DocumentCode :
3082926
Title :
Privacy Protection in Ubiquitous Computing
Author :
Zhang, Ping ; Fan, Jianping ; Zheng, Weimin
Author_Institution :
Inst. of Comput. Technol., Chinese Acad. of Sci., Beijing, China
fYear :
2010
fDate :
17-19 Sept. 2010
Firstpage :
391
Lastpage :
393
Abstract :
Even though it is hard to define privacy in ubiquitous computing formally, study of privacy protection is now a spotlight of research to accelerate the emergency of ubiquitous computing age. In this paper, IDs assigned by the authority of end user are picked out from sensitive information such as location, time, likings. Service procedure assert, unless under juristic directive, other ID should be used instead. It is ideal to let end users of ubiquitous computing environment decide the level of their privacies required by services, so standardizing schema which depicts services and data requests is the base for end users offer information needed to get expected services with reducing the possibility of exposing who they are. Besides of any progress in preserving sensitive information, clarifying and using potential sensitive information separately from privacy information will do advantage to make services privacy preserving services.
Keywords :
data privacy; security of data; ubiquitous computing; information need; information privacy protection; ubiquitous computing; Aerospace electronics; Computational modeling; Computers; Context; Privacy; Ubiquitous computing; Personalization; Privacy Protection; Schema; Self-identity Service; Ubiquitous Computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4244-8043-2
Electronic_ISBN :
978-0-7695-4180-8
Type :
conf
DOI :
10.1109/PCSPA.2010.100
Filename :
5635629
Link To Document :
بازگشت