Title :
In search of user privacy protection in ubiquitous computing
Author :
Cleveland, Simon
Author_Institution :
Grad. Sch. of Comput. & Inf. Sci., Nova Southeastern Univ., Davie, FL, USA
Abstract :
Participatory applications provide users with value-added and reusable information; however, collection of this information comes at the expense of the participants´ privacy. Preserving the mobile participants´ privacy is a key concern of mobile computing. This paper outlines current participatory application system model, privacy weaknesses, and existing privacy enhancing technologies. Next, it proposes a study to address mobile privacy protection by educating participants of exploitable privacy areas of their participatory applications. The contribution of the paper is two-fold: it provides a review of the existing privacy weaknesses of PS applications and demonstrates that participants´ wanting to know more about these weaknesses warrants further study.
Keywords :
data privacy; mobile computing; mobile computing; mobile privacy protection; participatory application; privacy enhancing technology; privacy weaknesses; reusable information; ubiquitous computing; user privacy protection; value-added information; Data privacy; Mobile communication; Mobile handsets; Privacy; Sensors; Servers; Ubiquitous computing; mobile privacy solutions; participatory sensing applications; privacy technologies; social computing; ubiquitous computing;
Conference_Titel :
Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4673-2282-9
Electronic_ISBN :
978-1-4673-2283-6
DOI :
10.1109/IRI.2012.6303077