• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

An Architecture for Privacy-Sensitive Ubiquitous Computing. In Mobisys, (2004)

by J Hong, J Landay
Add To MetaCart

Tools

Sorted by:
Results 11 - 20 of 231
Next 10 →

Middleware for Distributed Context-Aware Systems

by Karen Henricksen, Jadwiga Indulska, Ted McFadden, Sasitharan Balasubramaniam - International Symposium on Distributed Objects and Applications (DOA , 2005
"... Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context processing components that manage the flow of context information between the sensors/actuators and applications. The need for ..."
Abstract - Cited by 62 (4 self) - Add to MetaCart
Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context processing components that manage the flow of context information between the sensors/actuators and applications. The need for middleware to seamlessly bind these components together is well recognised. Numerous attempts to build middleware or infrastructure for context-aware systems have been made, but these have provided only partial solutions; for instance, most have not adequately addressed issues such as mobility, fault tolerance or privacy.
(Show Context)

Citation Context

...yet address heterogeneity, privacy, or monitoring and control of the system by users. 4.3 The Context Fabric Unlike the previous two solutions, the Context Fabric (Confab) proposed by Hong and Landay =-=[4]-=- is primarily concerned with privacy rather than with context sensing and processing. Confab provides an architecture for privacy-sensitive systems, as well as a set of privacy mechanisms that can be ...

SmokeScreen: flexible privacy controls for presence-sharing

by Landon P. Cox, Angela Dalton, Varun Marupadi - IN MOBISYS , 2007
"... Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present a system called SmokeScreen that provides fle ..."
Abstract - Cited by 57 (5 self) - Add to MetaCart
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present a system called SmokeScreen that provides flexible and power-efficient mechanisms for privacy management. Broadcasting clique signals, which can only be interpreted by other trusted users, enables sharing between social relations; broadcasting opaque identifiers (OIDs), which can only be resolved to an identity by a trusted broker, enables sharing between strangers. Computing these messages is power-efficient since they can be precomputed with acceptable storage costs. In evaluating these mechanisms we first analyzed traces from an actual presence-sharing application. Four months of traces provide evidence of anonymous snooping, even among trusted users. We have also implemented our mechanisms on two devices and found the power demands of clique signals and OIDs to be reasonable. A mobile phone running our software can operate for several days on a single charge.
(Show Context)

Citation Context

...presence information without a trusted intermediary. Also, though our broker is centralized and trusted, it serves without being co-located with users. Privacy in ubiquitous computing is well-studied =-=[19]-=- [20] and much of this work guided the design goals in Section 4. Gruteser and Grunwald [17] show a way to anonymize location data by means of a central server to prevent an untrusted server from from...

Siren: Context-aware computing for firefighting

by Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. L, Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. L - In Proceedings of Pervasive Computing , 2004
"... See next page for additional authors Follow this and additional works at: ..."
Abstract - Cited by 51 (3 self) - Add to MetaCart
See next page for additional authors Follow this and additional works at:
(Show Context)

Citation Context

...d iRoom [17]. Most of these are designed to support office work in traditional work environments. Siren, on the other hand, aims tossupport field work practices of mobile firefighters.sContext Fabric =-=[18]-=- is a generalized service infrastructure for context-aware computing that implements an information space abstraction [3] and a P2P infrastructure.sSiren implements Context Fabric for a peer-to-peer n...

