Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.3.157

Privacy Framework in Ubiquitous Computing Environments  

Hong Seng-Phil (Sungshin Woman's University)
Lee Chul-Soo (Kyungwon university)
Abstract
Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.
Keywords
Privacy; Ubiquitous Computing; Security Policy; Framework; Architecture; Methodology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Bettina Berendt, Oliver Gunther, and Sarah Spiekermann, 'Privacy in e-Commerce: Stated Preference vs. Actual Behavior', Communications of ACM, Vol. 48 No. 4, Pages: 101-106, April, 2005
2 Privacy and data-sharing-The way forward for public services Performance and Innovation Unit in the U.K., Available athttp://www.piu.gov.uk/privacy /index.htm
3 Giovanni Iacjello and Gregory D. Abowd, 'Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing', CHI ACM, Pages: 91-100, April 2-7, Portland, Oregon, USA, 2005
4 Jean-Philippe Cotis, 'Economic Policy Reforms : Going for Growth 2006', OECD Publishing 2, 7, 2006
5 Jason I. Hong, and James A. Landay, 'Support for location: An architecture for privacy-sensitive ubiquitous computing', Proceedings of the 2nd international conference on Mobile systems, applications, and services MobiSys'04, Boston, MA, USA, Pages: 177-189. June, 2004
6 Simson Garfinke, and Gene Spafford, 'Web Security, Privacy, and Commerce', O'reilly & Associates, Inc., 2nd Edition, Pages: 230-256, January, 2002
7 A list of privacy surveys, Available at http://www.w3.org/P3P/p3pfaq.html
8 조화순, 'IT혁명과 개인정보보호', 한국전산원, 05, 2004
9 Eila Niemela, and Juhani Latvakoski, 'Survey of requirements and solutions for ubiquitous software', Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia MUM '04, New York, NY, USA, Pages: 71-78, October, 2004
10 Gregory D. Abowd, and Elizabeth D. Mynatt, 'Charting past, present, andfuture research in ubiquitous computing', ACM Transactions on Computer-Human Interaction (TOCHI), Volume 7 Issue 1, Pages: 29-58, March, 2000   DOI   ScienceOn
11 개인정보보호백서 2003, 한국정보보호진흥원, 2003
12 P. W. Warren, 'From Ubiquitous Computing to Ubiquitous Intelligence', BT Technology Journal, Volume 22 Issue 2, Pages:.28-38, April, 2004   DOI