Advertisement

Dynamic Privacy Management in Pervasive Sensor Networks

  • Nan-Wei Gong
  • Mathew Laibowitz
  • Joseph A. Paradiso
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6439)

Abstract

This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people’s daily social space. A user study was then conducted to evaluate several privacy management approaches – an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

Keywords

dynamic privacy management ubiquitous computing active badge system pervasive sensor networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Davies, N., Gellersen, H.-W.: Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEE Pervasive Computing 1(1), 26–35 (2002)CrossRefGoogle Scholar
  2. 2.
    Gong, N.-W., Laibowitz, M., Paradiso, J.A.: Experiences and Challenges in Deploying Potentially Invasive Sensor Systems for Ubiquitous VR Applications. In: Cloud-Mobile Convergence for Virtual Reality Workshop (CMCVR 2010), Waltham, MA, March 20 (2010)Google Scholar
  3. 3.
    Lifton, J., Laibowitz, M., Harry, D., Gong, N.W., Mittal, M., Paradiso, J.A.: Metaphor and Manifestation – Cross Reality with Ubiquitous Sensor/Actuator Networks. IEEE Pervasive Computing Magazine 8(3), 24–33 (2009)CrossRefGoogle Scholar
  4. 4.
    Laibowitz, M., Gong, N.-W., Paradiso, J.A.: Wearable sensing for dynamic management of dense ubiquitous media. In: Proceedings of 6th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2009), Berkeley, CA, June 3-9, pp. 3–8 (2009)Google Scholar
  5. 5.
    Laibowitz, M., Gong, N.-W., Paradiso, J.A.: Multimedia Content Creation using Societal-Scale Ubiquitous Camera Networks and Human-Centric Wearable Sensing. In: Proc. of ACM Multimedia 2010, Florence Italy, October 25-29 (2010)Google Scholar
  6. 6.
    Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the 3rd European Conference on Computer-Supported Cooperative Work (ECSCW 1993), pp. 77–92. Kluwer Academic Publishers, Norwell (1993)Google Scholar
  7. 7.
    Lindley, S.E., Harper, R., Sellen, A.: Design of a Technological Playground: A Field Study of the Emergence of Play in Household Messaging. In: Proc. of CHI 2010, Atlanta, GA, April 10-15, pp. 2351–2360 (2010)Google Scholar
  8. 8.
    Hong, J.I., Landay, J.A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: Proceedings of MobiSys 2004, Boston, MA, June 6-9, pp. 177–189 (2004)Google Scholar
  9. 9.
    Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Zhang, W., Cheung, S.-C.S., Chen, M.: Hiding privacy information in video surveillance system. In: Proc. of ICIP 2005, Genova, Italy, September 11-14, vol. II, pp. 868–871 (2005)Google Scholar
  11. 11.
    Schiff, J., Meingast, M., Mulligan, D., Sastry, S., Goldberg, K.: Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In: International Conference on Intelligent Robots and Systems (IROS), October 29-November 2, pp. 971–978 (2007)Google Scholar
  12. 12.
    Kindberg, T., Fox, A.: System Software for Ubiquitous Computing. IEEE Pervasive Computing 1(1), 70–81 (2002)CrossRefGoogle Scholar
  13. 13.
    Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  14. 14.
    Ortmann, S., Langendörfer, P., Maaser, M.: A Self-Configuring Privacy Management Architecture for Pervasive Systems. In: Proc. of the 5th ACM International Workshop on Mobility Management and Wireless Access (MOBIWAC), Chania, Crete Island, Greece, October 22, pp. 184–187 (2007)Google Scholar
  15. 15.
    Moncrieff, S., Venkatesh, S., Andwest, G.: Dynamic privacy in a smart house Environment. In: Proceedings of the IEEE International Conference on Multimedia and Expo, July 2-5, pp. 2034–2037. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  16. 16.
    Gisch, M., De Luca, A., Blanchebarbe, M.: The Privacy Badge - A Privacy-Awareness User Interface for Small Devices. In: ACM International Conference On Mobile Technology, Applications, And Systems, Singapore, September 10-12, pp. 583–586 (2007)Google Scholar
  17. 17.
    Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6), 401–412 (2009)CrossRefGoogle Scholar
  18. 18.
    Reynolds, C.J., Wren, C.R.: Worse is better for ambient sensing. Workshop on Privacy Trust and Identity Issues for Ambient Intelligence (Pervasive 2006), Technical Report TR2006-005, Mitsubishi Electric Research Laboratories (MERL) (May 2006)Google Scholar
  19. 19.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  20. 20.
    Gong, N.-W.: Configurable Dynamic Privacy for Pervasive Sensor Networks, MS thesis, MIT Media Laboratory (2009)Google Scholar
  21. 21.
    Wickramasuriya, J., Alhazzazi, M., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy-Protecting Video Surveillance. In: Proc. of the SPIE International Symposium on Electronic Imaging (Real-Time Imaging IX), San Jose, CA, February 25, pp. 64–75 (2005)Google Scholar
  22. 22.
    Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, New York (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Nan-Wei Gong
    • 1
  • Mathew Laibowitz
    • 1
  • Joseph A. Paradiso
    • 1
  1. 1.Responsive Environments GroupMIT Media LaboratoryCambridgeUSA

Personalised recommendations