DocumentCode :
3401526
Title :
Protecting Users´ Anonymity in Pervasive Computing Environments
Author :
Pareschi, Linda ; Riboni, Daniele ; Bettini, Claudio
Author_Institution :
D.I.Co., Univ. of Milano, Milan
fYear :
2008
fDate :
17-21 March 2008
Firstpage :
11
Lastpage :
19
Abstract :
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this field can still be considered in its infancy. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a set of defense techniques is proposed. These techniques are validated through the use of a simulator and an extensive set of experiments.
Keywords :
data privacy; ubiquitous computing; defense technique; mobile computing; pervasive computing environment; privacy-preserving technology; shadow attack; user anonymity protection; Access control; Biomedical monitoring; Context; Context-aware services; Cryptography; Mobile computing; Pervasive computing; Privacy; Protection; Robust control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-0-7695-3113-7
Type :
conf
DOI :
10.1109/PERCOM.2008.58
Filename :
4517374
Link To Document :
بازگشت