iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/11552413_146
Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform | SpringerLink
Skip to main content

Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Abstract

Hiding users’ real ID is one of promising approaches to protecting their privacy in ubiquitous computing environment. Policy-based privacy protection is also known as another useful approach. In the previous work, we have proposed a privacy preservation platform, called AP3(the Anonymity-based Privacy-Preserving ID-based service Platform), which allows users to use pseudonyms for hiding real IDs and enables ID-based services like buddy service at the same time in the ubiquitous environment. AP3 does not yet support privacy policy mechanism which allows users to control the accessibility of others to themselves according to their preference. In this paper, we propose an extended version of AP3, named PAP3(the Policy-incorporated Anonymity-based Privacy-Preserving ID-based service Platform), which incorporates a privacy policy mechanism to control the accessibility about which application or user can get access to whom at what time and at which place. This paper presents the PAP3 architecture and describes how to enforce privacy policy for the access control in PAP3.

This work was supported by the Regional Research Centers Program of the Ministry of Education & Human Resources Development in Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lee, K.M., Lee, S.H.: A Multiagent Architecture for Privacy-Preserving ID-based Service in Ubiquitous Computing Environment. LNCS (LNAI), vol. 3339, pp. 14–25. Springer, Heidelberg (2004)

    Google Scholar 

  2. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  3. Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2002)

    Article  Google Scholar 

  4. Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-Aware Location Sensor Networks (2003), http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.html

  5. Jiang, X., Landay, J.: Modeling Privacy Control in Context-aware Systems. IEEE Pervasive 1(3) (2002)

    Google Scholar 

  6. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, p. 237. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Lederer, S., Dey, A.K., Mankoff, J.: Everyday Privacy in Uniquitous Computing Environment. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, Springer, Heidelberg (2002)

    Google Scholar 

  8. Prasad, R., Schoo, P., Wang, H.: An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. In: Proc. of SAINT 2004: The 2004 Symposium on Applications & Internet (2004)

    Google Scholar 

  9. Osbakk, P., Ryan, N.: Expressing Privacy Preferences in terms of Invasiveness. In: Position Paper for the 2nd UK-UbiNet Workshop(University of Cambridge, UK) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K.M., Lee, JH., Chun, M.G. (2005). Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_146

Download citation

  • DOI: https://doi.org/10.1007/11552413_146

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28894-7

  • Online ISBN: 978-3-540-31983-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics