Trust Based Privacy Protection Method in Pervasive Computing

نویسندگان

  • Feng Gao
  • Jingsha He
  • Shunan Ma
چکیده

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establishment and communication process may involve privacy information exchange. Consequently, a method for integrate the privacy protection methods and deal with privacy and trust tradeoff is necessary. In this paper, we propose a novel trust based privacy protection method by using a three levels trust based privacy protection model (TPPM). Our main contributions include: (1) TPPM can integrate the various privacy protection methods and specify privacy policies; (2) TPPM can automatic make privacy disclose decision with achieving the goal of less privacy information loss and more trust gain during the trust establishment and the interaction process; (3) our method can be used in kinds of applications scenarios flexibly. Simulation results and analysis show our method can accomplish privacy preserving and fast trust establishment well. Index Terms privacy protection; trust; pervasive computing; ontology; privacy loss entropy; trust gain entropy

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of Identity in Pervasive Computational Trust

A central element in the human notion of trust is to identify whom or what is under consideration. In the digital world, this is harder to achieve due to more or less trustworthy technical infrastructure between interacting parties. However, we argue that uncertain identification may enhance privacy protection. Pervasive computing – digital and real world becoming one – has also good sides: con...

متن کامل

Pervasive Computing, Privacy and Distribution of the Self

The emergence of what is commonly known as “ambient intelligence” or “ubiquitous computing” means that our conception of privacy and trust needs to be reconsidered. Many have voiced their concerns about the threat to privacy and the more prominent role of trust that have been brought about by emerging technologies. In this paper, I will present an investigation of what this means for the self a...

متن کامل

Trustworthiness in Pervasive and Ubiquitous Environment

The technology needed to realize the goal of fully pervasive and mobile computing is rapidly coming together. Its emergence represents an unprecedented opportunity to expand the power of the Internet beyond traditional computing devices, enabling a world of smart spaces and smart appliances providing often invisible support for a variety of context-aware services with tremendous environmental a...

متن کامل

Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection

Today’s mobile and pervasive computing devices are embedded with increasingly powerful sensing capabilities that enable them to provide exceptional spatio-temporal context acquisition that is not possible with traditional static sensor networks alone. As a result, enabling these devices to share context information with one another has a great potential for enabling mobile users to exploit the ...

متن کامل

Software Behavior Based Trustworthiness Attestation For Computing Platform

With a prevalence of pervasive computing, especially cloud computing , the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the conti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012