Skip to main content
Top
Published in: Annals of Telecommunications 1-2/2014

01-02-2014

A survey on addressing privacy together with quality of context for context management in the Internet of Things

Authors: Sophie Chabridon, Romain Laborde, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez

Published in: Annals of Telecommunications | Issue 1-2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Making the Internet of Things (IoT) a reality will contribute to extend the context-aware ability of numerous sensitive applications. We can foresee that the context of users will include not only their own spatio-temporal conditions but also those of the things situated in their ambient environment and at the same time, thanks to the IoT, those that are located in other remote spaces. Consequently, next-generation context managers have to interact with the IoT underlying technologies and must, even more than before, address both privacy and quality of context (QoC) requirements. In this article, we show that the notions of privacy and QoC are intimately related and sometimes contradictory and survey the recent works addressing them. Current solutions usually consider only one notion, and very few of them started to bridge privacy and QoC. We identify some of the remaining challenges that next-generation context managers have to deal with to favour users’ acceptability by providing both the optimal QoC level and the appropriate privacy protection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abid Z, Chabridon S, Conan D (2009) A framework for quality of context management. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin Abid Z, Chabridon S, Conan D (2009) A framework for quality of context management. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
2.
go back to reference Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference
3.
go back to reference Alcalde Bagüés S, Zeidler A, Fernández-Valdivielso C, Matias I (2007) Disappearing for a while-using white lies in pervasive computing. In: Proceedings of the ACM workshop on privacy in electronic society, ACM, pp 80–83 Alcalde Bagüés S, Zeidler A, Fernández-Valdivielso C, Matias I (2007) Disappearing for a while-using white lies in pervasive computing. In: Proceedings of the ACM workshop on privacy in electronic society, ACM, pp 80–83
4.
go back to reference Arcangeli J-P, et al (2012) INCOME—multi-scale context management for the Internet of Things. In: International conference on ambient intelligence (AmI). Lecture notes in computer science, vol 7683. Springer, Berlin Arcangeli J-P, et al (2012) INCOME—multi-scale context management for the Internet of Things. In: International conference on ambient intelligence (AmI). Lecture notes in computer science, vol 7683. Springer, Berlin
5.
go back to reference Ashley P, Hada S, et al (2003) Enterprise privacy authorization language (EPAL 1.2) Ashley P, Hada S, et al (2003) Enterprise privacy authorization language (EPAL 1.2)
6.
go back to reference Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
7.
go back to reference Bai G, Gu L, Feng T, Guo Y, Chen X (2010) Context-aware usage control for android. In: Security and privacy in communication networks, Springer, New York, pp 326–343CrossRef Bai G, Gu L, Feng T, Guo Y, Chen X (2010) Context-aware usage control for android. In: Security and privacy in communication networks, Springer, New York, pp 326–343CrossRef
8.
go back to reference Basseville M, Nikiforov I, et al (1993) Detection of abrupt changes: theory and application, vol 104. Prentice-Hall, Englewood Cliffs Basseville M, Nikiforov I, et al (1993) Detection of abrupt changes: theory and application, vol 104. Prentice-Hall, Englewood Cliffs
9.
go back to reference Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1–24:45 Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1–24:45
10.
go back to reference Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161–180CrossRef Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161–180CrossRef
11.
go back to reference Bisdikian C, Sensoy M, Norman TJ, Srivastava MB (2012) Trust and obfuscation principles for quality of information in emerging pervasive environments. In: IEEE international conference on pervasive computing and communications, PerCom 2012, 19–23 March 2012, Lugano, workshop proceedings, pp 44–49 Bisdikian C, Sensoy M, Norman TJ, Srivastava MB (2012) Trust and obfuscation principles for quality of information in emerging pervasive environments. In: IEEE international conference on pervasive computing and communications, PerCom 2012, 19–23 March 2012, Lugano, workshop proceedings, pp 44–49
12.
go back to reference Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0 := data minimization + user control contextual integrity. Inf Technol 53(1):34–40 Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0 := data minimization + user control contextual integrity. Inf Technol 53(1):34–40
13.
go back to reference Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington
14.
go back to reference Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006) Managing quality of context in pervasive computing. In: Sixth international conference on quality software, QSIC 2006 Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006) Managing quality of context in pervasive computing. In: Sixth international conference on quality software, QSIC 2006
15.
