Abstract
Contextual privacy threat arises from divulging the location and time of the triggering events to adversaries. Since, the context of the triggering events serve as useful information to the eavesdropper, data encryption alone renders inadequate for protecting total privacy of a sensing task. Obfuscation of the contextual information is a natural solution to the contextual privacy problem. Since both location and time of a sensed event constitute its context, obfuscation can be performed both spatially and temporally. In [1], the authors employ spatial obfuscation techniques (controlled flooding, probabilistic flooding and fake messaging) by focusing mainly on the location component of the contextual information. Nevertheless, increased message transmissions place an additional burden on the power constrained sensor nodes.
- P. Kamat, Y. Zhang, W. Trappe and C. Ozturk, "Enhancing source-location privacy in sensor network routing," Proc. 25th Int'l Conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, pp. 599--608, June 2005. Google ScholarDigital Library
- T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley, 1991. Google ScholarDigital Library
- L. Ekroot and T. M. Cover, "The entropy of a randomly stopped sequence," IEEE Transactions on Information Theory, vol. 37, no. 6, pp. 1641--1644, November 1991.Google ScholarDigital Library
- S. M. Ross, Stochastic Processes, 2nd Edition, John Wiley, 1996.Google Scholar
- J. N. Kapur and H. K. Kesavan, Entropy Optimization Principles with Applications, John Wiley, 1992.Google ScholarCross Ref
Index Terms
- Obfuscating temporal context of sensor data by coalescing at source
Recommendations
Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system
UIC'07: Proceedings of the 4th international conference on Ubiquitous Intelligence and ComputingThe extensive context information collection abilities of ubiquitous computing environments represent a significant threat to user privacy. In this paper we address this threat by introducing a context information privacy mechanism. Our approach relies ...
Spatio-Temporal Context Manager in an Open Context Awareness Framework
NCM '08: Proceedings of the 2008 Fourth International Conference on Networked Computing and Advanced Information Management - Volume 02Location-based context awareness services can embody ubiquitous computing environments in all living environments. To achieve this, since location-based context awareness services need to be provided in various mobile devices, the configuration of open-...
A self-adaptive context processing framework for wireless sensor networks
MidSens '08: Proceedings of the 3rd international workshop on Middleware for sensor networksWireless sensor networks are increasingly being exploited in ubiquitous computing environments as one of the main platforms for gathering context data. In order to continuously observe the environment context during a long period, the sensor node should ...
Comments