Publications (2)0 Total impact
Article: How and How Much Should We Disclose?[Show abstract] [Hide abstract]
ABSTRACT: Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. However, traditional access control methods can only negating or approving accesses, greatly lacking flexibility. In this paper, we introduce the disclosing degree for end-users to precisely and flexibly specify their privacy requirements. We implement a disclosing degree based scheme in the middleware Shadow for privacy protection. We also demonstrate the effectiveness of our scheme by comprehensive case-studies.
- [Show abstract] [Hide abstract]
ABSTRACT: In ubiquitous and pervasive computing, after data owner’s information is collected, data collector should be careful of disclosing data owner’s information for privacy reasons. In this paper, we present requirements and challenges when designing solutions for such data collector end protection. Policies, accuracy and anonymity of context should be all taken into account. Based on this, we design a middleware Shadow for user controllable privacy protection, which is deployed on data collectors who have large volume of data and powerful computation abilities. Shadow has a contextual rule based access control policy mechanism, enriched with methods of generating blurred context and guaranteeing information anonymous, and we implement it under an ontology based context model.Smart Sensing and Context, First European Conference, EuroSSC 2006, Enschede, Netherlands, October 25-27, 2006, Proceedings; 01/2006
Nan-ching, Jiangsu Sheng, China
- State Key Laboratory for Novel Software Technology