Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy

Tinghuai Ma1, Sen Yan2, Jin Wang3 and Sungyoung Lee3

  1. Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology
    210044 Nanjing, China
    thma@nuist.edu.cn
  2. School of Computer & Software, Nanjing University of Information Science & Technology
    210044 Nanjing, China
    perhaps2532@gmail.com
  3. Department of Computer Engineering, Kyung Hee University
    446701, Suwon, South Korea
    {wangjin,sylee}@oslab.khu.ac.kr

Abstract

In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. Privacy system can decrease the interaction, while in other circumstance the system strengthens and enhances the privacy preserving. Thus we strike a balance between two goals of Ubiquitous Computing: interaction and privacy preserving.

Key words

ubiquitous computing, privacy preserving, classification, hierarchy

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS110315055M

Publication information

Volume 8, Issue 4 (October 2011)
Cyber-Physical Networks and Software
Year of Publication: 2011
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Ma, T., Yan, S., Wang, J., Lee, S.: Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy. Computer Science and Information Systems, Vol. 8, No. 4, 1185-1206. (2011), https://doi.org/10.2298/CSIS110315055M