Privacy preserving in ubiquitous computing: Classification & hierarchy

نویسندگان

  • Tinghuai Ma
  • Sen Yan
  • Jin Wang
  • Sungyoung Lee
چکیده

In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. Privacy system can decrease the interaction, while in other circumstance the system strengthens and enhances the privacy preserving. Thus we strike a balance between two goals of Ubiquitous Computing: interaction and privacy preserving.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...

متن کامل

Literature Survey of Association Rule Based Techniques for Preserving Privacy

The paper gives an overview of privacy preserving in association rule mining techniques. In this paper, all the present privacy preserving using association rule hiding techniques are discussed. This paper also proposes a classification hierarchy that sets the basis for analyzing the work which has been performed in this context. A detailed review of the work accomplished in this area is also g...

متن کامل

A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment

During service discovery, preserving privacy of end users and service providers is one of the challenging research issues in ubiquitous computing environment (UCE). To solve this issue, we define service group and classify it into two cases: public service and private service. End users’ privacy is important in public service group while privacy of end users and service providers are important ...

متن کامل

A Privacy Preserving Overlay for Active Spaces

Based on our experience in building and deploying ubiquitous computing environments, we identify some design guidelines for privacy. We also propose a novel mechanism that meets these guidelines and provides a practical and reasonable tradeoff between user privacy and environment automation and personalization.

متن کامل

Privacy Preserving Collaborative Filtering using Biclustering in Ubiquitous Computing Environments

Privacy concerns are a major hurdle in the success of personalized services in ubiquitous computing environments. Personalized recommendations are usually served using Collaborative Filtering techniques. In this paper, we propose a framework for privacy preserving collaborative filtering in ubiquitous computing environments. The proposed framework is based on a biclustering algorithm which empl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Comput. Sci. Inf. Syst.

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2011