Enabling Private Continuous Queries For Revealed User Locations

by Chi-yin Chow, Mohamed F. Mokbel
"... Abstract. Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based services may lead to several privacy threats ranging from worries over employers snooping on their workers’ whereabou ..."
Abstract - Cited by 49 (7 self) - Add to MetaCart
Abstract. Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based services may lead to several privacy threats ranging from worries over employers snooping on their workers’ whereabouts to fears of tracking by potential stalkers. While there exist several techniques to preserve location privacy in mobile environments, such techniques are limited as they do not distinguish between location privacy (i.e., a user wants to hide her location) and query privacy (i.e., a user can reveal her location but not her query). Such distinction is crucial in many applications where the locations of mobile users is publicly known. In this paper, we go beyond the limitation of existing cloaking algorithms as we propose a new robust spatial cloaking technique for snapshot and continuous location-based queries that clearly distinguishes between location privacy and query privacy. By such distinction, we achieve two main goals: (1) supporting private location-based services to those customers with public locations, and (2) performing spatial cloaking on-demand basis only (i.e., when issuing queries) rather than exhaustively cloaking every single location update. Experimental results show that the robust spatial cloaking algorithm is scalable and efficient while providing anonymity for large numbers of continuous queries without hiding users ’ locations. 1
(Show Context)

Citation Context

... architecture, and user privacy requirements: – Employed techniques. Based on the underlying employed technique, location privacy techniques can be classified to either: (a) reporting false locations =-=[15, 16]-=- where the main idea is to cheat the server by either generating a set of n locations in which only one of them is true [15] or aligning the actual location to the nearest prescribed landmark location...

Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications

by Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong - In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI , 2006
"... The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as the entity of interest, often using a fidelity tradeoff to manage the costs and benefits of revealing a person’s location. ..."
Abstract - Cited by 41 (10 self) - Add to MetaCart
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as the entity of interest, often using a fidelity tradeoff to manage the costs and benefits of revealing a person’s location. However, these approaches cannot be applied in some applications, as a reduction in precision can render location information useless. This is true of a category of applications that use location data collected from multiple people to infer such information as whether there is a traffic jam on a bridge, whether there are seats available in a nearby coffee shop, when the next bus will arrive, or if a particular conference room is currently empty. We present hitchhiking, a new approach that treats locations as the primary entity of interest. Hitchhiking removes the fidelity tradeoff by preserving the anonymity of reports without reducing the precision of location disclosures. We can therefore support the full functionality of an interesting class of location-based applications without introducing the privacy concerns that would otherwise arise.
(Show Context)

Citation Context

...ous purposes, targeting a specific victim and obtaining information about that victim’s location and movement. Significant prior work has examined anonymity and privacy in location-based applications =-=[2, 4, 8, 11, 12, 13, 23, 24]-=-. While we defer a discussion of that work until the next section, prior work generally makes two assumptions. First, prior work generally treats a person as the entity of interest. For example, a per...

You are what you say: Privacy risks of public mentions

by Dan Frankowski, Dan Cosley, Shilad Sen, Loren Terveen, John Riedl - In Proc. 29th Annual ACM SIGIR Conference on Research and Development in Information Retrieval , 2006
"... In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinionated rants about movies in your blog under a pseudonym while participating in a forum or web site for scholarly discussion ..."
Abstract - Cited by 40 (4 self) - Add to MetaCart
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinionated rants about movies in your blog under a pseudonym while participating in a forum or web site for scholarly discussion of medical ethics under your real name. However, it may be possible to link these separate identities, because the movies, journal articles, or authors you mention are from a sparse relation space whose properties (e.g., many items related to by only a few users) allow reidentification. This re-identification violates people’s intentions to separate aspects of their life and can have negative consequences; it also may allow other privacy violations, such as obtaining a stronger identifier like name and address. This paper examines this general problem in a specific setting: reidentification of users from a public web movie forum in a private movie ratings dataset. We present three major results. First, we develop algorithms that can re-identify a large proportion of public users in a sparse relation space. Second, we evaluate whether private dataset owners can protect user privacy by hiding data; we show that this requires extensive and undesirable changes to the dataset, making it impractical. Third, we evaluate two methods for users in a public forum to protect their own privacy, suppression and misdirection. Suppression doesn’t work here either. However, we show that a simple misdirection strategy works well: mention a few popular items that you haven’t rated.
(Show Context)

Citation Context

...ell an algorithm can narrow each user in a dataset to one of k users in another dataset. If k is large, or if k is small and the kidentification rate is low, users can plausibly deny being identified =-=[8]-=-. We will define k-identification more precisely later. 1.2 Research Questions As described earlier, organizations often will wish to release datasets. We became interested in this problem when we wis...

