Skip to main content

Privacy in Pervasive Social Networks

  • Conference paper
Constructing Ambient Intelligence (AmI 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 277))

Included in the following conference series:

  • 1725 Accesses

Abstract

In this paper, we study privacy challenges in Pervasive Social Networks as a new field of research. We highlight the main issues to consider for having a better privacy protection. Then, we give an idea about existing privacy researches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Muhtadi, J., Campbell, R., Kapadia, A., Dennis Mickunas, M., Yi, S., Dennis, M., Yi, M.S.: Routing through the mist: Privacy preserving communication in ubiquitous computing environments (2002)

    Google Scholar 

  2. Babbitt, R., Wong, J., Chang, C.: Towards the modeling of personal privacy in ubiquitous computing environments. In: Proceedings of the 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 02, pp. 695–699. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  3. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  4. Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 1–10. ACM (2000)

    Google Scholar 

  5. Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)

    Google Scholar 

  6. Cas, J.: Privacy in pervasive computing environments - a contradiction in terms? IEEE Technology and Society Magazine, 24–33 (2005)

    Google Scholar 

  7. Crowley, J.L., Coutaz, J., Bérard, F.: Perceptual user interfaces: things that see. Commun. ACM 43, 54–64 (2000)

    Article  Google Scholar 

  8. Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Edwards, J.: Location privacy protection act of 2001 (2001)

    Google Scholar 

  10. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking, pp. 31–42 (2003)

    Google Scholar 

  11. Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 248–257. ACM (1996)

    Google Scholar 

  12. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005, pp. 88–97 (2005)

    Google Scholar 

  13. Shan, C., Mary-Anne, W.: Privacy in social networks: a comparative study. In: PACIS 2009 Proceedings, pp. 81–93 (2009)

    Google Scholar 

  14. Mokhtar, S.B., Capra, L.: From pervasive to social computing: Algorithms and deployments. In: Proceedings of the ACM International Conference on Pervasive Services (ICPS 2009) (July 2009)

    Google Scholar 

  15. Mokhtar, S.B., McNamara, L., Capra, L.: A middleware service for pervasive social networking. In: Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-PAC 2009, pp. 2:1–2:6. ACM, New York (2009)

    Google Scholar 

  16. Neustaedter, C., Greenberg, S.: The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 297–314. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI 2003: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)

    Google Scholar 

  18. Pallapa, G.V.: A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments. PhD thesis (December 2009)

    Google Scholar 

  19. Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Pasquale, F., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1–15. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Cardoso, R.S., Issarny, V.: Architecting Pervasive Computing Systems for Privacy: A Survey. In: Sixth Working IEEE/IFIP Conference on Software Architecture: WICSA 2007, Mumbai, Maharashtra, Inde, p. 26 (2007)

    Google Scholar 

  22. Zhao, Q.A., Stasko, J.T.: Evaluating image filtering based techniques in media space applications. In: Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work, pp. 11–18 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mabrouki, O., Chibani, A., Amirat, Y. (2012). Privacy in Pervasive Social Networks. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds) Constructing Ambient Intelligence. AmI 2011. Communications in Computer and Information Science, vol 277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31479-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31479-7_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31478-0

  • Online ISBN: 978-3-642-31479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics