A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

  • Gunhee Lee
  • Song-hwa Chae
  • Inwhan Hwang
  • Manpyo Hong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirement of the sensitive information illegally but also forbidding abuse of the information obtained legally is important to protect user privacy. In order to satisfy this claim, we propose a new privacy-aware service protocol for a ubiquitous computing environment. The proposed protocol decouples the relation between a user’s identity and location. Moreover, it uses anonymous communication channel to hide the user’s service consume pattern.


Location Information Ubiquitous Computing Authentication Protocol Location Privacy Malicious User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Computer 35, 22–26 (2002)Google Scholar
  2. 2.
    Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, Springer, Heidelberg (2002)Google Scholar
  3. 3.
    Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proc. of SACMAT 2004, NewYork, USA, pp. 11–20 (2004)Google Scholar
  4. 4.
    Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy, CERCS Technical Reports, GIT-CERCS-04-15 (2004)Google Scholar
  5. 5.
    Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)Google Scholar
  6. 6.
    Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)CrossRefGoogle Scholar
  7. 7.
    Hong, J., Landay, J.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2004)Google Scholar
  8. 8.
    Díaz, C., Preneel, B.: Taxonomy of Mixes and Dummy Traffic. In: Proc. of I-NetSec 2004: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, Toulouse, France (2004)Google Scholar
  9. 9.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1982)Google Scholar
  10. 10.
    Danezis, G., Dingledine, R., Mathewson, N., Hopwood, D.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy, pp. 2–15 (2003)Google Scholar
  11. 11.
    Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)CrossRefGoogle Scholar
  12. 12.
    Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proc. of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, pp. 91–102 (2002)Google Scholar
  13. 13.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (2004)Google Scholar
  14. 14.
    Garlan, D., Siewiorek, D.P.: Project Aura: Toward Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 22–31 (2002)Google Scholar
  15. 15.
    The OpenSSL Project, http://www.openssl.org/
  16. 16.
    Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity - a proposal for terminology. In: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pp. 1–9 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Gunhee Lee
    • 1
  • Song-hwa Chae
    • 1
  • Inwhan Hwang
    • 1
  • Manpyo Hong
    • 1
  1. 1.Graduate School of Information CommunicationAjou UniversitySuwonKorea

Personalised recommendations