skip to main content
10.1145/990064.990087acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

An architecture for privacy-sensitive ubiquitous computing

Published:06 June 2004Publication History

ABSTRACT

Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.

References

  1. AllNurses.com. http://allnurses.com/]]Google ScholarGoogle Scholar
  2. Directive 95/46/EC. http://europa.eu.int/ISPO/legal/en/dataprot/directiv/directiv.html]]Google ScholarGoogle Scholar
  3. MedicAlert. http://www.medicalert.org]]Google ScholarGoogle Scholar
  4. Abowd, G.D., C.G. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton, Cyberguide: A Mobile Context-Aware Tour Guide. Baltzer/ACM Wireless Networks 1997. 3(5): p. 421--433.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Adams, A. Multimedia Information Changes the Whole Privacy Ball Game. In Proceedings of Computers, Freedom, and Privacy. Toronto, Canada: ACM Press. pp. 25--32 2000.]] Google ScholarGoogle Scholar
  6. Addlesee, M., R. Curwen, S.H. Newman, P. Steggles, A. Ward, and A. Hopper, Implementing a Sentient Computing System. IEEE Computer 2001. 34(8): p. 50--56.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. AT&T, AT&T Wireless mMode - Find Friends. http://www.attwireless.com/mmode/features/findit/FindFriends/]]Google ScholarGoogle Scholar
  8. Barkhuus, L. and A.K. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In Proceedings of INTERACT 2003, 9th IFIP TC13 International Conference on Human-Computer Interaction. pp. To appear 2003.]]Google ScholarGoogle Scholar
  9. Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW'93). Milan, Italy: Kluwer Academic Publishers 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Beresford, A. and F. Stajano, Location Privacy in Pervasive Computing, IEEE Pervasive Computing, vol. 2(1): pp. 46--55, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Brin, D., The Transparent Society. Reading, MA: Perseus Books, 1998.]]Google ScholarGoogle Scholar
  12. Brown, P.J. and G.J.F. Jones, Context-aware Retrieval: Exploring a New Environment for Information Retrieval and Information Filtering. Personal and Ubiquitous Computing 2001. 5(4): p. 253--263.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Burrell, J., G.K. Gay, K. Kubo, and N. Farina. Context-Aware Computing: A Test Case. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 1--15 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Cadiz, J. and A. Gupta, Privacy Interfaces for Collaboration. Technical Report MSR-TR-2001-82, Microsoft Research, Redmond, WA 2001.]]Google ScholarGoogle Scholar
  15. Castro, P. and R. Muntz, Managing Context for Smart Spaces. IEEE Personal Communications 2000. 5(5).]]Google ScholarGoogle Scholar
  16. Chen, G. and D. Kotz. Context Aggregation and Dissemination in Ubiquitous Computing Systems. In Proceedings of Fourth IEEE Workshop on Mobile Computing Systems and Applications. pp. 105--114 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Crowley, J.L., J. Coutaz, G. Rey, and P. Reignier. Perceptual Components for Context Aware Computing. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 117--134 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Cuellar, J., J. John B. Morris, D. Mulligan, J. Peterson, and J. Polk, Geopriv requirements (Internet Draft). 2003, IETF. http://www.ietf.org/internet-drafts/draft-ietf-geopriv-reqs-04.txt]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Davies, N., S.P. Wade, A. Friday, and G.S. Blair. Limbo: A tuple space based platform for adaptive mobile applications. In Proceedings of The International Conference on Open Distributed processing / Distributed Platforms (ICODP/ICDP '97). pp. 291--302 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Dey, A.K., D. Salber, and G.D. Abowd, A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction (HCI) Journal 2001. 16(2-3): p. 97--166.]]Google ScholarGoogle Scholar
  21. Doheny-Farina, S., The Last Link: Default = Offline, Or Why Ubicomp Scares Me, Computer-mediated Communication, vol. 1(6): pp. 18--20, 1994.]]Google ScholarGoogle Scholar
  22. Edwards, J., Location Privacy Protection Act of 2001. http://www.techlawjournal.com/cong107/privacy/location/s1164is.asp]]Google ScholarGoogle Scholar
  23. Edwards, W.K., M.W. Newman, J.Z. Sedivy, T.F. Smith, and S. Izadi. Challenge: Recombinant Computing and the Speakeasy Approach. In Proceedings of Eighth ACM International Conference on Mobile Computing and Networking (MobiCom 2002). pp. 279--286 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Espinoza, F., P. Persson, A. Sandin, H. Nyström, E. Cacciatore, and M. Bylund. GeoNotes: Social and Navigational Aspects of Location-Based Information Systems. In Proceedings of Ubicomp 2001. Atlanta, GA. pp. 2--17 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Falk, J., P. Ljungstrand, S. Björk, and R. Hansson. Pirates: Proximity-Triggered Interaction in a Multi-Player Game. In Proceedings of Human Factors in Computing Systems: CHI 2001 (Extended Abstracts). pp. 119--120 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Federal Communications Commission, Enhanced 911. http://www.fcc.gov/911/enhanced/]]Google ScholarGoogle Scholar
