Advertisement

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems

  • Ali Dehghantanha
  • Nur Izura Udzir
  • Ramlan Mahmod
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)

Abstract

The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present the evaluation of a XML based User-centered Privacy Model (UPM) and measure this model unobtrusiveness and discuss privacy policies’ expressiveness, and user control over private information. We show that the model provides content, identity, location, and time privacy with low unobtrusiveness while privacy policies are highly expressive and support mandatory and discretionary rules, context sensitivity, uncertainty handling, and conflict resolution.

Keywords

Privacy Pervasive Computing Privacy Evaluation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ranganathan, A., Al-Muhtadi, J., Biehl, J., Ziebart, B., Campbell, R.H., Bailey, B.: Towards a pervasive computing benchmark. In: 3rd International Conf. on Pervasive Computing and Communications Workshop, pp. 194–198 (2005)Google Scholar
  2. 2.
    Bhaskar, P., Sheikh, S.I.: Privacyin Pervasive Computing and Open Issues. In: International Conference on Availability, Reliability, and Security, pp. 110–118 (2007)Google Scholar
  3. 3.
    Cheng, H.S., Zhang, D., Tan, J.G.: Protection of Privacy in Pervasive Computing Environments. In: International Conference on Information Technology: Coding and Computing, pp. 242–247 (2005)Google Scholar
  4. 4.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(2), 40–46 (2003)CrossRefGoogle Scholar
  5. 5.
    Beresford, A.R., Stajano, F.: Mix Zones- User Privacy in Location-aware Services. In: International Workshop on Pervasive Computing and Communication Security. IEEE, Los Alamitos (2004)Google Scholar
  6. 6.
    Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)CrossRefGoogle Scholar
  7. 7.
    Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mikunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Proceeding of International Symposium on Software Security (2002)Google Scholar
  8. 8.
    Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Ubicomp, pp.72-74 (2006)Google Scholar
  9. 9.
    Myles, G., Firday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2(1), 56–64 (2003)CrossRefGoogle Scholar
  10. 10.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  11. 11.
    Tentori, M., Favela, M.J., Rodriguez, D., Gonzalez, V.M.: Supporting Quality of Privacy (QoP) in Pervasive Computing. In: Mexican International Conference on Computer Science, pp. 58–67 (2005)Google Scholar
  12. 12.
    Dehghantanha, A., Mahmod, R., Udzir, N.: A XML based, User-centered Privacy Model in Pervasive Computing Systems. International Journal of Computer Science and Networking Security 9(10), 167–173 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ali Dehghantanha
    • 1
  • Nur Izura Udzir
    • 2
  • Ramlan Mahmod
    • 2
  1. 1.Faculty of Computing and TechnologyAsia-Pacific University College of Technology and InnovationKuala LumpurMalaysia
  2. 2.Faculty of Computer Science and Information TechnologyUniversity of Putra MalaysiaKuala LumpurMalaysia

Personalised recommendations