Abstract
Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint. However, high quality and quantity of data enable smartness for the AmI, while less and coarse data benefit privacy. This raises a very important problem to the AmI, that is, how to balance the smartness and privacy requirements in an ambient world. In this article, we propose to give to donors the control over the life cycle of their context data, so that users themselves can balance their needs and wishes in terms of smartness and privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. Technical Report 92.1, ORL, 24a Trumpington Street, Cambridge CB2 1QA (1992)
Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
Little, L., Briggs, P.: Tumult and turmoil: privacy in an ambient world. In: Workshop on Privacy, Trust and Identity Issues for Ambient Intelligence (Pervasive 2006) (2006)
W3C: Platform for privacy preferences (P3P) project (2005), http://www.w3.org/P3P/
Byun, J.W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability. Vision paper CERIAS Tech Report 2005-25, Center for Education and Research in Information Assurance and Security, West Lafayette, IN 47907-2086 (2005)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: 28th Int’l Conf. on Very Large Databases (VLDB), Hong Kong (2002)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177–189. ACM Press, New York (2004)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 557–570 (2002)
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: CLDB (2006)
Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363–385. Springer, Heidelberg (2005)
Xiao, X., Tao, Y.: Personalized privacy preservation. In: ACM Conference on Management of Data (SIGMOD) (2006)
Doom, C.: Get smart: How intelligent technology will enhance our world. Technical report, Computer Sciences Corporation: Leading Edge Forum (2001), A report available from: www.csc.com
Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting life-cycle privacy policies in a context database. Technical Report TR-CTIT-06-03, University of Twente, P.O. Box 217 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
van Heerde, H., Anciaux, N., Feng, L., Apers, P.M.G. (2006). Balancing Smartness and Privacy for the Ambient Intelligence. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds) Smart Sensing and Context. EuroSSC 2006. Lecture Notes in Computer Science, vol 4272. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11907503_26
Download citation
DOI: https://doi.org/10.1007/11907503_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47842-3
Online ISBN: 978-3-540-47845-4
eBook Packages: Computer ScienceComputer Science (R0)