CPOL: High-performance policy evaluation

by Kevin Borders, Xin Zhao, Atul Prakash - In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS , 2005
"... Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users fine-grained control over when and how information can be accessed, and are flexible enough to be used in a variety of ap ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users fine-grained control over when and how information can be accessed, and are flexible enough to be used in a variety of applications. Evaluation of these policies, however, is not optimized for performance. Emerging applications, such as real-time enforcement of privacy policies in a sensor network or location-aware computing environment, require high throughput. Our experiments indicate that current policy enforcement solutions are unable to deliver the level of performance needed for such systems, and limit their overall scalability. To deal with the need for high-throughput evaluation, we propose CPOL, a flexible C++ framework for policy evaluation. CPOL is designed to evaluate policies as efficiently as possible, and still maintain a level of expressiveness comparable to current policy languages. CPOL achieves its performance goals by efficiently evaluating policies and caching query results (while still preserving correctness). To evaluate CPOL, we ran a simulated workload of users making privacy queries in a location-sensing infrastructure. CPOL was able to handle policy evaluation requests two to six orders of magnitude faster than a MySql implementation and an existing policy evaluation system. We present the design and implementation of CPOL, a high-performance policy evaluation engine, along with our testing methodology and experimental results. Categories and Subject Descriptors
(Show Context)

Citation Context

...has also been significant research in the field of privacy for ubiquitous computing and location aware services. A general toolkit called Confab is available for developing privacy-aware applications =-=[7]-=-. Confab provides full support for conditional access to location data based on the current time and the content of the data. The key difference between Confab and CPOL is that Confab relies on indivi...

Devices that tell on you: Privacy trends in consumer ubiquitous computing

by T. Scott Saponas, Sameer Agarwal, et al. - IN: PROC. 16TH USENIX SECURITY SYMPOSIUM , 2007
"... We analyze three new consumer electronic gadgets in order to gauge the privacy and security trends in massmarket UbiComp devices. Our study of the Slingbox Pro uncovers a new information leakage vector for encrypted streaming multimedia. By exploiting properties of variable bitrate encoding schemes, ..."
Abstract - Cited by 34 (2 self) - Add to MetaCart
We analyze three new consumer electronic gadgets in order to gauge the privacy and security trends in massmarket UbiComp devices. Our study of the Slingbox Pro uncovers a new information leakage vector for encrypted streaming multimedia. By exploiting properties of variable bitrate encoding schemes, we show that a passive adversary can determine with high probability the movie that a user is watching via her Slingbox, even when the Slingbox uses encryption. We experimentally evaluated our method against a database of over 100 hours of network traces for 26 distinct movies. Despite an opportunity to provide significantly more location privacy than existing devices, like RFIDs, we find that an attacker can trivially exploit the Nike+iPod Sport Kit’s design to track users; we demonstrate this with a GoogleMaps-based distributed surveillance system. We also uncover security issues with the way Microsoft Zunes manage their social relationships. We show how these products’ designers could have significantly raised the bar against some of our attacks. We also use some of our attacks to motivate fundamental security and privacy challenges for future UbiComp devices.
(Show Context)

Citation Context

... context of RFIDs [27], bluetooth devices [26, 44], and (to a lesser extent) 802.11 wireless devices [15], and there is a large body of UbiComp literature focused on privacy in location-aware systems =-=[5, 11, 12, 19, 20, 25, 22, 29, 34]-=-. Given this broad awareness of the potential trackability issues with wireless devices, and given media reports that the Nike+iPod Sport Kit used a proprietary wireless protocol [35] we set out to de...

