The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Parallel and Distributed Association Mining: A Survey
IEEE Concurrency
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A High Performance Privacy-Oriented Location System
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Incorporating privacy policy into an anonymity-based privacy-preserving ID-Based service platform
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Hi-index | 0.00 |
Privacy preservation is crucial in the ubiquitous computing because a lot of privacy-sensitive information can be collected and distributed in the ubiquitous computing environment The anonymity-based approach is one of well-known ones for privacy preservation in ubiquitous computing It allows users to use pseudonyms when they join in a service area of the ubiquitous computing environment This approach can protect users' privacy by hiding the user's real IDs, but it makes it difficult to provide ID-based services like buddy service, safety alert service, and so on This paper proposes a multiagent architecture to make it possible to provide ID-based services in the anonymity-based privacy awareness systems The proposed architecture employs so-called the white page agent which maintains the current pseudonyms of users and allows users to get the pseudonyms of other users from the agent Even though the white page agent contains the pseudonyms of users, it is enforced not to disclose the association of real user IDs with pseudonyms by adopting encryption techniques This paper presents in detail the proposed architecture, its constituent components and their roles and how they provide ID-based services in the anonymity-based system As an example, it also presents how buddy service can take place in the proposed architecture.