  27. Frelinghuysen, R., Wireless Privacy Protection Act of 2003. http://www.theorator.com/bills108/hr71.html]]Google ScholarGoogle Scholar
  28. Garfinkel, S., Database Nation: The Death of Privacy in the 21st Century: O'Reilly & Associates, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Geocaching. http://www.geocaching.com/]]Google ScholarGoogle Scholar
  30. Grimm, R., J. Davis, E. Lemar, A. Macbeth, S. Swanson, T. Anderson, B. Bershad, G. Borriello, S. Gribble, and D. Wetherall, Programming for pervasive computing environments. Technical Report UW-CSE-01-06-01, University of Washington Department of Computer Science and Engineering, Seattle, WA 2001.]]Google ScholarGoogle Scholar
  31. Griswold, W.G., P. Shanahan, S.W. Brown, and R. Boyer, ActiveCampus - Experiments in Community-Oriented Ubiquitous Computing. Technical Report CS2003-0765, Computer Science and Engineering, UC San Diego 2003.]]Google ScholarGoogle Scholar
  32. Grudin, J., Desituating Action: Digital Representation of Context. Human-Computer Interaction (HCI) Journal 2001. 16(2-4).]]Google ScholarGoogle Scholar
  33. Grudin, J. and E. Horvitz, Presenting choices in context: approaches to information sharing. 2003: Workshop on Ubicomp communities: Privacy as Boundary Negotiation. http://guir.berkeley.edu/pubs/ubicomp2003/privacyworkshop/papers.htm]]Google ScholarGoogle Scholar
  34. Gruteser, M. and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of The First International Conference on Mobile Systems, Applications, and Services (MobiSys 2002) 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Harper, R.H.R., Why Do People Wear Active Badges? Technical Report EPC-1993-120, Rank Xerox, Cambridge 1993.]]Google ScholarGoogle Scholar
  36. Heer, J., A. Newberger, C. Beckmann, and J.I. Hong. liquid: Context-Aware Distributed Queries. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003. Seattle, WA: Springer-Verlag. pp. 140--148 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  37. Hindus, D., S.D. Mainwaring, N. Leduc, A.E. Hagström, and O. Bayley, Casablanca: Designing Social Communication Devices for the Home. CHI Letters (Human Factors in Computing Systems: CHI 2001), 2001. 3(1): p. 325--332.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Hong, J.I., G. Boriello, J.A. Landay, D.W. McDonald, B.N. Schilit, and J.D. Tygar. Privacy and Security in the Location-enhanced World Wide Web. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003 (Workshop on Ubicomp Communities: Privacy as Boundary Negotiation). Seattle, WA 2003.]]Google ScholarGoogle Scholar
  39. IBM Corporation, Enterprise Privacy Authorization Language (EPAL 1.1). http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/]]Google ScholarGoogle Scholar
  40. Jiang, X., N.Y. Chen, J.I. Hong, K. Wang, L.A. Takayama, and J.A. Landay. Siren: Context-aware Computing for Firefighting. In Proceedings of The Second International Conference on Pervasive Computing (Pervasive 2004). Vienna, Austria. pp. To Appear 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  41. Jiang, X., J.I. Hong, and J.A. Landay. Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing. In Proceedings of Ubicomp 2002. Göteborg, Sweden. pp. 176--193 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Johanson, B., A. Fox, and T. Winograd, The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms. IEEE Pervasive Computing 2002. 1(2): p. 67--74.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Kaasinen, E., User Needs for Location-aware Mobile Services. Personal and Ubiquitous Computing 2003. 7(1): p. 70--79.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Kaasinen, E., User Needs for Location-aware Mobile Services. Personal and Ubiquitous Computing 2003. 7(1): p. 70--79.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Korba, L. and S. Kenny. Towards Meeting the Privacy Challenge: Adapting DRM. In Proceedings of 2002 ACM Workshop on Digital Rights Management. Washington DC, USA 2002.]]Google ScholarGoogle Scholar
  46. Lamming, M. and M. Flynn. Forget-me-not: Intimate computing in support of human memory. In Proceedings of FRIEND 21: International Symposium on Next Generation Human Interfaces. Meguro Gajoen, Japan. pp. 125--128 1994.]]Google ScholarGoogle Scholar
  47. Langheinrich, M. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of Ubicomp 2002. Goteberg, Sweden. pp. 237-245 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of Ubicomp 2001. Atlanta, GA. pp. 273-291 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Lederer, S., J. Mankoff, and A.K. Dey. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proceedings of Extended Abstracts of CHI 2003, ACM Conference on Human Factors in Computing Systems. Fort Lauderdale, FL. pp. 724--725 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Lessig, L. The Architecture of Privacy. In Proceedings of Taiwan NET'98. Taipei, Taiwan 1998.]]Google ScholarGoogle Scholar