Access Control to Information in Pervasive Computing Environments.

by Urs Hengartner , Adrian Perrig , Michael K Reiter , Princeton Edward W Felten - In Proceedings of 9th Workshop on Hot Topics in Operating Systems (HotOS IX), , 2003
"... Abstract Pervasive computing envisions a world in which our environment is full of embedded devices that gather and share vast amounts of information about people, such as their location, activity, or even their feelings. Some of this information is confidential and should not be released to just a ..."
Abstract - Cited by 32 (3 self) - Add to MetaCart
Abstract Pervasive computing envisions a world in which our environment is full of embedded devices that gather and share vast amounts of information about people, such as their location, activity, or even their feelings. Some of this information is confidential and should not be released to just anyone. In this thesis, I show how existing solutions for controlling access to information are not sufficient for pervasive computing because of four challenges: First, there will be many information services, potentially offering the same information, run by different organizations, even in a single social environment. Second, there will be complex types of information, such as a person's calendar entry, which reveal other kinds of information, such as the person's current location. Third, there will be services that derive specific information, such as a person's activity, from raw information, such as a videostream, and that become attractive targets for intruders. Fourth, an individual's ability to access information could be constrained based on confidential information about the individual's context. This thesis presents a distributed access-control architecture for pervasive computing that supports complex and derived information and confidential context-sensitive constraints. In particular, the thesis makes the following contributions: First, I introduce a distributed accesscontrol architecture, in which a client proves to a service that the client is authorized to access requested information. Second, I show how to incorporate the semantics of complex information as a first-class citizen into this architecture, based on information relationships. Third, I propose derivation-constrained access control, which reduces the influence of intruders by making a service prove that the service is accessing information on behalf of an authorized client. Fourth, I study the kinds of information leaks that context-sensitive constraints can cause. I introduce access-rights graphs and hidden constraints for avoiding these leaks. Fifth, I show how pervasive computing makes it difficult for a client to prove that the client is authorized to access complex confidential information. I propose a cryptographic solution based on an extension of hierarchical identity-based encryption. Sixth, as an alternative approach, I introduce an encryption-based access-control architecture for pervasive computing, in which a service gives information to any client, but only in an encrypted form. I present a formal model for my contributions based on Lampson et al.'s theory of authentication. All of my contributions have been implemented in an actual pervasive computing environment. A performance analysis of my implementation demonstrates the feasibility of my design.
(Show Context)

Citation Context

...ded by her cellphone company regardless of the environment that she is participating in. In addition, many research projects have been deployed only in the context of a single environment; it is not clear how they would be deployed in multiple environments. Furthermore, while the approach prevents an individual from making servicedependent decisions about whom to grant access, the individual still has to decide for each type of information whom to grant access. This approach will not scale if there are lots of different types of information. 7 There are a few projects that are not centralized [17, 11, 6]. However, these projects assume that an individual controls all the services that provide information about her [6, 11], which is not the case in practice, or they do not address the scalability problem [17], where multiple services offer the same information. 1.2.2 Complex Information Many existing pervasive computing projects initially neglected access control to information and focused on “Smart Rooms” [13] and on controlling access to physical resources available in such a room, such as a projector or a printer [1, 5, 13]. However, the upcoming of the Semantic Web [3] has also triggered i...

Protecting Moving Trajectories with Dummies

by Tun-hao You, Wen-chih Peng
"... Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike trajectories, [8] shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement p ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike trajectories, [8] shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it’s critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, shortterm disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.
(Show Context)

Citation Context

...r cues to invades user privacy. Obviously, it is important to protect location privacy. Recently, the problem of location privacy preserving has received growing interests from the research community =-=[1, 2, 7, 8, 9]-=-. These studies aim at protecting exact location information of users from the potential abuse of LBS providers and hackers. Two primary approaches have been considered, including 1) trusted anonymize...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University