1st International ICST Workshop on Mobile and Ubiquitous Context Aware Systems and Applications

Research Article

Privacy Infusion in Ubiquitous Computing

  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451030,
        author={Gautham  Pallapa and Mohan  Kumar and Sajal  K. Das},
        title={Privacy Infusion in Ubiquitous Computing},
        proceedings={1st International ICST Workshop on Mobile and Ubiquitous Context Aware Systems and Applications},
        publisher={IEEE},
        proceedings_a={MUBICA},
        year={2008},
        month={2},
        keywords={Context  Information Fusion  Middleware  Privacy  Ubiquitous Computing},
        doi={10.1109/MOBIQ.2007.4451030}
    }
    
  • Gautham Pallapa
    Mohan Kumar
    Sajal K. Das
    Year: 2008
    Privacy Infusion in Ubiquitous Computing
    MUBICA
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451030
Gautham Pallapa1,*, Mohan Kumar1,*, Sajal K. Das1,*
  • 1: Department of Computer Science and Engineering University of Texas, Arlington Arlington, Texas 76019
*Contact email: pallapa@cse.uta.edu, kumar@cse.uta.edu, das@cse.uta.edu

Abstract

In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of context-aware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.