Advertisement

Balancing Smartness and Privacy for the Ambient Intelligence

  • Harold van Heerde
  • Nicolas Anciaux
  • Ling Feng
  • Peter M. G. Apers
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4272)

Abstract

Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint. However, high quality and quantity of data enable smartness for the AmI, while less and coarse data benefit privacy. This raises a very important problem to the AmI, that is, how to balance the smartness and privacy requirements in an ambient world. In this article, we propose to give to donors the control over the life cycle of their context data, so that users themselves can balance their needs and wishes in terms of smartness and privacy.

Keywords

Context Data Ambient Intelligence Privacy Requirement Query Service Coarse Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. Technical Report 92.1, ORL, 24a Trumpington Street, Cambridge CB2 1QA (1992)Google Scholar
  3. 3.
    Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Little, L., Briggs, P.: Tumult and turmoil: privacy in an ambient world. In: Workshop on Privacy, Trust and Identity Issues for Ambient Intelligence (Pervasive 2006) (2006)Google Scholar
  5. 5.
    W3C: Platform for privacy preferences (P3P) project (2005), http://www.w3.org/P3P/
  6. 6.
    Byun, J.W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability. Vision paper CERIAS Tech Report 2005-25, Center for Education and Research in Information Assurance and Security, West Lafayette, IN 47907-2086 (2005)Google Scholar
  7. 7.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: 28th Int’l Conf. on Very Large Databases (VLDB), Hong Kong (2002)Google Scholar
  8. 8.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177–189. ACM Press, New York (2004)CrossRefGoogle Scholar
  9. 9.
    Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 557–570 (2002)Google Scholar
  10. 10.
    Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: CLDB (2006)Google Scholar
  11. 11.
    Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363–385. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Xiao, X., Tao, Y.: Personalized privacy preservation. In: ACM Conference on Management of Data (SIGMOD) (2006)Google Scholar
  13. 13.
    Doom, C.: Get smart: How intelligent technology will enhance our world. Technical report, Computer Sciences Corporation: Leading Edge Forum (2001), A report available from: www.csc.com
  14. 14.
    Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting life-cycle privacy policies in a context database. Technical Report TR-CTIT-06-03, University of Twente, P.O. Box 217 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Harold van Heerde
    • 1
  • Nicolas Anciaux
    • 2
  • Ling Feng
    • 1
  • Peter M. G. Apers
    • 1
  1. 1.Centre for Telematics and Information TechnologyUniversity of TwenteThe Netherlands
  2. 2.INRIAFrance

Personalised recommendations