Information Technology Reference
In-Depth Information
These parties are communicating within three layers as follow:
1. User context layer: This layer surrounds user. Context includes one portal
and several devices which are capable of gathering user private data. These
devices are managed and controlled by the portal. In a specific time, user can
be just within one portal covered environment but user might move between
several portals experiencing different context.
2. Service layer: User light houses and service providers are in this layer.
3. Owner layer: Information owners are in this layer to provide required con-
tents for service providers.
In this model, user sends data to the portal without sending any information of
his identity. Portal hides user location and forwards data to the light house. So
the user portal just knows user location and the user light house just knows user
identity. User light house will be responsible to communicate with the service
provider. Service provider receives its needed contents through owners.
2.1 The Model Privacy Files
The model privacy management method is based on XML files for describing
privacy policies and preferences. Each user, portal, and service provider has two
XML privacy files, namely privacy policy file and privacy preferences file. These
two files format and tags are similar for each party. The privacy preferences file
describes preferred level of privacy to communicate with other parties. Privacy
policy file describes each party current and agreed privacy level during commu-
nication with other parties.
These XML files define each party identity, location, and time privacy. The
identity privacy tag value can be No ID , Confirm ID ,or Real ID .
Real ID value means the party will provide or ask the real identity in com-
munication with other parties.
Confirm ID means the party will use a pseudonym ID that its trust ability
and access level has been confirmed by a common trusted third party.
No ID means the party will use or ask an anonymous ID in communicating
with other parties. Location privacy tag value can be No Loc , Confirm Loc ,or
Real Loc .
Real Loc value means the party will provide or ask the exact location infor-
mation of the other communicating parties.
Confirm Loc value means the party will confirm its existence in a certain area
through a common trusted third party or ask the other parties to confirm their
existence in a certain area.
No Loc value means the party will not reveal or ask any location information
in communicating with other parties. The time privacy tag value can be No time ,
Confirm time ,and Real time .
No time value means there is no time limitation to communicate with other
parties.
Confirm time value means the parties are confined to communicate just within
a pre-specified time period.
Search WWH ::




Custom Search