Skip to main content

TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones

  • Conference paper
Pervasive Computing (Pervasive 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6030))

Included in the following conference series:

Abstract

Due to increased input and output capabilities, mobile phones hold many different kinds of (mostly private) data. The need for finer grained profiles and integrated data security on mobile phones has already been documented extensively (e.g. [1]). However, there are no appropriate concepts and implementations yet to handle and limit access to data on mobile phones. TreasurePhone has been designed to address this specific problem. It protects the users’ mobile phone data based on their current context. Privacy protection is realized by spheres, which represent the users’ context-specific need for privacy. That is, users can define which data and services are accessible in which sphere. TreasurePhone exploits context information to support authentication and automatic activation of spheres by locations and actions. We conducted a user study with 20 participants to gain insights on how well users accept such a concept. One of the main goals was to find out whether such privacy features are appreciated by the users even though they make interaction slower and might hinder fast access to specific data. Additionally, we showed that integration of context information significantly increases ease-of-use of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karlson, A.K., Brush, A.J.B., Schechter, S.: Can I Borrow Your Phone?: Understanding Concerns when Sharing Mobile Phones. In: CHI 2009: Proceedings of the 27th international conference on Human factors in computing systems (2009)

    Google Scholar 

  2. Stajano, F.: Will Your Digital Butlers Betray You? In: WPES 2004: Proceedings of the 2004 ACM workshop on Privacy in the electronic society. ACM, New York (2004)

    Google Scholar 

  3. Lehikoinen, J.T., Lehikoinen, J., Huuskonen, P.: Understanding privacy regulation in ubicomp interactions. Personal Ubiquitous Comput. 12(8), 543–553 (2008)

    Article  Google Scholar 

  4. Stajano, F.: One user, many hats; and, sometimes, no hat - towards a secure yet usable pda. In: 12th Int. Security Protocols Workshop. Springer, Heidelberg (2004)

    Google Scholar 

  5. Siewiorek, D., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K., Shaffer, J., Wong, F.L.: SenSay: A Context-Aware Mobile Phone. In: ISWC 2003: Proceedings of the 7th IEEE International Symposium on Wearable Computers, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  6. Krishnamurthy, S., Chakraborty, D., Jindal, S., Mittal, S.: Context-Based Adaptation of Mobile Phones Using Near-Field Communication. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 1–10 (2006)

    Google Scholar 

  7. Jiang, X., Hong, J.I., Landay, J.A.: Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 176. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. De Luca, A., Hußmann, H.: Threat Awareness - Social Impacts of Privacy Aware Ubiquitous Computing. In: INTER: A European Cultural Studies Conference in Sweden (INTER 2007), Norrköping, Sweden, June 2007, pp. 1650–3686 (2007)

    Google Scholar 

  9. Goffman, E.: The Presentation of Self in Everyday Life. Doubleday Anchor Books, New York (1959)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seifert, J., De Luca, A., Conradi, B., Hussmann, H. (2010). TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones. In: Floréen, P., Krüger, A., Spasojevic, M. (eds) Pervasive Computing. Pervasive 2010. Lecture Notes in Computer Science, vol 6030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12654-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12654-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12653-6

  • Online ISBN: 978-3-642-12654-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics