39,106 research outputs found

    Xml-Based Privacy Model in Pervasive Computing

    Get PDF
    The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot of insufficiencies of the current information systems while on the other hand central blocks of pervasive computing are in direct conflicts with privacy protection fundamentals. Considerable efforts have been taken to cope with this problem but each one had its own shortage. Some just provide one privacy type like location privacy or just identity privacy, some of them were not platform independence, and some resulted to a lot of privacy alarms. In this thesis we proposed a new privacy model in pervasive computing that provides all four privacy types (ID, Location, Time, and content) for the user with high control over private information (User Control over Private Information) and as less privacy warnings as possible (Unobtrusiveness of Privacy Mechanism). To complete the proposed model we showed model privacy policies with XML tags and distributed decision making processes in different layers to provide high scalability. To validate the model, through implementation we showed that model provides “Privacy Policy Expressiveness” with supporting mandatory and discretionary rules, uncertainty handling and conflict resolution. We showed model unobtrusiveness with experimenting and measuring the time user wastes on dealing with privacy sub-system. We showed that our model provides content, identity, location and time privacy that leads to a high level of user control over private information. The model scalability would be granted by using XML as a platform independent format to describe privacy policies with addition of distributed decision making processes. The validation results confirmed that the model supports all four metrics of “expressiveness of privacy policies”, all four metrics of “user control over private information”, and both factors of “scalability”, with less than 10% “unobtrusiveness”

    A Clustering-based Location Privacy Protection Scheme for Pervasive Computing

    Full text link
    In pervasive computing environments, Location- Based Services (LBSs) are becoming increasingly important due to continuous advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBSs can jeopardize the location privacy of mobile users. Consequently, providing safeguards for location privacy of mobile users against being attacked is an important research issue. In this paper a new scheme for safeguarding location privacy is proposed. Our approach supports location K-anonymity for a wide range of mobile users with their own desired anonymity levels by clustering. The whole area of all users is divided into clusters recursively in order to get the Minimum Bounding Rectangle (MBR). The exact location information of a user is replaced by his MBR. Privacy analysis shows that our approach can achieve high resilience to location privacy threats and provide more privacy than users expect. Complexity analysis shows clusters can be adjusted in real time as mobile users join or leave. Moreover, the clustering algorithms possess strong robustness.Comment: The 3rd IEEE/ACM Int Conf on Cyber, Physical and Social Computing (CPSCom), IEEE, Hangzhou, China, December 18-20, 201

    Privacy in (mobile) telecommunications services

    Get PDF
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged between growing numbers of parties. Also telecommunications and computer networks are rapidly being integrated and thus the distinction between telephony and computing disappears. Traditional telecommunications privacy regulations are revised to cover internet applications. In this paper telecommunications issues are recalled to aid the on-going debate. Cellular mobile phones have recently be introduced. Cellular networks process a particular category of traffic data namely location data, thereby introducing the issue of territorial privacy into the telecommunications domain. Location data are bound to be used for pervasive future services. Designs for future services are discussed and evaluated for their impact on privacy protection.</p

    A XML based, user-centered privacy model in pervasive computing systems

    Get PDF
    The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, identity, location, and time privacy with low unobtrusivenes

    PinMe: Tracking a Smartphone User around the World

    Full text link
    With the pervasive use of smartphones that sense, collect, and process valuable information about the environment, ensuring location privacy has become one of the most important concerns in the modern age. A few recent research studies discuss the feasibility of processing data gathered by a smartphone to locate the phone's owner, even when the user does not intend to share his location information, e.g., when the Global Positioning System (GPS) is off. Previous research efforts rely on at least one of the two following fundamental requirements, which significantly limit the ability of the adversary: (i) the attacker must accurately know either the user's initial location or the set of routes through which the user travels and/or (ii) the attacker must measure a set of features, e.g., the device's acceleration, for potential routes in advance and construct a training dataset. In this paper, we demonstrate that neither of the above-mentioned requirements is essential for compromising the user's location privacy. We describe PinMe, a novel user-location mechanism that exploits non-sensory/sensory data stored on the smartphone, e.g., the environment's air pressure, along with publicly-available auxiliary information, e.g., elevation maps, to estimate the user's location when all location services, e.g., GPS, are turned off.Comment: This is the preprint version: the paper has been published in IEEE Trans. Multi-Scale Computing Systems, DOI: 0.1109/TMSCS.2017.275146

    A distributed architecture for mobile, location-dependent applications

    Get PDF
    Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.Includes bibliographical references (leaves 56-58).As pervasive computing becomes a reality, users will be able to interact with computing services which will all work together in a seamlessly integrated system. Resource discovery is a key feature of pervasive computing which allows users simple and convenient access to resources. While there are several resource discovery systems in existence which are essential to pervasive computing, the support for location-based resource discovery is uncommon. The goal of this work is to integrate a location-support system with a resource discovery system to support location-based resource discovery. Our integrated system provides an in-building solution which is cost-effective, scalable, and distributed. In order to protect the user's privacy, the system provides location discovery services without receiving any information from the user. We have also implemented a simple scripting language which thin clients can use to control and interact with network services. To demonstrate the power and functionality of this system, we have deployed several location-dependent applications including a map-based service discovery application with little manual configuration.by Anit Chakraborty.M.Eng

    From Real to Complex: Enhancing Radio-based Activity Recognition Using Complex-Valued CSI

    Get PDF
    Activity recognition is an important component of many pervasive computing applications. Radio-based activity recognition has the advantage that it does not have the privacy concern and the subjects do not have to carry a device on them. Recently, it has been shown channel state information (CSI) can be used for activity recognition in a device-free setting. With the proliferation of wireless devices, it is important to understand how radio frequency interference (RFI) can impact on pervasive computing applications. In this paper, we investigate the impact of RFI on device-free CSI-based location-oriented activity recognition. We present data to show that RFI can have a significant impact on the CSI vectors. In the absence of RFI, different activities give rise to different CSI vectors that can be differentiated visually. However, in the presence of RFI, the CSI vectors become much noisier and activity recognition also becomes harder. Our extensive experiments show that the performance of state-of-the-art classification methods may degrade significantly with RFI. We then propose a number of counter measures to mitigate the impact of RFI and improve the location-oriented activity recognition performance. We are also the first to use complex-valued CSI to improve the performance in the environment with RFI
    corecore