A Study on Context Services Model with Location Privacy

  • Hoon Ko
  • Goreti Marreiros
  • Zita Vale
  • Jongmyung Choi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6908)


A lot of smart context-aware services would be adopting location information as context information. However, the location information is also very important information to be protected for users’ privacy, security, and safety. In this paper, we propose One Time Password (OTP) in the communication between users’ devices and network devices such as APs. By using this approach, APs does not keep user specific information but OTP values, so that attackers cannot get user information even though they access to the log files in APs. We also introduce context-aware service scenario and context information for the service.


Context-Aware Context-Services Location Privacy OTP (One Time Password) Security 


  1. 1.
    Krumm, J.: A survey of computational location privacy. Pervasive Ubiquitous Computing (13), 391–399 (2009)Google Scholar
  2. 2.
    Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005, pp. 111–119 (2005)Google Scholar
  3. 3.
    Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social Networks and Context-Aware Spam. In: CSCW 2008, San Diego, California, USA, November 8-12 (2008)Google Scholar
  4. 4.
    Dey, A.K.: Understanding and Using Context. Journal Personal and Ubiquitous Computing 5(1), 4–7 (2001)CrossRefGoogle Scholar
  5. 5.
    Sadok, D.H., Souto, E., Feitosa, E., Kelner, J., Westberg, L.: RIP-A robust IP access architecture. Computer & Security, 1–22 (February 2009)Google Scholar
  6. 6.
    Yoneki, E.: Evolution of Ubiquitous computing with Sensor Networks in Urban Environments. In: Ubiquitous Computing Conference, Metapolis and Urban Life Workshop Proceedings, pp. 56–59 (September 2005)Google Scholar
  7. 7.
    Fetzer, A.: Recontextualizing context. In: Proceedings of Context Organiser Workshop, Manchester, UK, April 9-1 (1997)Google Scholar
  8. 8.
    Pieters, W.: Representing Humans in System Security Models: An Actor-Network Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 75–92 (2011)Google Scholar
  9. 9.
    Nobles, P., Ali, S., Chivers, H.: Improved Estimation of Trilateration Distances for Indoor Wireless, Intrusion Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 93–102 (2011)Google Scholar
  10. 10.
    Bunt, H.: Context and aialogue control. In: Proceedings of CONTEX 1997 (1997)Google Scholar
  11. 11.
    Connolly, J.H.: Context in the study of human languages and computer programming languages: A comparison. In: Akman, V., Bouquet, P., Thomason, R.H., Young, R.A. (eds.) CONTEXT 2001. LNCS (LNAI), vol. 2116, p. 116. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Coutaz, J., Rey, G.: Recovering foundations for a theory of contextors. Presentation delivered at the 4th International Conference on Computer-Aided Design of User Interfaces, Valenciennes, France (May 2002)Google Scholar
  13. 13.
  14. 14.
  15. 15.
    Choi, J.: jContext: A Toolkit for Context-aware Systems Using Java Reflection and Method Overloading. Journal of KIISE (April 2011) (submitted, in Korean)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Hoon Ko
    • 1
  • Goreti Marreiros
    • 1
  • Zita Vale
    • 1
  • Jongmyung Choi
    • 2
  1. 1.Institute of Engineering Polytechnic of PortoGECADPortoPortugal
  2. 2.Mokpo National UniversityMuangunS. Korea

Personalised recommendations