Advertisement

Privacy Sensitive Location Information Systems in Smart Buildings

  • Jodie P. Boyer
  • Kaijun Tan
  • Carl A. Gunter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)

Abstract

Increasing automation of buildings enables rich information streams about the activities of building users to reach networked computer systems. Privacy concerns typically cause this information to be accessible only by building managers and security personnel. However, if appropriate privacy mechanisms can be implemented, then it is possible to deploy location information systems that can contribute to the convenience and efficiency of users. This paper describes a three step approach to privacy-sensitive release of location information collected by building sensors. These steps entail defining an ownership model, defining environment events to be monitored, and creating a sharing model. These steps are described mathematically and then validated through a case study for a system called Janus’s Map which provides a location information system for the card reader, door, and occupancy sensors of a modern smart building.

Keywords

Global Position System System Event Privacy Policy Location Privacy Card Reader 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    The European Parliment and the Council of the European Union: Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)Google Scholar
  2. 2.
    108th Congress: HR 71: The wireless privacy protection act. In: United States House of Representatives (2003-2004)Google Scholar
  3. 3.
    Getting, I.A.: The global positioning system. IEEE Spectrum 30, 36–47 (1993)CrossRefGoogle Scholar
  4. 4.
    Want, R., Hopper, A., Falcão, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10, 91–102 (1992)CrossRefGoogle Scholar
  5. 5.
    Ward, A., Jones, A., Hopper, A.: A new location technique for the active office. IEEE Personnel Communications 4, 42–47 (1997)CrossRefGoogle Scholar
  6. 6.
    Castro, P., Chiu, P., Kremenek, T., Muntz, R.R.: A probabilistic room location service for wireless networked environments. In: UbiComp 2001: Proceedings of the 3rd international conference on Ubiquitous Computing, pp. 18–34. Springer, London (2001)CrossRefGoogle Scholar
  7. 7.
    Görlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing (2004)Google Scholar
  8. 8.
    Graubart, R.: On the need for a third form of access control. In: Proceedings of the 12th National Computing Security Conference, pp. 296–303 (1989)Google Scholar
  9. 9.
    Gunter, C.A., May, M.J., Stubblebine, S.: A formal privacy system and its application to location based services. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 256–282. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Snekkenes, E.: Concepts for personal location privacy policies. In: ACM Conference on Electronic Commerce (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jodie P. Boyer
    • 1
  • Kaijun Tan
    • 1
  • Carl A. Gunter
    • 1
  1. 1.Department of Computer ScienceUniversity of Illinois at Urbana-ChampaignUrbanaUSA

Personalised recommendations