  51. Mayor, M., New Wireless Device Could Rescue Firefighters. 2001. http://www.wirelessnewsfactor.com/perl/story/9134.html]]Google ScholarGoogle Scholar
  52. Nagel, K., C.D. Kidd, T. O'Connell, A. Dey, and G.D. Abowd. The Family Intercom: Developing a Context-Aware Audio Communication System. In Proceedings of Ubicomp 2001. Atlanta, GA. pp. 176--183 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Olsen, D.R., S. Jefferies, T. Nielsen, W. Moyes, and P. Frederickson, Cross-modal Interaction using XWeb. CHI Letters, The 13th Annual ACM Symposium on User Interface Software and Technology: UIST 2000 2000. 2(2): p. 191--200.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. OnStar. http://www.onstar.com/]]Google ScholarGoogle Scholar
  55. Palen, L. and P. Dourish, Unpacking "Privacy" for a Networked World. CHI Letters (Human Factors in Computing Systems: CHI 2003), 2003. 5(1): p. 129--136.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Pascoe, J. The Stick-e Note Architecture: Extending the Interface Beyond the User. In Proceedings of International Conference on Intelligent User Interfaces. pp. 261--264 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Povey, D. Optimistic Security: A New Access Control Paradigm. In Proceedings of 1999 New Security Paradigms Workshop 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proceedings of MobiCom 2000: The Sixth Annual International Conference on Mobile Computing and Networking. Boston, Massachusetts: ACM Press. pp. 32--43 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Rhodes, B. and T. Starner. The Remembrance Agent: A Continuously Running Automated Information Retrieval System. In Proceedings of The First International Conference on The Practical Application of Intelligent Agents and Multi Agent Technology (PAAM '96). London, UK. pp. 487--495 1996.]]Google ScholarGoogle Scholar
  60. Román, M., C.K. Hess, R. Cerqueira, A. Ranganathan, R.H. Campbell, and K. Nahrstedt, Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing 2002. 1(4): p. 74--83.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Schilit, B.N., A Context-Aware System Architecture for Mobile Distributed Computing, Unpublished PhD, Columbia University, 1995. http://seattleweb.intel-research.net/people/schilit/schilit-thesis.pdf]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Schilit, B.N., N.I. Adams, and R. Want. Context-Aware Computing Applications. In Proceedings of Workshop on Mobile Computing Systems and Applications. Santa Cruz, CA: IEEE Computer Society, December 1994 1994.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Schilit, B.N., G. Borriello, W.G. Griswold, D. McDonald, A. Lamarca, J. Hong, E. Lazowska, A. Balachandran, and V. Iverson. Challenge: Ubiquitous Location-Aware Computing. In Proceedings of The First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH '03). San Diego, CA: ACM Press. pp. To Appear 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Sloane, L., Orwellian Dream Come True: A Badge That Pinpoints You, New York Times pp. 14, 1992.]]Google ScholarGoogle Scholar
  65. Spreitzer, M. and M. Theimer. Providing location information in a ubiquitous computing environment. In Proceedings of Fourteenth ACM Symposium on Operating System Principles. Asheville, NC: ACM Press, December 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Sweeney, L., k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 2002. 10(5): p. 557--570.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Talbott, S., The Trouble with Ubiquitous Technology Pushers, or: Why We'd Be Better Off without the MIT Media Lab. 2000. http://www.oreilly.com/people/staff/stevet/netfuture/2000/Jan0600_100.html]]Google ScholarGoogle Scholar
  68. Want, R., A. Hopper, V. Falcão, and J. Gibbons, The Active Badge Location System. ACM Transactions on Information Systems 1992. 10(1): p. 91--102.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Weiser, M., R. Gold, and J.S. Brown, The Origins of Ubiquitous Computing Research at PARC in the Late 1980s. IBM Systems Journal 1999. 38(4): p. 693--696.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Westin, A.F., Privacy and Freedom. New York NY: Atheneum, 1967.]]Google ScholarGoogle Scholar
  71. Whalen, J., You're Not Paranoid: They Really Are Watching You, Wired Magazine, vol. 3(3): pp. 95--85, 1995.]]Google ScholarGoogle Scholar

Index Terms

  1. An architecture for privacy-sensitive ubiquitous computing

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MobiSys '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services
                  June 2004
                  294 pages
                  ISBN:1581137931
                  DOI:10.1145/990064

                  Copyright © 2004 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 6 June 2004

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  MobiSys '04 Paper Acceptance Rate22of162submissions,14%Overall Acceptance Rate274of1,679submissions,16%

                  Upcoming Conference

                  MOBISYS '24

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader