Abstract
Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. That becomes serious especially when a user receives user centric services from a service provider by offering personal information, because the service can be of a higher quality if the user provides more personal information despite the increase of privacy violation risk. Therefore, this paper proposes a privacy protection method that realizes avoidance of unwanted information disclosure by controlling disclosable attributes according to the results from monitoring two elements: user background information of the provider and user community status. The monitoring is done before disclosing individual attributes corresponding to the privacy policy (i.e., the required anonymity level) by each user. The validity of the proposed methods was confirmed by a desk model.
Chapter PDF
References
Yamabe, T., Fujinami, K., Shoji, T., Nakamura, N., Nakajima, T.: PENATES: Privacy Protection Architecture for Context-Aware Environments. In: Computer Symposium, Tokyo, pp. 55–64 (2004)
Tamaru, S., Iwaya, A., Takashio, K., Tokuda, H.: An application Framework for Personalized Public Space Considering Privacy. IPSJ report in Japan, pp. 49–56, 2003-OS-93
Miyamoto, T., Takeuchi, T., Okuda, T., Harumoto, K., Ariyoshi, Y., Shimojo, S.: Proposal for profile control mechanism considering privacy and quality of personalization services. In: DEWS 2005, Japan, 6-A-01 (2005)
Imada, M., Takasugi, K., Ohta, M., Koyanagi, K.: LOOM: A Loosely managed privacy protection method for ubiquitous networking environments. IEICE Journal B in Japan J88-B(3), 563–573 (2005)
Nakanishi, K., Takashio, K., Tokuda, H.: A concept of location anonymization. IPSJ Journal in Japan 46(9), 2260–2268 (2005)
Hirotaka, N., Nobuhiro, N.: Service platform for privacy Controllable Tag. IPSJ report in Japan, 2007-UBI-16, pp. 57–63 (2007)
Sanda, T., Yamada, S., Kamioka, E.: Proposal for a method of privacy protection in ubiquitous computing environments. IPSJ Journal in Japan 2003(93(MLB-26)), 45–51 (2003)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Myles, G., Friday, A., Davies, N.: Protection Privacy in environments with location-based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based System 10(5), 557–570 (2002)
Pareschi, L., Riboni, D., Bettini, C.: Protecting users’ anonymity in pervasive computing environments. In: Sixth Annual IEEE International Conf. on Per. Com. and Communications, pp. 11–19 (2008)
Hong J. I., Landy, J.A.: An architecture for privacy-sensitive ubiquitous computing. In MobiSYS 2004, Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services, pp. 177–189 (2004)
Sato, K.: Life-log: About the Profit Use of the Cellular Phone Behavional Data that Considers the Privacy Protection. IPSJ Magazine in Japan 50(7), 598–602 (2009)
Seigneur, J.-M., Jensen, C.D.: Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 93–107. Springer, Heidelberg (2004)
Matsuo, Y., Tomobe, H., Hasida, K., Nakajima, H., Ishizuka, M.: Social Network Extraction from the Web information. JSAI Journal in Japan 20, 46–56 (2005)
ArtiSoc, http://mas.kke.co.jp/
Hamamoto, K., Tahara, Y., Ohsuga, A.: Proposal for Profile Opening Method Considering Privacy by Anonymization. In: JWEIN 2010 Symposium in Japan, Proceeding 2010 (August 2010)
Kato, Y., Hasegawa, T.: Effect of Advanced Demand Signals scheme. In: IEEE VTS 54th Vehicular Technology Conference, VTC 2001 Fall, pp. 708–712 (2002)
Kaneda, T.: Kozo Keikaku Engineering Inc., Nagoya-Ins.of Tech. Univ.: Pedestrian Simulation by Artisoc, Japan, pp. 79–114 (2010) ISBN 978-4-904701-17-1
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hamamoto, K., Tahara, Y., Ohsuga, A. (2012). Methods for Privacy Protection Considering Status of Service Provider and User Community. In: Laud, P. (eds) Information Security Technology for Applications. NordSec 2011. Lecture Notes in Computer Science, vol 7161. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29615-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-29615-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29614-7
Online ISBN: 978-3-642-29615-4
eBook Packages: Computer ScienceComputer Science (R0)