6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments

Download477 downloads
  • @INPROCEEDINGS{10.4108/ICST.MOBIQUITOUS2009.6853,
        author={Feng Zhu and Sandra Carpenter and Ajinkya Kulkarni and Chockalingam Chidambaram and Shruti Pathak},
        title={Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments},
        proceedings={6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={IEEE},
        proceedings_a={MOBIQUITOUS},
        year={2009},
        month={11},
        keywords={game theory identity management privacy ubiqitous computing},
        doi={10.4108/ICST.MOBIQUITOUS2009.6853}
    }
    
  • Feng Zhu
    Sandra Carpenter
    Ajinkya Kulkarni
    Chockalingam Chidambaram
    Shruti Pathak
    Year: 2009
    Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments
    MOBIQUITOUS
    IEEE
    DOI: 10.4108/ICST.MOBIQUITOUS2009.6853
Feng Zhu1,*, Sandra Carpenter2,*, Ajinkya Kulkarni1,*, Chockalingam Chidambaram1,*, Shruti Pathak1,*
  • 1: Department of Computer Science at The University of Alabama in Huntsville, Huntsville, AL 35899. Phone: 256-824-6255, fax:256-824-6239
  • 2: Department of Psychology at The University of Alabama in Huntsville, Huntsville, AL 35899.
*Contact email: fzhu@cs.uah.edu, Sandra.Carpenter@uah.edu, ask0004@cs.uah.edu, cc0006@cs.uah.edu, spathak@cs.uah.edu

Abstract

Various miniaturized computing devices that store our identities are emerging rapidly. They allow our identity information to be easily exposed and accessed via wireless networks. When identity information is associated with our personal and context information that is gathered by ubiquitous computing devices, personal privacy might be unprecedentedly sacrificed. People, however, have different privacy protection skills, awareness, and privacy preferences. Individuals can be uniquely identified on the basis of only a few identity elements used in combination. To the best of our knowledge, this is the first study to understand the following issues and their relations: a) what identity elements people think are important; b) what actions people claim to take to protect their identities and privacy; c) privacy concerns; d) how people expose their identities in ubiquitous computing environments; and e) how our rational identity exposure model can help to minimize identity exposure. We build a simulated ubiquitous computing shopping system, called InfoSource. It consists of two applications and our rational identity exposure model. We present our experiments and statistical analysis results. Our data show that exposure decisions depend on participants’ attitudes about maintaining privacy, but they do not depend on participants’ concerns and claimed actions related to identity exposure. Our RationalExposure model helped participants to minimize unnecessary exposures.