go back to reference Buchholz T, Kupper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: 10th international workshop HPOVUA, Geneva Buchholz T, Kupper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: 10th international workshop HPOVUA, Geneva
17.
go back to reference Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR
18.
go back to reference Castellucia C, Druschel P, Fischer Hübner S et al. (2011) Privacy, accountability and trust—challenges and opportunities. Technical report MSU-CSE-00-2, ENISA Castellucia C, Druschel P, Fischer Hübner S et al. (2011) Privacy, accountability and trust—challenges and opportunities. Technical report MSU-CSE-00-2, ENISA
19.
go back to reference Cavoukian A, Chibba M (2009) Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings conference of the Centre for Advanced Studies on Collaborative Research, Toronto pp 358–360 Cavoukian A, Chibba M (2009) Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings conference of the Centre for Advanced Studies on Collaborative Research, Toronto pp 358–360
20.
go back to reference Cavoukian A, Tapscott D (1996) Who knows: safeguarding your privacy in a networked world. McGraw-Hill, New York Cavoukian A, Tapscott D (1996) Who knows: safeguarding your privacy in a networked world. McGraw-Hill, New York
22.
go back to reference Chakraborty S, Charbiwala Z, Choi H, Raghavan KR, Srivastava MB (2012) Balancing behavioral privacy and information utility in sensory data flows. Pervasive Mob Comput 8(3):331–345CrossRef Chakraborty S, Charbiwala Z, Choi H, Raghavan KR, Srivastava MB (2012) Balancing behavioral privacy and information utility in sensory data flows. Pervasive Mob Comput 8(3):331–345CrossRef
23.
go back to reference Chakraborty S, Choi H, Srivastava MB (2011) Demystifying privacy in sensory data: a QoI based approach In: Percom workshops Chakraborty S, Choi H, Srivastava MB (2011) Demystifying privacy in sensory data: a QoI based approach In: Percom workshops
24.
go back to reference Chakraborty S, Raghavan KR, Srivastava MB, Bisdikian C, Kaplan LM (2012) An obfuscation framework for controlling value of information during sharing. In: IEEE statistical signal processing workshop Chakraborty S, Raghavan KR, Srivastava MB, Bisdikian C, Kaplan LM (2012) An obfuscation framework for controlling value of information during sharing. In: IEEE statistical signal processing workshop
25.
go back to reference Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef
26.
go back to reference Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2–21CrossRef Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2–21CrossRef
27.
go back to reference Coutaz J, Crowley JL, Dobson S, Garlan D (2005) Context is key. Commun ACM 48(3):49–53CrossRef Coutaz J, Crowley JL, Dobson S, Garlan D (2005) Context is key. Commun ACM 48(3):49–53CrossRef
28.
go back to reference Covington M, Long W, Srinivasan S, Dey A, Ahamad M, Abowd G (2001) Securing context-aware applications using environment roles. In: 6th ACM symposium on access control models and technologies Covington M, Long W, Srinivasan S, Dey A, Ahamad M, Abowd G (2001) Securing context-aware applications using environment roles. In: 6th ACM symposium on access control models and technologies
29.
go back to reference Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM
30.
go back to reference Danezis G, Gürses S (2010) A critical review of 10 years of privacy technology. In: Surveillance cultures: a global surveillance society?, UK Danezis G, Gürses S (2010) A critical review of 10 years of privacy technology. In: Surveillance cultures: a global surveillance society?, UK
31.
go back to reference Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS
32.
go back to reference de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel V (2013) Unique in the crowd: the privacy bounds of human mobility. Nat Sci Rep 3:1376 de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel V (2013) Unique in the crowd: the privacy bounds of human mobility. Nat Sci Rep 3:1376
34.
go back to reference Diaz C (2005) Anonymity privacy in electronic services. PhD thesis, Cath. Univ. Leuven Diaz C (2005) Anonymity privacy in electronic services. PhD thesis, Cath. Univ. Leuven
35.
go back to reference Dingledine R, Mathewson N, Syverson PF (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego Dingledine R, Mathewson N, Syverson PF (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego
36.
go back to reference Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming (ICALP) Springer, Venice Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming (ICALP) Springer, Venice
37.
go back to reference Filho JB (2010) A family of context-based access control models for pervasive environments. PhD thesis, MSTII Doctoral School, Joseph Fourier University, Grenoble Filho JB (2010) A family of context-based access control models for pervasive environments. PhD thesis, MSTII Doctoral School, Joseph Fourier University, Grenoble
38.
