Shadow: a middleware in pervasive computing environment for user controllable privacy protection

  • Authors:
  • Wentian Lu;Jun Li;Xianping Tao;Xiaoxing Ma;Jian Lu

  • Affiliations:
  • State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China;State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China

  • Venue:
  • EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In ubiquitous and pervasive computing, after data owner's information is collected, data collector should be careful of disclosing data owner's information for privacy reasons. In this paper, we present requirements and challenges when designing solutions for such data collector end protection. Policies, accuracy and anonymity of context should be all taken into account. Based on this, we design a middleware Shadow for user controllable privacy protection, which is deployed on data collectors who have large volume of data and powerful computation abilities. Shadow has a contextual rule based access control policy mechanism, enriched with methods of generating blurred context and guaranteeing information anonymous, and we implement it under an ontology based context model.