A trust-based approach to control privacy exposure in Ubiquitous Computing environments

Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Yonil Zhung, Sungyoung Lee, Young Koo Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

In Ubiquitous Computing environments, service servers play a central role of actively providing information about a person to help people determine whether he is available for contact or not. A tradeoff exists in these systems: the more sources of data and the higher fidelity in those sources which can improve people's decision, the more privacy reduction. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper, we first show how trust evaluation process of the user's system can be based on previous interactions and peer recommendations. A solution then relied on trust to control privacy disclosure is proposed that depends on pre-defined privacy policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system.

Original languageEnglish
Title of host publication2007 IEEE International Conference on Pervasive Services, ICPS
Pages149-152
Number of pages4
DOIs
Publication statusPublished - 2007
Event2007 IEEE International Conference on Pervasive Services, ICPS - Istanbul, Turkey
Duration: 2007 Jul 152007 Jul 20

Publication series

Name2007 IEEE International Conference on Pervasive Services, ICPS

Other

Other2007 IEEE International Conference on Pervasive Services, ICPS
Country/TerritoryTurkey
CityIstanbul
Period07/7/1507/7/20

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'A trust-based approach to control privacy exposure in Ubiquitous Computing environments'. Together they form a unique fingerprint.

Cite this