Information Technology Reference
In-Depth Information
The main unobtrusiveness challenge is to provide a balance between usability
and privacy [2].
Several projects and models have already addressed some concerns of privacy
protection. Privacy Sensitive Information Diluting Mechanism (PSIDM) [3] pro-
vides location privacy without any concern about model unobtrusiveness. Mix
networks and mix nodes model [4] provides location privacy without looking
into model unobtrusiveness. Pseudonyms and mix-zones model [5] provides both
location and identity privacy but it does not have any concern for model un-
obtrusiveness. LocServ [6] model just supports location privacy with attention
to its unobtrusiveness. Mist model [7] provides location and identity privacy for
the user regarding the model for unobtrusiveness. Paws (Privacy Awareness Sys-
tem) [8] supports user identity and location privacy with concern about model
unobtrusiveness. Geopriv model [9] provides user location privacy but it was
not concerned about model unobtrusiveness. Spirit [10] provides location privacy
with concern about model unobtrusiveness. QoP (Quality of Privacy) model [11]
provides location, content, and identity privacy and provides a balance between
user privacy and services that can be provided for him.
Today enhanced pervasive devices providing real time user information neces-
sitates researchers to provide user with control over his time privacy.
In this paper we first present a brief description of UPM [12] at section 2,
to provide needed background for describing the model proposed evaluation.
Then in section 3, we evaluate the model in detail and show the models ability
to provide users with control over content, identity, location, and time privacy
with less than 10% unobtrusiveness. Conclusion and future works are presented
in section 4.
2 The User-centered Privacy Model
Five parties are communicating in UPM as follows:
1. User: User requests for services.
2. Service provider: Provides services for the user using the data that is provided
by the owner.
3. Owner: Owner is the content provider.
4. User light houses: Each user has one or more light houses. Light houses are
user trusted parties that contain user identity information but they never
have any information regarding user location, content, and time. Light houses
provide other parties with user identity information based on user identity
privacy policy.
5. Portals: portals are wireless nodes managing user context. Each context con-
sists of one portal which plays two roles:
(a) All devices of the context - including users device - sending and receiving
data through the portal.
(b) Portal manages all devices that gather user private information in the
context. By default a portal has access just to user location informa-
tion but it does not have any access to user identity, content, and time
information.
 
Search WWH ::




Custom Search