Abstract
Hiding users’ real ID is one of promising approaches to protecting their privacy in ubiquitous computing environment. Policy-based privacy protection is also known as another useful approach. In the previous work, we have proposed a privacy preservation platform, called AP3(the Anonymity-based Privacy-Preserving ID-based service Platform), which allows users to use pseudonyms for hiding real IDs and enables ID-based services like buddy service at the same time in the ubiquitous environment. AP3 does not yet support privacy policy mechanism which allows users to control the accessibility of others to themselves according to their preference. In this paper, we propose an extended version of AP3, named PAP3(the Policy-incorporated Anonymity-based Privacy-Preserving ID-based service Platform), which incorporates a privacy policy mechanism to control the accessibility about which application or user can get access to whom at what time and at which place. This paper presents the PAP3 architecture and describes how to enforce privacy policy for the access control in PAP3.
This work was supported by the Regional Research Centers Program of the Ministry of Education & Human Resources Development in Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lee, K.M., Lee, S.H.: A Multiagent Architecture for Privacy-Preserving ID-based Service in Ubiquitous Computing Environment. LNCS (LNAI), vol. 3339, pp. 14–25. Springer, Heidelberg (2004)
Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2002)
Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-Aware Location Sensor Networks (2003), http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.html
Jiang, X., Landay, J.: Modeling Privacy Control in Context-aware Systems. IEEE Pervasive 1(3) (2002)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)
Lederer, S., Dey, A.K., Mankoff, J.: Everyday Privacy in Uniquitous Computing Environment. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, Springer, Heidelberg (2002)
Prasad, R., Schoo, P., Wang, H.: An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. In: Proc. of SAINT 2004: The 2004 Symposium on Applications & Internet (2004)
Osbakk, P., Ryan, N.: Expressing Privacy Preferences in terms of Invasiveness. In: Position Paper for the 2nd UK-UbiNet Workshop(University of Cambridge, UK) (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K.M., Lee, JH., Chun, M.G. (2005). Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_146
Download citation
DOI: https://doi.org/10.1007/11552413_146
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28894-7
Online ISBN: 978-3-540-31983-2
eBook Packages: Computer ScienceComputer Science (R0)