Skip to main content

A Generic Privacy Enhancing Technology for Pervasive Computing Environments

  • Conference paper
Trust and Privacy in Digital Business (TrustBus 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4083))

Abstract

Pervasive computing is an emerging computing paradigm, which is expected to be part of our everyday life in the foreseeable future. Despite its huge potential value, one can foresee considerable drawbacks and undesirable potential uses of it in terms of privacy. In specific, the pervasive computing paradigm raises the level of the challenge to protect privacy of end-users, mainly due to the fact that devices operating in such an environment will be embedded in the fabric of the everyday life and will exhibit enhanced tracking and profiling capabilities. What is needed, inter alia, is appropriate mechanisms that are able to evolve with the needs of the users and interact with them in order to meet their privacy requirements. In this paper we suggest the foundations of a new Privacy Enhancing Technology (PET), with respect to the basic characteristics and implications introduced by pervasive environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The computer for the 21st Century. Scientific American 265(3), 94–104 (1991)

    Article  Google Scholar 

  2. National Institute of Standards and Technologies. In: Proc. of the IT Conference on Pervasive Computing (accessed April 2, 2005), http://www.nist.gov/pc2001/about_pervasive.html

  3. Lahlou, S., Langheinrich, M., Rocker, C.: Privacy and trust issues with invisible computers. Com. of the ACM 48(3), 59–60 (2005)

    Article  Google Scholar 

  4. Russell, D., Streitz, N., Winograd, T.: Building disappearing computers. Com. of the ACM 48(3), 42–48 (2005)

    Article  Google Scholar 

  5. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification World Wide Web Consortium (September 2001), www.w3.org/TR/2001/WD-P3P-20010928

  6. A P3P Preference Exchange Language 1.0 (Appel 1.0), Working draft, World Wide Web Consortium (April 2002), www.w3.org/TR/P3P-preferences

  7. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  8. Fisher-Hübner, S.: IT Security and Privacy, Sweden (2001)

    Google Scholar 

  9. Muhtadi, A., Campbell, R., Kapadia, A., Mickunas, M., Yi, S.: Routing through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. of the International Conference on Distributed Computing Systems, Austria (2002)

    Google Scholar 

  10. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Nguyen, D., Mynatt, E.: Privacy Mirrors: Understanding and Shaping Sociotechnical Ubiquitous Computing Systems, Georgia Institute of Technology, Technical Report GIT-GVU-02-16 (2002)

    Google Scholar 

  12. Lederer, S., Dey, A., Mankoff, J.: Everyday Privacy in Ubiquitous Computing Environments. In: Proc. of the 4th International Conference on Ubiquitous Computing (2002)

    Google Scholar 

  13. Jiang, X., Landay, J.: Modelling Privacy Control in Context-aware Systems. IEEE Pervasive Computing, 59–63 (2002)

    Google Scholar 

  14. Blarkom, G., Borking, J., Olk, J.: Handbook of Privacy and Privacy-Enhancing Technologies. The case of Intelligent Software Agents. In: PISA Project Deliverable, The Hague (2003)

    Google Scholar 

  15. Lederer, S., Mankoff, J., Dey, A.: A conceptual model and metaphor of everyday privacy in Ubiquitous Computing, Intel Research, USA (July 2002)

    Google Scholar 

  16. Lessig, L.: The Architecture of Privacy. In: Proc. of the Taiwan NET 1998 Conference, Taipei (March 1998)

    Google Scholar 

  17. Adams, A.: The Implications of Users Privacy Perception on Communication and Information Privacy Policies. In: Proc. of Telecommunications Policy Research Conference, USA (1999)

    Google Scholar 

  18. Balfanz, D., Golle, P., Staddon, J.: Proactive Data Sharing to Enhance Privacy in Ubicomp Environments. In: Proc. of UbiComp 2004 Privacy Workshop, England (2004)

    Google Scholar 

  19. Jensen, C., Tullio, J., Potts, C., Mynatt, E.: STRAP: A Structured Analysis Framework for Privacy, Graphics, Visualization and Usability Center (GVU) Technical Report, Georgia Institute of Technology (January 2005)

    Google Scholar 

  20. Hong, J., Ng, J., Lederer, S., Landay, J.: Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In: Proc. of Designing Interactive Systems, USA (2004)

    Google Scholar 

  21. Langheinrich, M.: When trust does not compute-The role of trust in Ubiquitous Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864. Springer, Heidelberg (2003)

    Google Scholar 

  22. Dornan, A.: Trusted computing: A matter of trust. Network Magazine 19(7), 26–32 (2004)

    Google Scholar 

  23. Seys, S.: Lightweight Cryptography Enabling Secure Wireless Networks. In: Workshop on Security Issues in Mobile and Wireless Heterogeneous Networks, Belgium (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dritsas, S., Tsaparas, J., Gritzalis, D. (2006). A Generic Privacy Enhancing Technology for Pervasive Computing Environments. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds) Trust and Privacy in Digital Business. TrustBus 2006. Lecture Notes in Computer Science, vol 4083. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11824633_11

Download citation

  • DOI: https://doi.org/10.1007/11824633_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37750-4

  • Online ISBN: 978-3-540-37752-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics