Skip to main content
Log in

C-CBPM: collective context based privacy model

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Existing research on developing privacy models, although seem persuasive, are essentially based on user, role or service identification. Such models are incapable of automatically adjusting privacy needs of consumers or organizations to the context in which the data is accessed. In this work we present a context based privacy model (CBPM) that leverages the context in which the information content is accessed. We introduce the concepts of donation and adoption for privacy configuration by extending CBPM to collective-CBPM (C-CBPM), bearing the analysis upon the notions of collective intelligence and trust computation. The efficacy of the proposed C-CBPM model is demonstrated by implementing it in various application domains such as, humanitarian assistance and disaster relief operations. CBPM is also implemented as a framework that assists in the comparison and extension of existing role or service based privacy and access control models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. http://www.odi.org.uk/resources/download/3250.pdf, retrieved on August 16, 2010.

  2. http://www.nytimes.com/2010/10/23/technology/23google.html, retrieved on October 23, 2010.

  3. http://www.bbc.co.uk/news/world-south-asia-10984477, retrieved on August 16, 2010.

  4. http://www.reliefweb.int/rw/rwb.nsf/db900SID/LSGZ-89GD7W?OpenDocument, retrieved on November 12, 2010.

  5. http://fts.unocha.org/reports/daily/ocha_R24_E15913___1408160300.pdf, retrieved on August 12, 2011.

  6. http://www.coe-dmha.org/pakistan2010.html, retrieved on October 23, 2010.

  7. http://www.pakistan.sahanafoundation.org/eden/default/index, retrieved on August 20, 2010.

  8. http://www.mirror.co.uk/news/top-stories/2010/08/10/pakistan-flood-disaster-could-be-worse-than-the-boxing-day-tsunami-kashmir-earthquake-and-haiti-earthquake-combined-115875-22476903/, retrieved on August 12, 2010.

  9. http://www.irinnews.org/Report/90541/PAKISTAN-Securing-aid-delivery, retrieved on September 22, 2010.

  10. http://www.cbn.com/cbnnews/world/2010/August/Report-Taliban-Kill-3-Christian-Aid-Workers/, retrieved on August 30, 2010.

  11. It shares some issues with cold-start problem. Usability problem is naive user’s lack of experience to build a CBPM matrix.

References

  • Adams A, Sasse MA (2001) Privacy in multimedia communications: protecting users, not just data. People and computers XV: interactions without frontiers: joint proceedings of HCI 2001 and IHM 2001. Springer, pp 49–69

  • Agarwal N, Liu H (2009) Trust in blogosphere. In: Liu L, Tamer Özsu M (eds) Encyclopedia of database systems. Springer, New York, pp 3187–3191

    Google Scholar 

  • Agarwal N, Liu H, Tang L, Yu P (2008) Identifying influential bloggers in a community. 1st International conference on web search and data mining (WSDM08). California, pp 207–218

  • Agarwal N, Galan M, Liu H, Subramanya S (2010) WisColl: collective wisdom based blog clustering. J Inf Sci 180(1):39–61

    Article  Google Scholar 

  • Baker CR, Shapiro B (2003) Information technology and the social construction of information privacy: reply. J Acc Public Policy 22(3):287–290

    Article  Google Scholar 

  • Braghin AC, Agostino BC, Riccardo BF (2008) Information flow security in boundary ambients Information and computation. Elsevier, Amsterdam, pp 460–489

    Google Scholar 

  • Brewer DDF, Nash DMJ (1989) The Chinese wall security policy. IEEE symposium on research in security and privacy, pp 206–214

  • Buchmayr M, Kurschl W (2010) A survey on situation-aware ambient intelligence systems. J Ambient Intell Humaniz Comput 2:175–183

    Article  Google Scholar 

  • Chai S, Salerno J, Mabry P (2010) Third international conference on social computing, behavioral modeling, and prediction, SBP 2010, Bethesda, MD, USA, 30–31 March 2010, Springer

  • Chou S (2004) Dynamic adaptation to object state change in an information flow control model. J Inf Softw Technol 46(11):729–737

    Article  Google Scholar 

  • Clarke C (2010) Intelligence collection through social media. Navy Imagery Insider 2010:4

    Google Scholar 

  • Foley S (1990) Secure information flow using security groups. Computer security foundations workshop III, pp 62–72

