Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection
نویسندگان
چکیده
Today’s mobile and pervasive computing devices are embedded with increasingly powerful sensing capabilities that enable them to provide exceptional spatio-temporal context acquisition that is not possible with traditional static sensor networks alone. As a result, enabling these devices to share context information with one another has a great potential for enabling mobile users to exploit the nearby cyber and physical environments in participatory or human-centric computing. However, because these mobile devices are owned by and sense information about individuals, sharing the acquired context raises significant privacy concerns. In this paper, we define Magpie, which implements an alternative to existing all-or-nothing sharing solutions. Magpie integrates a decentralized context-dependent and adaptive trust scheme with a privacy preserving sharing mechanism to evaluate the risk of disclosing potentially private data. The proposed method uses this assessment to dynamically determine the sharing strategy and the quality of the context shared. Conceptually, Magpie allows devices to actively obfuscate context information so that sharing is still useful but does not breach user privacy. To our knowledge this is the first work to take both trust relationships and users’ individual privacy sensitivities into account to balance sharing and privacy preservation. We describe Magpie and then evaluate it in a series of application-oriented experiments running on the Opportunistic Network Environment (ONE) simulator.
منابع مشابه
Trust Based Privacy Protection Method in Pervasive Computing
In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...
متن کاملThe Role of Identity in Pervasive Computational Trust
A central element in the human notion of trust is to identify whom or what is under consideration. In the digital world, this is harder to achieve due to more or less trustworthy technical infrastructure between interacting parties. However, we argue that uncertain identification may enhance privacy protection. Pervasive computing – digital and real world becoming one – has also good sides: con...
متن کاملCardea: Context-Aware Visual Privacy Protection from Pervasive Cameras
The growing popularity of mobile and wearable devices with built–in cameras, the bright prospect of camera related applications such as augmented reality and life–logging system, the increased ease of taking and sharing photos, and advances in computer vision techniques have greatly facilitated people’s lives in many aspects, but have also inevitably raised people’s concerns about visual privac...
متن کاملTrustworthiness in Pervasive and Ubiquitous Environment
The technology needed to realize the goal of fully pervasive and mobile computing is rapidly coming together. Its emergence represents an unprecedented opportunity to expand the power of the Internet beyond traditional computing devices, enabling a world of smart spaces and smart appliances providing often invisible support for a variety of context-aware services with tremendous environmental a...
متن کاملA trust-based secure service discovery (TSSD) model for pervasive computing
0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.07.014 * Corresponding author. Tel.: +4142885222. E-mail address: [email protected] (S.I. Aham To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015