skip to main content
10.1145/1085777.1085779acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
Article

Dynamic privacy management: a plug-in service for the middleware in pervasive computing

Published: 19 September 2005 Publication History

Abstract

Context-aware applications can better meet users' needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this non-intrusive context usage may cause privacy concerns since sensitive user data could be leaked to unauthorized parties. Therefore, data privacy protection becomes one of the major issues for context-aware applications. In this paper, in order to provide services based on various levels of privacy concerns, we extend the Platform for Privacy Preferences of W3C and define a specification for representing user privacy preferences for context-aware applications. We also propose a privacy infrastructure, which could be installed as a plug-in service for middleware supporting context-aware applications. This infrastructure enables the middleware to automatically generate a privacy policy and the user preference file according to the current context. The middleware simply matches these two files to decide whether to proceed with the application. We demonstrate the efficacy of this approach through a prototype implementation.

References

[1]
M. Ackerman, T. Darrell, and D. J. Weitzner. Privacy in context. Human-Computer Interaction, 16:167--176, 2001.
[2]
M. S. Ackerman. Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing, 8(6):430--439, November 2004.
[3]
L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users privacy concerns. In 9TH International Conference on Human-Computer Interaction (INCTERACT03), pages 709--712, Zürich, Switzerland, July 2003. IFIP.
[4]
T. Bohnenberger, A. Jameson, A. Krüger, and A. Butz. Location-aware shopping assistance: Evaluation of a decision-theoretic approach. In Mobile HCI 2002, pages 155--169, Pisa, Italy, 2002. Springer-Verlag.
[5]
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Symposium on Access Control Models and Technologies, pages 10--20, Chantilly, Virginia, USA, May 2001. ACM.
[6]
R. Fithian, G. Iachello, J. Moghazy, Z. Pousman, and J. Stasko. The design and evaluation of a mobile location-aware handheld event planner. In MobileHCI 2003, pages 145--160, Udine, Italy, September 2003. Springer-Verlag.
[7]
H. Hochheiser. The platform for privacy preference as a social protocol: An examination within the u.s. policy context. ACM Transactions on Internet Technology, 2(4):276--306, November 2002.
[8]
J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In The second Internation Conference on Mobile Systems, Applications and Services (MobiSys'04), pages 177--189, Bonston, Massachusetts, USA, 2004. ACM Press.
[9]
E. Kaasinen. User needs for location-aware mobile services. Personal Ubiquitous Computing, 7(1):70--79, 2003.
[10]
S. Lederer, A. K. Dey, and J. Mankoff. A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments. Technical Report UCB/CSD-2-1188, University of California, Berkeley, June 2002.
[11]
S. Lederer, J. Mankoff, and A. K. Dey. Who wants to know what when? privacy preference determinants in ubiquitous computing. In Short Talk in the Extended Abstracts of CHI 2003, pages 724--725, Fort Lauderdale, Florida, USA, 2003. ACM Press.
[12]
H. Lei, D. M. Sow, J. S. Davis, G. Banavar, and M. R. Ebling. The design and applications of a context service. SIGMOBILE Mobile Computing and Communications Review, 6(4):45--55, 2002.
[13]
G. Roussos and T. Moussouri. Consumer perceptions of privacy, security and trust in ubiquitous commerce. Personal and Ubiquitous Computing, 8(6):416--429, November 2004.
[14]
W3C. Xml key management specification. http://www.w3.org/TR/xkms/, March 2001.
[15]
W3C. Platform for privacy preferences (p3p) project. http://www.w3.org/TR/P3P/, April 2002.
[16]
W3C. Xml encryption syntax and processing. http://www.w3.org/TR/xmlenc-core/, December 2002.
[17]
R. Want, A. Hopper, V. Falcão, and J. Gibbons. The active badge location system. ACM Transactions on Information Systems, 10(1):91--102, Jan. 1992.
[18]
R. Want, B. N. Schilit, N. I. Adams, R. Gold, K. Petersen, D. Goldberg, J. R. Ellis, and M. Weiser. An overview of the parctab ubiquitous computing experiment. IEEE Personal Communications, 2(6):28--43, December 1995.
[19]
C. Xu, S. Cheung, C. Lo, K. Leung, and J. Wei. Cabot: On the ontology for the middleware support of context-aware pervasive applications. In IFIP NPC Workshop on Building Intelligent Sensor Networks (BISON 2004), pages 568--575, Wuhan, P.R. China, October 2004.

Cited By

View all
  • (2015)Automating the Generation of Privacy Policies for Context-Sharing ApplicationsProceedings of the 2015 International Conference on Intelligent Environments10.1109/IE.2015.18(73-80)Online publication date: 15-Jul-2015
  • (2014)Lessons learned in building pervasive platforms2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)10.1109/CCNC.2014.6866540(7-12)Online publication date: Jan-2014
  • (2013)A Dynamic Privacy Manager for Compliance in Pervasive ComputingData Mining10.4018/978-1-4666-2455-9.ch041(793-815)Online publication date: 2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MobileHCI '05: Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
September 2005
400 pages
ISBN:1595930892
DOI:10.1145/1085777
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. P3P
  2. context
  3. middleware
  4. pervasive computing
  5. privacy

Qualifiers

  • Article

Conference

MobileHCI05

Acceptance Rates

Overall Acceptance Rate 202 of 906 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Automating the Generation of Privacy Policies for Context-Sharing ApplicationsProceedings of the 2015 International Conference on Intelligent Environments10.1109/IE.2015.18(73-80)Online publication date: 15-Jul-2015
  • (2014)Lessons learned in building pervasive platforms2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)10.1109/CCNC.2014.6866540(7-12)Online publication date: Jan-2014
  • (2013)A Dynamic Privacy Manager for Compliance in Pervasive ComputingData Mining10.4018/978-1-4666-2455-9.ch041(793-815)Online publication date: 2013
  • (2013)A Privacy Manager for Collaborative Working EnvironmentsProceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises10.1109/WETICE.2013.23(110-116)Online publication date: 17-Jun-2013
  • (2012)User Agents for Matching Privacy Policies with User PreferencesInternational Journal of Computer Theory and Engineering10.7763/IJCTE.2012.V4.506(451-458)Online publication date: 2012
  • (2012)A Dynamic Privacy Manager for Compliance in Pervasive ComputingPrivacy Protection Measures and Technologies in Business Organizations10.4018/978-1-61350-501-4.ch012(285-307)Online publication date: 2012
  • (2012)Middleware for location privacyProceedings of the 2012 ACM Research in Applied Computation Symposium10.1145/2401603.2401669(296-303)Online publication date: 23-Oct-2012
  • (2012)Towards a New Classification of Location Privacy Methods in Pervasive ComputingMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-642-30973-1_13(150-161)Online publication date: 2012
  • (2011)Privacy-friendly business models for location-based mobileJournal of Theoretical and Applied Electronic Commerce Research10.4067/S0718-187620110002000096:2(90-107)Online publication date: 1-Aug-2011
  • (2011)Security and Privacy in Pervasive NetworksPervasive Computing and Networking10.1002/9781119970422.ch10(159-173)Online publication date: 6-Jun-2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media