4 research outputs found

    Dynamic privacy management in pervasive sensor networks

    Get PDF
    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people’s daily social space. A user study was then conducted to evaluate several privacy management approaches – an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.Things That Think Consortiu

    User-Centered Context-Aware Mobile Applications―The Next Generation of Personal Mobile Computing

    Get PDF
    Context-aware mobile applications are systems that can sense clues about the situational environment and enable appropriate mechanisms of interaction between end users and systems, making mobile devices more intelligent, adaptive, and personalized. In order to better understand such systems and the potentials and barriers of their development and practical use, this paper provides a state-of-the-art overview of this emerging field. Unlike previous literature reviews that mainly focus on technological aspects of such systems, we examine this field mainly from application and research methodology perspectives. We will present major types of current context-aware mobile applications, and discuss research methodologies used in existing studies and their limitations, and highlight potential future research

    Configurable dynamic privacy for pervasive sensor networks

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2009.Cataloged from PDF version of thesis.Includes bibliographical references (p. 76-79).Ubiquitous computing sensor networks have greatly augmented the functionality of interactive media systems by adding the ability to capture and store activity-related information. Analyzing the information recorded from pervasive sensor networks can provide insight about human behavior for better personalized system services, as well as richer media content and social communication. With these increased capabilities, serious concerns which create great obstacles to the deployment of such network are raised with regard to privacy and boundaries. However, there exist no real data currently about privacy in pervasive media networks and most studies that have been made so far are speculative. This thesis presents the design and implementation of a configurable infrastructure that can protect users' dynamic levels of privacy in a pervasive sensor network. Through an active badge system, users have different options to disable each type of data transmission. This work evaluates approaches for privacy protection through conducting an extensive user study in an actual ubiquitous invasive sensing environment to obtain feedback via sensor system data and questionnaires and correlates that information for future reference in the design of privacy-protected ubiquitous sensor networks. Results from the user study indicated that an active badge for on-site control, especially periodically broadcast RF beacon for privacy control, is the most effective and acceptable method.(cont.) However, it also suggested that if every occupant in the building used this approach to constantly block all data transmission, significant system blinding (on the order of 30 % or more) would be incurred. These results allow a better understanding of what value is assessed to privacy versus capabilities/awareness beyond the current assumptions.by Nan-Wei Gong.S.M

    Feature-based generation of pervasive systems architectures utilizing software product line concepts

    Get PDF
    As the need for pervasive systems tends to increase and to dominate the computing discipline, software engineering approaches must evolve at a similar pace to facilitate the construction of such systems in an efficient manner. In this thesis, we provide a vision of a framework that will help in the construction of software product lines for pervasive systems by devising an approach to automatically generate architectures for this domain. Using this framework, designers of pervasive systems will be able to select a set of desired system features, and the framework will automatically generate architectures that support the presence of these features. Our approach will not compromise the quality of the architecture especially as we have verified that by comparing the generated architectures to those manually designed by human architects. As an initial step, and in order to determine the most commonly required features that comprise the widely most known pervasive systems, we surveyed more than fifty existing architectures for pervasive systems in various domains. We captured the most essential features along with the commonalities and variabilities between them. The features were categorized according to the domain and the environment that they target. Those categories are: General pervasive systems, domain-specific, privacy, bridging, fault-tolerance and context-awareness. We coupled the identified features with well-designed components, and connected the components based on the initial features selected by a system designer to generate an architecture. We evaluated our generated architectures against architectures designed by human architects. When metrics such as coupling, cohesion, complexity, reusability, adaptability, modularity, modifiability, packing density, and average interaction density were used to test our framework, our generated architectures were found comparable, if not better than the human generated architectures
    corecore