Skip to main content

A Privacy Awareness System for Ubiquitous Computing Environments

  • Conference paper
  • First Online:
UbiComp 2002: Ubiquitous Computing (UbiComp 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2498))

Included in the following conference series:


Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Ronald Bourret. XML-DBMS. Homepage at

  2. David Brin. The Transparent Society. Perseus Books, Reading MA, 1998.

    Google Scholar 

  3. Allen Brown, Barbara Fox, Satoshi Hada, Brian LaMacchia, and Hiroshi Maruyama. SOAPsecurity extensions: Digital signature. See, February 2001.

  4. ContentGuard, Inc. XrML-the extensible rights markup language. See

  5. Lorrie Cranor, Marc Langheinrich, and Massimo Marchiori. A P3P preference exchangelanguage 1.0 (APPEL1.0). See, April 2002.

  6. Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, and Joseph Reagle. The platformfor privacy preferences 1.0 (P3P1.0) specification. W3C Recommendation, HTML Versionat, April 2002.

  7. J.J. Borking et al. Intelligent software agents: Turning a privacy threat into a privacy protector.Available at:,April1999.

  8. Marc Langheinrich. Privacy by design-principles of privacy-aware ubiquitous systems. InProceedings ofUbicomp, pages 273–291. Springer LNCS, September 2001.

    Google Scholar 

  9. NCR Teradata Division. NCR launches first privacy product for the data warehousing industry. Data Warehousing Report, 2(3), October 2000. Article available online at

  10. Mark Stefik. Trusted systems. Scientific American, pages 78–81, March 1997. Also availableonline at

  11. TUDresden. JAP-Java Anomyzing Proxy. Homepage at

  12. Jim Waldo. The Jini Architecture for Network-centric Computing. Communications of the ACM, 42(7):76–82, July 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Langheinrich, M. (2002). A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds) UbiComp 2002: Ubiquitous Computing. UbiComp 2002. Lecture Notes in Computer Science, vol 2498. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44267-7

  • Online ISBN: 978-3-540-45809-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics