Context-driven prevention of unintended identity disclosure
2006
Abstract
In this paper we discuss the problem of privacy and information disclosure in ubiquitous and pervasive computing environments. We describe a framework that uses context information to selectively disclose personal information to service providers while keeping the humancomputer interaction non-intrusive. For each interaction with a service provider, our framework will take previously disclosed personal information, user preferences and available privacy enhancing technologies into consideration to conduct an optimal information revealing strategy in a particular situation. The use of context-awareness in our framework provides the ability to infer revealing information and enables the user to adjust the privacy control in a non-intrusive manner.
References (26)
- <owl:Class rdf:ID="Pseudonym" /> <owl:Class rdf:ID="Recipient" /> <owl:Class rdf:ID="Attribute" /> <owl:Class rdf:ID="Profile" /> <owl:ObjectProperty rdf:ID="hasProfile"> <rdfs:domain rdf:resource="#Pseudonym" /> <rdfs:range rdf:resource="#Profile" /> <rdf:type rdf:resource="&owl;#FunctionalProperty" /> </owl:ObjectProperty> <owl:ObjectProperty rdf:ID="contains"> <rdfs:domain rdf:resource="#Profile" /> <rdfs:range rdf:resource="#Attribute" />
- </owl:ObjectProperty> <owl:DatatypeProperty rdf:ID="sensitivity"> <rdfs:domain rdf:resource="#Attribute" /> <rdfs:range rdf:resource="&xsd;#int" /> <rdf:type rdf:resource="&owl;#FunctionalProperty" /> </owl:DatatypeProperty> <owl:DatatypeProperty rdf:ID="accuracy"> <rdfs:domain rdf:resource="#Attribute" /> <rdfs:range rdf:resource="&xsd;#int" /> <rdf:type rdf:resource="&owl;#FunctionalProperty" /> </owl:DatatypeProperty> References
- Stefan A. Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge, MA, USA, 2000.
- Jan Camenisch and Els Van Herreweghen. Design and implementation of the idemix anonymous credential system. In ACM Conference on Computer and Com- munications Security, pages 21-30, 2002.
- David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, volume 24, pages 84-88, Febru- ary 1981.
- David Chaum. Blind signatures for untraceable payments. In CRYPTO, pages 199-203, 1982.
- David Chaum. Security without identification: Transaction systems to make big brother obsolete. Commun. ACM, 28(10):1030-1044, 1985.
- David Chaum and Hans Van Antwerpen. Undeniable signatures. In CRYPTO, pages 212-216, 1989.
- David Chaum and Eugène van Heyst. Group signatures. In EUROCRYPT, pages 257-265, 1991.
- Davy Preuveneers et al. Towards an extensible context ontology for ambient in- telligence. In Panos Markopoulos, Berry Eggen, Emile Aarts, and James L. Crow- ley, editors, Second European Symposium on Ambient Intelligence, volume 3295 of LNCS, pages 148 -159, Eindhoven, The Netherlands, Nov 8 -11 2004. Springer.
- Anind K. Dey. Understanding and using context. Personal Ubiquitous Comput., 5(1):4-7, 2001.
- Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul F. Syverson, editors, Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, pages 54-68. Springer, 2002.
- Els Van Herreweghen. Unidentifiability and Accountability in Electronic Transac- tions. PhD thesis, Katholieke Universiteit Leuven, 2004.
- Jason I. Hong and James A. Landay. An architecture for privacy-sensitive ubiqui- tous computing. In MobiSys '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 177-189, New York, NY, USA, 2004. ACM Press.
- HP Labs. Jena 2 -A Semantic Web Framework. http://www.hpl.hp.com/semweb/ jena2.htm, 2004.
- Xiaodong Jiang and James A. Landay. Modeling privacy control in context-aware systems. IEEE Pervasive Computing, 1(3):59-63, 2002.
- Marc Langheinrich. A privacy awareness system for ubiquitous computing envi- ronments. In Ubicomp, pages 237-245, 2002.
- Scott Lederer, Anind K. Dey, and Jennifer Mankoff. Everyday privacy in ubiquitous computing environments. In Ubicomp 2002 Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, 2002.
- Deborah L. McGuinness and Frank van Harmelen. Owl web ontology language overview, w3c recommendation 10 february 2004, February 2004.
- Andreas Pfitzmann and Michael Waidner. Networks without user observability: Design options. In Advances in Cryptology-EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, pages 245-253, April 1985.
- Davy Preuveneers and Yolande Berbers. Adaptive context management using a component-based approach. In Nancy Alonistioti and Lea Kutvonen, editors, Proceedings of 5th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS2005), Lecture Notes in Computer Science (LNCS), Athens/Greece, June 2005. Springer Verlag.
- Davy Preuveneers and Yolande Berbers. Automated context-driven composi- tion of pervasive services to alleviate non-functional concerns. In Ghita Kouadri Mostefaoui and Patrick Brezillon, editors, Proceedings of the ICPS'05 Interna- tional Workshop on Software Aspects of Context (IWSAC'05), pages 1-8, San- torini, Greece, July 2005. CEUR Workshop Proceedings, ISSN 1613-0073, online CEUR-WS.org/Vol-150/paper4.pdf.
- PRIME. Privacy and Identity Management for Europe. http://www.prime- project.eu.org, March 2004.
- Sandra Steinbrecher and Stefan Köpsell. Modelling unlinkability. In Roger Din- gledine, editor, Privacy Enhancing Technologies, volume 2760 of Lecture Notes in Computer Science, pages 32-47. Springer, 2003.
- Latanya Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge- based Systems, 10(5):571-588, 2002.
- Mark Weiser. The Computer for the Twenty-First Century. Scientific American, pages 94-10, September 1991.