Title :
Privacy Protection in Ubiquitous Computing
Author :
Zhang, Ping ; Fan, Jianping ; Zheng, Weimin
Author_Institution :
Inst. of Comput. Technol., Chinese Acad. of Sci., Beijing, China
Abstract :
Even though it is hard to define privacy in ubiquitous computing formally, study of privacy protection is now a spotlight of research to accelerate the emergency of ubiquitous computing age. In this paper, IDs assigned by the authority of end user are picked out from sensitive information such as location, time, likings. Service procedure assert, unless under juristic directive, other ID should be used instead. It is ideal to let end users of ubiquitous computing environment decide the level of their privacies required by services, so standardizing schema which depicts services and data requests is the base for end users offer information needed to get expected services with reducing the possibility of exposing who they are. Besides of any progress in preserving sensitive information, clarifying and using potential sensitive information separately from privacy information will do advantage to make services privacy preserving services.
Keywords :
data privacy; security of data; ubiquitous computing; information need; information privacy protection; ubiquitous computing; Aerospace electronics; Computational modeling; Computers; Context; Privacy; Ubiquitous computing; Personalization; Privacy Protection; Schema; Self-identity Service; Ubiquitous Computing;
Conference_Titel :
Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4244-8043-2
Electronic_ISBN :
978-0-7695-4180-8
DOI :
10.1109/PCSPA.2010.100