Browse > Article
http://dx.doi.org/10.5391/JKIIS.2005.15.1.065

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment  

Kim Hak-Joon (호원대학교 멀티미디어정보학과)
Hwang Kyoung-Soon (충북대학교 전기전자컴퓨터공학부, 유비쿼터스 바이오정보기술연구센터)
Lee Keon Myung (충북대학교 전기전자컴퓨터공학부, 유비쿼터스 바이오정보기술연구센터)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.15, no.1, 2005 , pp. 65-68 More about this Journal
Abstract
Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.
Keywords
ubiquitous computing; privacy preservation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Snekkenes. Concepts for Personal Location Privacy Policies. In Proc. of the 3rd ACM conference on Electronic Commerce. ACM Press. (2001) 48-57
2 J. AI-Muhtadi, R. Campbell, A. Kapadia, M. Dennis Mickunas, S. Yi, Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. ICDCS'02, (2002)
3 M. Hazas, A. Ward. A High Performance Privacy-Oriented Location System. In Proc. of IEEE International Conference on Pervasive Computing and Communications. (2003)
4 X. Jiang and J. Landay. Modeling Privacy Control in Context-aware Systems. IEEE Pervasive 1(3). (2002)
5 P. Osbakk, N. Ryan. Expressing Privacy Preferences in terms of Invasiveness. In Position Paper for the 2nd UK-UbiNet Workshop(University of Cambridge, UK). (2004)
6 S. Lederer, A. K. Dey, J. Mankoff. Everyday Privacy in Uniquitous Computing Environment. In Ubicomp 2002 Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing. (2002)
7 G. Myles, A. Friday and N. Davies. Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1). (2003). 56-64   DOI   ScienceOn
8 U. Jendricke, M. Kreutzer, A. Zugenmaier. Pervasive Privacy with Identity Management. In Ubicom2002. (2002)
9 M. Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In Ubicomp 2002. (2002)
10 J. Hightower, G. Borriello. Location Systems for Ubiquitous Computing. IEEE Computer 34(8). (2001) 57-66   DOI   ScienceOn
11 A. Smailagic. D. P. Siewiorek, J. Anhalt, D. Kogan, Y. Wang. Location Sensing and Privacy in a Context Aware Computing Environment. In Proc. Pervasive Computing, 2001. (2001)
12 A. R. Beresford and F. Stajano. Location Privacy In Pervasive Computing. IEEE Pervasive Computing 2(1). (2002). 46-55   DOI   ScienceOn
13 A. R. Prasad, P. Schoo, H. Wang. An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. In Proc. of SAINT 2004: The 2004 Symposium on Applications & Internet. (2004)
14 M. Gruteser, G. Schelle, A. Jain, R. Han and D. Grunwald. Privacy-Aware Location Sensor Networks. http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.html (2003)