'03) (September 2003).

  40. Boneh D and Franklin M: 'Identity-based encryption from the Weil pairing', Crypto (2001).

  41. Tygar D: 'Security with privacy', ISAT 2002 study (December 2002).

  42. Karjoth G, Schunter M and Waidner M: 'Platform for enterprise privacy practices: privacy-enabled management of customer data', 2nd Workshop on Privacy Enhancing Technologies (April 2002).

Download references

Authors

About this article

Cite this article

Soppera, A., Burbridge, T. Maintaining Privacy in Pervasive Computing — Enabling Acceptance of Sensor-Based Services. BT Technology Journal 22, 106–118 (2004). https://doi.org/10.1023/B:BTTJ.0000047125.97546.4a

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:BTTJ.0000047125.97546.4a

Keywords

Navigation