A trust-based approach to control privacy exposure in Ubiquitous Computing environments

Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Yonil Zhung, Sungyoung Lee, Young Koo Lee, Heejo Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)

    Abstract

    In Ubiquitous Computing environments, service servers play a central role of actively providing information about a person to help people determine whether he is available for contact or not. A tradeoff exists in these systems: the more sources of data and the higher fidelity in those sources which can improve people's decision, the more privacy reduction. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous interactions and peer recommendations. A solution then relied on trust to control privacy disclosure is proposed that depends on pre-defined privacy policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.

    Original languageEnglish
    Title of host publication2007 IEEE International Conference on Pervasive Services, ICPS
    Pages149-152
    Number of pages4
    DOIs
    Publication statusPublished - 2007
    Event2007 IEEE International Conference on Pervasive Services, ICPS - Istanbul, Turkey
    Duration: 2007 Jul 152007 Jul 20

    Publication series

    Name2007 IEEE International Conference on Pervasive Services, ICPS

    Other

    Other2007 IEEE International Conference on Pervasive Services, ICPS
    Country/TerritoryTurkey
    CityIstanbul
    Period07/7/1507/7/20

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Hardware and Architecture
    • Software

    Fingerprint

    Dive into the research topics of 'A trust-based approach to control privacy exposure in Ubiquitous Computing environments'. Together they form a unique fingerprint.

    Cite this