Enhancing privacy by applying information flow modelling in pervasive systems

  • Authors:
  • Steffen Ortmann;Peter Langendörfer;Michael Maaser

  • Affiliations:
  • IHP microelectronics, Frankfurt;IHP microelectronics, Frankfurt;IHP microelectronics, Frankfurt

  • Venue:
  • OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In today's working and shopping environment a lot of sources are present that collect data of people located in those environments. The data gathered by devices such as video cameras, RFID tags, use of credit cards etc. can be combined in order to deduce information which cannot be "measured" directly. In this paper we introduce deduction rules that help to describe which information can be inferred from which sources. Using these rules all information that can be gathered by a pervasive system can be identified and linked to the sources of the raw input data. By that the pervasive system is represented as an information flow graph. In order to enhance privacy we use this graph to determine the data sources, e.g. video cameras or RFID tags, that need to be switched off to adapt a given system to privacy requirements of a certain person. Due to the fact that we do not consider an individual device a data source but cluster those devices into a single source of a certain type, our approach scales well even for large sensor networks. Our algorithms used to build and analyze the information flow graph offer low calculation complexities. Thus, they are well suited to be executed on mobile devices giving the end user back some control over her/his data. Even if she/he cannot influence the system, she/he at least knows which information is exposed to others.