  • Francesco N, Martini L (2007) Instruction-level security analysis for information flow in stack-based assembly languages. J Inf Comput 205(9):1334–1370

    Article  MATH  Google Scholar 

  • Gilburd B, Schuster A, Wolff R (2004) k-TTP: a new privacy model for large-scale distributed environments. In: Proceedings of the tenth ACM SIGKDD, pp 563–568

  • Goncalves G, Maranda A (2008) Role engineering: from design to evolution of security schemes. J Syst Softw 81(8):1306–1326

    Article  Google Scholar 

  • Gross T (2008) Cooperative ambient intelligence: towards autonomous and adaptive cooperative ubiquitous environments. Int J Auton Adapt Commun Syst (IJAACS) 1(Suppl 2):270–278

    Article  Google Scholar 

  • Hong J, Suh E, Kim S (2009) Context-aware systems: a literature review and classification. J Exp Syst Appl 36(4):8509–8522

    Article  Google Scholar 

  • Howe J (2006) The rise of crowdsourcing. Wired, 14 June 2006

  • Jindal R, Kiran C (2010) Dual layer privacy model for hidden databases. Int J Comput Appl 1(13):22–25 (published by foundation of computer science)

    Google Scholar 

  • Kapsalis V, Hadellis L, Karelis D, Koubias S (2006) A dynamic context-aware access control architecture for e-services. J Comput Secur 25(7):507–521

    Article  Google Scholar 

  • LaPadula LJ, Bell DE (1996) Secure computer systems: a mathematical model. J Comput Secur 4:239–263

    Google Scholar 

  • Liu H, Salerno J, Young M (2008) Proceedings of the social computing, behavioral modeling, and prediction (SBP08). Springer, Arizona

  • Liu H, Salerno J, Young M (2009) Proceedings of the social computing and behavioral modeling (SBP09). Springer, Arizona

  • Martha V, Ramaswamy S, Agarwal N (2010) CBPM: context based privacy model. 2nd international symposium on privacy and security applications (PSA-10) held in conjunction with IEEE international conference on privacy, security, risk. IEEE, Minneapolis

  • Maximilien EM, Grandison T, Liu K, Sun T, Richardson D, Guo S (2009) Enabling privacy as a fundamental construct for social networks. In: Computational science and engineering, 2009. CSE ‘09 International conference on 29–31 August 2009, vol 4, pp 1015–1020

  • McLean J (1990) Security models and information flow. IEEE symposium on research in security and privacy, pp 180–187

  • Moniruzzaman M, Barker K, Delegation of access rights in a privacy preserving access control model. In: Privacy, security and trust (PST), 2011 ninth annual international conference on 19–21 July 2011, pp 124–133

  • Nau D, Mannes A (2009) Proceedings of the third international conference on computational cultural dynamics (ICCCD-09). The AAAI Press, Maryland

  • Nau D, Wilkenfeld J (2007) Proceedings of the first international conference on computational cultural dynamics (ICCCD-07). The AAAI Press, Maryland

  • Nissenbaum H (2009) Privacy in Context. Stanford Law & Politics, Stanford

    Google Scholar 

  • Subrahmanian VS, Kruglanski A (2008) Proceedings of the second international conference on computational cultural dynamics (ICCCD-08). The AAAI Press, Maryland

  • Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570

    Article  MATH  MathSciNet  Google Scholar 

  • Tbahriti S-E, Mrissa M, Medjahed B, Ghedira C, Barhamgi M, Fayn J (2011) Privacy-aware DaaS services composition. In: Hameurlain A, Liddle SW, Schewe K-D, Zhou X (eds) ‘DEXA (1)’. Springer, pp 202–216

Download references

Acknowledgments

This work was supported, in part, by grants from the US National Science Foundation (under Grant Nos. IIS-1110868, CNS-0619069, EPS-0701890, OISE-0729792, CNS-0855248 and EPS-0918970) and the US Office of Naval Research (under Grant Numbers N000141010091 and N000141410489). We gratefully acknowledge this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Agarwal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Venakata Swamy, M., Agarwal, N. & Ramaswamy, S. C-CBPM: collective context based privacy model. J Ambient Intell Human Comput 5, 881–895 (2014). https://doi.org/10.1007/s12652-014-0241-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-014-0241-z

Keywords

Navigation