Advertisement

Privacy & Trust in Ambient Intelligence Environments

  • B. KöningsEmail author
  • B. Wiedersheim
  • M. Weber
Chapter

Abstract

Privacy and trust are critical factors for the acceptance and success of next generation ambient intelligence environments. Those environments often act autonomously to support a user’s activity based on context information gathered from ubiquitous sensors. The autonomous nature, their accessibility to large amounts of personal information, and the fact that actuators and sensors are invisibly embedded in such environments, raise several privacy issues for participants. Those issues need to be addressed by adequate mechanisms for privacy protection and trust establishment. In this chapter, we provide an overview of existing privacy enhancing technologies (PETs) in the area of ambient intelligence environments and present the ATRACO approach to achieve privacy within those environments. Further, we will discuss how computational trust mechanisms and social trust aspects can be utilized to support privacy protection and the establishment of trust between system components and between the system and participants. After describing the integration of these mechanisms in the overall system architecture of ATRACO, we conclude by giving an outlook on future directions in this area.

Keywords

Ubiquitous Computing Privacy Protection Social Trust Trust Manager Location Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, p. 9 pp. vol.1 (2000). DOI  10.1109/HICSS.2000.926814. URL  10.1109/HICSS.2000.926814
  2. 2.
    Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proc. of the 10th Intl. Conference on Information and Knowledge Management, pp. 310–317. ACM, Atlanta, Georgia, USA (2001). DOI  10.1145/502585.502638. URL http://portal. acm.org/citation.cfm?id=502638
  3. 3.
    An, X., Jutla, D., Cercone, N.: A bayesian network approach to detecting privacy intrusion. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 73–76. IEEE Computer Society (2006)Google Scholar
  4. 4.
    Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Tech. rep., W3C (2003). URL http://www.w3.org/ Submission/2003/SUBM-EPAL-20031110/
  5. 5.
    Aztiria, A., Izaguirre, A., Augusto, J.C.: Learning patterns in ambient intelligence environments: a survey. Artificial Intelligence Review 34(1), 35–51 (2010). DOI 10.1007/ s10462-010-9160-3CrossRefGoogle Scholar
  6. 6.
    Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work, pp. 77–92. Kluwer Academic Publishers, Milan, Italy (1993)Google Scholar
  7. 7.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46–55 (2003). DOI  10.1109/MPRV.2003.1186725 CrossRefGoogle Scholar
  8. 8.
    Bhattacharya, J., Dass, R., Kapoor, V., Gupta, S.: Utilizing network features for privacy violation detection. In: Proc. of the 1st Intl. Conference on Communication System Software and Middleware, pp. 1–10 (2006). DOI  10.1109/COMSWA.2006.1665184
  9. 9.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. Tech. rep., Certer for Discrete Mathematics \& Theoretical Computer Science (1996)Google Scholar
  10. 10.
    Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the PolicyMaker trust management system. In: Financial Cryptography, Lecture Notes in Computer Science, vol. 1465, pp. 1439–1456. Springer (1998)Google Scholar
  11. 11.
    Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In: Ambient Intelligence, p. 5–29. Springer, Berlin (2005)Google Scholar
  12. 12.
    Bok, S.: Secrets: On the Ethics of Concealment and Revelation. Vintage (1989)Google Scholar
  13. 13.
    Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: In Proc. of the Semantic Web Policy Workshop. Galway, Ireland (2005)Google Scholar
  14. 14.
    Canadian law: Personal information protection and electronic documents act (PIPEDA) (2000). URL http://laws.justice.gc.ca/eng/P-8.6/
  15. 15.
    Carbo, J., Molina, J.M., Davila, J.: Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12(1), 135–155 (2003)CrossRefGoogle Scholar
  16. 16.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981). DOI  10.1145/358549.358563 CrossRefGoogle Scholar
  17. 17.
    Chopra, K.,Wallace,W.: Trust in electronic environments. In: Proc. of the 36th Annual Hawaii Intl. Conference on System Sciences, p. 10 pp. (2003). DOI  10.1109/HICSS.2003.1174902
  18. 18.
    Cook, D.J., Augusto, J.C., Jakkula, V.R.: Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5(4), 277–298 (2009)CrossRefGoogle Scholar
  19. 19.
    Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M.: The platform for privacy preferences 1.1 (P3P1.1) specification. Tech. rep., W3C (2006). URL http://www.w3.org/TR/2006/NOTE-P3P11-20061113/
  20. 20.
    Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. Pervasive Computing pp. 152–170 (2005)Google Scholar
  21. 21.
    Duckham, M., Kulik, L.: Location privacy and location-aware computing. Dynamic & Mobile GIS: Investigating Change in Space and Time pp. 34–51 (2006)Google Scholar
  22. 22.
    EPIC, Privacy International: Privacy and Human Rights Report 2006: An International Survey of Privacy Laws and Developments, 2006 edn. Electronic Privacy Information Center (2007)Google Scholar
  23. 23.
    EU: 95/46/EC-Data protection directive. Official Journal of the European Communities (1995)Google Scholar
  24. 24.
    Gambetta, D.: Can we trust trust? In: Trust: Making and Breaking Cooperative Relations, electronic edition edn., pp. 213–237. Blackwell Publishers, Department of Sociology, University of Oxford (2000)Google Scholar
  25. 25.
    Gerck, E.: Overview of certification systems: X. 509, PKIX, CA, PGP & SKIP. The Bell 1(3),Google Scholar
  26. 26.
  27. 27.
    Godik, S., Anderson, A., Parducci, B., Humenn, P., Vajjhala, S.: OASIS eXtensible access control 2 markup language (XACML) 3. Tech. rep., OASIS (2002)Google Scholar
  28. 28.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4) (2000)Google Scholar
  29. 29.
    Gruteser, M., Grunwald, D.: Anonymous usage of Location-Based services through spatial and temporal cloaking. In: Proceedings of the 1st Intl. Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM, San Francisco, CA (2003)Google Scholar
  30. 30.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. of the 2nd Intl. Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM, Boston, USA (2004)Google Scholar
  31. 31.
    Jiang, X., Hong, J., Landay, J.: Approximate information flows: Socially-Based modeling of privacy in ubiquitous computing. In: Proc. of the 4th Intl. Conference on Ubiquitous Computing, pp. 176–193. Springer (2002)Google Scholar
  32. 32.
    Jusang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  33. 33.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: 12th Intl. World Wide Web Conference. Budapest, Hungary (2003)Google Scholar
  34. 34.
    Konings, B., Schaub, F., Kargl, F., Weber, M.: Towards territorial privacy in smart environments. In: Intelligent Information Privacy Management Symposium (Privacy 2010). Stanford University, USA (2010)Google Scholar
  35. 35.
    Krukow, K., Nielsen, M., Sassone, V.: Trust models in ubiquitous computing. Philosophical Transactions of the Royal Society A 366, 3781–3793 (2008)MathSciNetzbMATHCrossRefGoogle Scholar
  36. 36.
    Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2008). DOI  10.1007/s00779-008-0212-5 CrossRefGoogle Scholar
  37. 37.
    Langheinrich, M.: Privacy by design - principles of Privacy-Aware ubiquitous systems. In: Proc. of the 3rd Intl. Conference on Ubiquitous Computing, pp. 273–291. Springer, London, UK (2001)Google Scholar
  38. 38.
    Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Proc. of the 4th Intl. Conference on Ubiquitous Computing, pp. 237–245. Springer, London, UK (2002)Google Scholar
  39. 39.
    Langheinrich, M.: Privacy in ubiquitous computing. In: J. Krumm (ed.) Ubiquitous Computing Fundamentals, 1 edn. Chapman & Hall/CRC (2009)Google Scholar
  40. 40.
    Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pp. 114–130 (2002). DOI  10.1109/SECPRI.2002.1004366. URL  10.1109/SECPRI.2002.1004366
  41. 41.
    Lund, M.S., Solhaug, B., Stolen, K.: Evolution in relation to risk and trust management. Computer 43(5), 49–55 (2010)CrossRefGoogle Scholar
  42. 42.
    Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, University of Stirling (1994)Google Scholar
  43. 43.
    McKnight, D.H., Chervany, N.: Trust and distrust definitions: One bite at a time. Trust in Cyber-societies pp. 27–54 (2001)Google Scholar
  44. 44.
    Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-Aware Role-Based access control. Security & Privacy, IEEE 7(4), 35–43 (2009). DOI  10.1109/MSP.2009.102 CrossRefGoogle Scholar
  45. 45.
    OECD: Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing (1980)Google Scholar
  46. 46.
    Ortmann, S., Langendorfer, P., Maaser, M.: Enhancing privacy by applying information flow modelling in pervasive systems. In: On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM’07, pp. 794–803. Springer-Verlag (2007)Google Scholar
  47. 47.
    Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. Trust Management 2995, 108–119 (2004)CrossRefGoogle Scholar
  48. 48.
    Perlman, R.: An overview of PKI trust models. IEEE network 13(6), 38–43 (1999)CrossRefGoogle Scholar
  49. 49.
    Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24(1), 33–60 (2005). URL http://www.springerlink.com/ content/rw03811201223550/Google Scholar
  50. 50.
    Schillo, M., Funk, P., Rovatsos, M.: Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence 14(8), 825–848 (2000)CrossRefGoogle Scholar
  51. 51.
    Seigneur, J., Jensen, C.D.: Trading privacy for trust. In: C. Jensen, S. Poslad, T. Dimitrakos (eds.) Trust Management, Lecture Notes in Computer Science, vol. 2995, pp. 93–107. Springer Berlin / Heidelberg (2004)Google Scholar
  52. 52.
    Sierra, C., Debenham, J.: An information-based model for trust. In: Proc. of the 4th Intl. joint Conference on Autonomous Agents and Multiagent Systems, pp. 497–504. ACM, New York, NY, USA (2005)Google Scholar
  53. 53.
    Smetters, D.K., Good, N.: How users use access control. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 1–12. ACM, Mountain View, CA (2009)Google Scholar
  54. 54.
    Smith, R.E.: Ben Franklin’s web site: privacy and curiosity from Plymouth Rock to the internet. Privacy Journal (2000)Google Scholar
  55. 55.
    Solhaug, B., Elgesem, D., Stolen, K.: Why trust is not proportional to risk. In: Proc. of the 2nd Intl. Conference on Availability, Reliability and Security, pp. 11–18 (2007). DOI 10.1109/ ARES.2007.161Google Scholar
  56. 56.
    Solove, D.J.: Understanding Privacy. Harvard University Press (2008)Google Scholar
  57. 57.
    Song, S., Hwang, K., Zhou, R., Kwok, Y.K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24–34 (2005)CrossRefGoogle Scholar
  58. 58.
    Steinbrecher, S.: Design options for privacy-respecting reputation systems within centralised internet communities. Security and Privacy in Dynamic Environments 201, 123–134 (2006) 58. The Oxford English Dictionary: "Privacy" Definition, 2 edn. Oxford University Press, USA (2005)Google Scholar
  59. 59.
    Warren, S., Brandeis, L.: Right to privacy. Harvard Law Review 4, 193–220 (1890)CrossRefGoogle Scholar
  60. 60.
    Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM 36(7), 75–84 (1993). DOI  10.1145/159544.159617 CrossRefGoogle Scholar
  61. 61.
    Westin, A.F.: Privacy and Freedom. NY: Atheneum (1967)Google Scholar
  62. 62.
    Wishart, R., Henricksen, K., Indulska, J.: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: Proc. of the 4th Intl. Conference on Ubiquitous Intelligence and Computing, vol. 4611, pp. 929–940. Hong Kong, China (2007)Google Scholar
  63. 63.
    Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering, IEEE Transactions on 16(7), 843–857 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Institute of Media InformaticsUlm UniversityUlmGermany

Personalised recommendations