Abstract
In this paper, we study privacy challenges in Pervasive Social Networks as a new field of research. We highlight the main issues to consider for having a better privacy protection. Then, we give an idea about existing privacy researches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Muhtadi, J., Campbell, R., Kapadia, A., Dennis Mickunas, M., Yi, S., Dennis, M., Yi, M.S.: Routing through the mist: Privacy preserving communication in ubiquitous computing environments (2002)
Babbitt, R., Wong, J., Chang, C.: Towards the modeling of personal privacy in ubiquitous computing environments. In: Proceedings of the 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 02, pp. 695–699. IEEE Computer Society, Washington, DC (2007)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)
Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 1–10. ACM (2000)
Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)
Cas, J.: Privacy in pervasive computing environments - a contradiction in terms? IEEE Technology and Society Magazine, 24–33 (2005)
Crowley, J.L., Coutaz, J., Bérard, F.: Perceptual user interfaces: things that see. Commun. ACM 43, 54–64 (2000)
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Edwards, J.: Location privacy protection act of 2001 (2001)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking, pp. 31–42 (2003)
Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 248–257. ACM (1996)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005, pp. 88–97 (2005)
Shan, C., Mary-Anne, W.: Privacy in social networks: a comparative study. In: PACIS 2009 Proceedings, pp. 81–93 (2009)
Mokhtar, S.B., Capra, L.: From pervasive to social computing: Algorithms and deployments. In: Proceedings of the ACM International Conference on Pervasive Services (ICPS 2009) (July 2009)
Mokhtar, S.B., McNamara, L., Capra, L.: A middleware service for pervasive social networking. In: Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-PAC 2009, pp. 2:1–2:6. ACM, New York (2009)
Neustaedter, C., Greenberg, S.: The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 297–314. Springer, Heidelberg (2003)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI 2003: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)
Pallapa, G.V.: A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments. PhD thesis (December 2009)
Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Pasquale, F., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2003)
Cardoso, R.S., Issarny, V.: Architecting Pervasive Computing Systems for Privacy: A Survey. In: Sixth Working IEEE/IFIP Conference on Software Architecture: WICSA 2007, Mumbai, Maharashtra, Inde, p. 26 (2007)
Zhao, Q.A., Stasko, J.T.: Evaluating image filtering based techniques in media space applications. In: Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work, pp. 11–18 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mabrouki, O., Chibani, A., Amirat, Y. (2012). Privacy in Pervasive Social Networks. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds) Constructing Ambient Intelligence. AmI 2011. Communications in Computer and Information Science, vol 277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31479-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-642-31479-7_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31478-0
Online ISBN: 978-3-642-31479-7
eBook Packages: Computer ScienceComputer Science (R0)