go back to reference Filho JB, Agoulmine N (2011) A quality-aware approach for resolving context conflicts in context-aware systems. IEEE/IFIP conference on embedded and ubiquitous computing Filho JB, Agoulmine N (2011) A quality-aware approach for resolving context conflicts in context-aware systems. IEEE/IFIP conference on embedded and ubiquitous computing
39.
go back to reference Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1–103CrossRef Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1–103CrossRef
40.
go back to reference Freytag J-C (2009) Context quality and privacy—friends or rivals? In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin Freytag J-C (2009) Context quality and privacy—friends or rivals? In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
42.
go back to reference Graf C, Busch M, Schulz T, Hochleitner C, Skeide Fuglerud K (2012) D2.7 updated design guidelines on the security feedback provided by the “Things”. Technical report, uTRUSTit project Graf C, Busch M, Schulz T, Hochleitner C, Skeide Fuglerud K (2012) D2.7 updated design guidelines on the security feedback provided by the “Things”. Technical report, uTRUSTit project
44.
go back to reference Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127–140CrossRef Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127–140CrossRef
45.
go back to reference Hedbom H (2009) A survey on transparency tools for enhancing privacy. In: The future of identity in the information society, vol 298. Springer, Berlin Hedbom H (2009) A survey on transparency tools for enhancing privacy. In: The future of identity in the information society, vol 298. Springer, Berlin
46.
go back to reference Henricksen K, Indulska J (2004) Modelling and using imperfect context information. In: IEEE PERCOM 1st workshop CoMoRea Henricksen K, Indulska J (2004) Modelling and using imperfect context information. In: IEEE PERCOM 1st workshop CoMoRea
47.
go back to reference Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: Third IEEE international conference on PerCom workshops, Hawaii Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: Third IEEE international conference on PerCom workshops, Hawaii
48.
go back to reference Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS
49.
go back to reference Accuracy ISO (2011) (Trueness and precision) of measurement methods and results—part 1: introduction and basic principles. ISO/WD 15725-1 document Accuracy ISO (2011) (Trueness and precision) of measurement methods and results—part 1: introduction and basic principles. ISO/WD 15725-1 document
50.
go back to reference ITU Internet Reports (2005) The Internet of Things, 7th edn. ITU, Geneva ITU Internet Reports (2005) The Internet of Things, 7th edn. ITU, Geneva
51.
go back to reference Kelly D, Raines R, Grimaila M, Baldwin R, Mullins B (2008) A survey of state-of-the-art in anonymity metrics. In: 1st ACM workshop on network data anonymization. ACM Kelly D, Raines R, Grimaila M, Baldwin R, Mullins B (2008) A survey of state-of-the-art in anonymity metrics. In: 1st ACM workshop on network data anonymization. ACM
52.
go back to reference Kim Y, Lee K (2006) A quality measurement method of context information in ubiquitous environments, vol 2. In: ICHIT ’06 proceedings of the 2006 international conference on hybrid information technology Kim Y, Lee K (2006) A quality measurement method of context information in ubiquitous environments, vol 2. In: ICHIT ’06 proceedings of the 2006 international conference on hybrid information technology
53.
go back to reference Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42–51CrossRef Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42–51CrossRef
54.
go back to reference Krause M, Hochstatter I (2005) Challenges in modelling and using quality of context (QoC). In: Mobility aware technologies and applications, vol 3744. Springer, Berlin Krause M, Hochstatter I (2005) Challenges in modelling and using quality of context (QoC). In: Mobility aware technologies and applications, vol 3744. Springer, Berlin
55.
go back to reference Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies, SACMAT ’08, ACM, New York, pp 113–122 Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies, SACMAT ’08, ACM, New York, pp 113–122
56.
go back to reference Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53–66CrossRef Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53–66CrossRef
57.
go back to reference Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95–160 Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95–160
58.
go back to reference Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81–99CrossRef Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81–99CrossRef
59.
go back to reference Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440–454CrossRef Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440–454CrossRef
60.
go back to reference Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3:1–3:52 Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3:1–3:52
61.
go back to reference Machara Marquez S, Chabridon S, Taconet C (2013) Models@Run.time for privacy and quality of context level agreements in the Internet of Things. Technical report, UMR SAMOVAR, Télécom SudParis Machara Marquez S, Chabridon S, Taconet C (2013) Models@Run.time for privacy and quality of context level agreements in the Internet of Things. Technical report, UMR SAMOVAR, Télécom SudParis
62.
go back to reference Manzoor A (2010) Quality of context in pervasive systems: models, techniques, and applications. PhD thesis, School of Computer Science, Wien TU Manzoor A (2010) Quality of context in pervasive systems: models, techniques, and applications. PhD thesis, School of Computer Science, Wien TU
63.
go back to reference Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi:10.1017/S000000000000000. Special issue on web and mobile information servicesMATH Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi:10.​1017/​S000000000000000​. Special issue on web and mobile information servicesMATH
64.
go back to reference Manzoor A, Truong HL, Dustdar S (2008) On the evaluation of quality of context. In: Smart sensing and context, Springer, Berlin Manzoor A, Truong HL, Dustdar S (2008) On the evaluation of quality of context. In: Smart sensing and context, Springer, Berlin
65.
go back to reference Marie P, Desprats T, Chabridon S, Sibilla M (2013) A meta-model for the management of the quality of context information. Technical report, University, Toulouse, IRIT Marie P, Desprats T, Chabridon S, Sibilla M (2013) A meta-model for the management of the quality of context information. Technical report, University, Toulouse, IRIT
66.
go back to reference Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157–169CrossRef Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157–169CrossRef
68.
go back to reference McKeever S, Ye J, Coyle L, Dobson S (2009) A context quality model to support transparent reasoning with uncertain context. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin McKeever S, Ye J, Coyle L, Dobson S (2009) A context quality model to support transparent reasoning with uncertain context. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
69.
go back to reference Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling
70.
go back to reference Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef
71.
go back to reference Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. In: IEEE symposium security and privacy Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. In: IEEE symposium security and privacy
72.
go back to reference Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, CTIT School, University of Twente, NL Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, CTIT School, University of Twente, NL
73.
go back to reference Neisse R, Pretschner A, Di Giacomo V (2011) A trustworthy usage control enforcement framework. In: 6th international conference on ARES Neisse R, Pretschner A, Di Giacomo V (2011) A trustworthy usage control enforcement framework. In: 6th international conference on ARES
74.
go back to reference Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: 9th conference for young computer scientists, Hunan Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: 9th conference for young computer scientists, Hunan
75.
go back to reference Nguyen DH, Mynatt ED (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report GIT-GVU-02-16, Georgia Techniques, Atlanta Nguyen DH, Mynatt ED (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report GIT-GVU-02-16, Georgia Techniques, Atlanta
77.
go back to reference OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data
78.
go back to reference Official Journal of the European Communities (2002) EU Directive 2002/58/ec on the processing of personal data and the protection of privacy in the electronic communications sector Official Journal of the European Communities (2002) EU Directive 2002/58/ec on the processing of personal data and the protection of privacy in the electronic communications sector
79.
go back to reference Official Journal of the European Communities (1995) EU Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and the free movement of such data Official Journal of the European Communities (1995) EU Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and the free movement of such data
80.
go back to reference Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: IEEE international symposium on UbiSafe computing Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: IEEE international symposium on UbiSafe computing
81.
go back to reference Okagawa T, Nishida K, Miura A (2003) A proposed routing procedure in IP2. In: IEEE 58th VTC, vol 3 Okagawa T, Nishida K, Miura A (2003) A proposed routing procedure in IP2. In: IEEE 58th VTC, vol 3
84.
go back to reference Pearson S (2012) Privacy management in global organisations. In: Communications and multimedia security, Springer Pearson S (2012) Privacy management in global organisations. In: Communications and multimedia security, Springer
85.
go back to reference Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60–68CrossRef Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60–68CrossRef
87.
go back to reference Pfitzmann A, Waidner M (1985) Networks without user observability: design options. In: Advances in cryptology—EUROCRYPT, workshop on the theory and application of cryptographic techniques, Linz, Austria. Lecture notes in computer science, vol 219. Springer, Berlin, pp 245–253 Pfitzmann A, Waidner M (1985) Networks without user observability: design options. In: Advances in cryptology—EUROCRYPT, workshop on the theory and application of cryptographic techniques, Linz, Austria. Lecture notes in computer science, vol 219. Springer, Berlin, pp 245–253
88.
go back to reference Preuveneers D, Berbers Y (2006) Quality extensions and uncertainty handling for context ontologies. In: Proceedings of context and ontologies: theory practice and applications, Italy Preuveneers D, Berbers Y (2006) Quality extensions and uncertainty handling for context ontologies. In: Proceedings of context and ontologies: theory practice and applications, Italy
89.
go back to reference Preuveneers D, Berbers Y (2007) Architectural backpropagation support for managing ambiguous context in smart environments. In: Fourth conference on universal access in HCI. Lecture notes in computer science, vol 4555. Springer, Berlin Preuveneers D, Berbers Y (2007) Architectural backpropagation support for managing ambiguous context in smart environments. In: Fourth conference on universal access in HCI. Lecture notes in computer science, vol 4555. Springer, Berlin
91.
go back to reference Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10–18CrossRef Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10–18CrossRef
92.
go back to reference Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51–58CrossRef Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51–58CrossRef
93.
go back to reference Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266–2279CrossRef Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266–2279CrossRef
94.
go back to reference Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8:14–23CrossRef Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8:14–23CrossRef
95.
go back to reference Schmid S, Eggert L, Brunner M, Quittek J (2005) TurfNet: an architecture for dynamically composable networks. In: Autonomic communication. Lecture notes in computer science, vol 3457. Springer, Berlin Schmid S, Eggert L, Brunner M, Quittek J (2005) TurfNet: an architecture for dynamically composable networks. In: Autonomic communication. Lecture notes in computer science, vol 3457. Springer, Berlin
96.
go back to reference Schmidt A (2006) Ontology-based user context management: the challenges of imperfection and time-dependence. In: Conference on ontologies, databases and applications. Lecture notes in computer science, vol 4275. Springer, Berlin Schmidt A (2006) Ontology-based user context management: the challenges of imperfection and time-dependence. In: Conference on ontologies, databases and applications. Lecture notes in computer science, vol 4275. Springer, Berlin
97.
go back to reference Schrammel J, Hochleitner C, Tscheligi M (2011) Privacy, trust and interaction in the Internet of Things. In: Ambient intelligence. Lecture notes in computer science, vol 7040. Springer, Berlin, pp 378–379 Schrammel J, Hochleitner C, Tscheligi M (2011) Privacy, trust and interaction in the Internet of Things. In: Ambient intelligence. Lecture notes in computer science, vol 7040. Springer, Berlin, pp 378–379
98.
go back to reference Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83–93CrossRef Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83–93CrossRef
99.
go back to reference Shen Y, Pearson S (2011) Privacy enhancing technologies: a review. Technical report HPL-2011-113, HP Labs Shen Y, Pearson S (2011) Privacy enhancing technologies: a review. Technical report HPL-2011-113, HP Labs
101.
go back to reference Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477CrossRef Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477CrossRef
102.
go back to reference Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193–200 Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193–200
103.
104.
go back to reference Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1–2):203–220CrossRef Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1–2):203–220CrossRef
105.
go back to reference Twidle K, Dulay N, Lupu E, Sloman M (2009) Ponder2: a policy system for autonomous pervasive environments. In: IEEE workshop on policies for distributed systems and networks Twidle K, Dulay N, Lupu E, Sloman M (2009) Ponder2: a policy system for autonomous pervasive environments. In: IEEE workshop on policies for distributed systems and networks
106.
go back to reference Van Blarkom GW, Borking JJ, Olk JGE (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent softwares. College Bescherming Persoonsgegevens, The Hague Van Blarkom GW, Borking JJ, Olk JGE (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent softwares. College Bescherming Persoonsgegevens, The Hague
108.
go back to reference Wang Y, Kobsa A (2008) Handbook of research on social and organizational liabilities in information security, chapter privacy enhancing technology. IGI Publishing, Hershey Wang Y, Kobsa A (2008) Handbook of research on social and organizational liabilities in information security, chapter privacy enhancing technology. IGI Publishing, Hershey
109.
go back to reference Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220CrossRef Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220CrossRef
110.
go back to reference Wishart R, Henricksen K, Indulska J (2005) Context obfuscation for privacy via ontological descriptions. In: 1st international workshop on location and context-awareness (LoCA). Lecture notes in computer science, vol 3479. Springer, Berlin Wishart R, Henricksen K, Indulska J (2005) Context obfuscation for privacy via ontological descriptions. In: 1st international workshop on location and context-awareness (LoCA). Lecture notes in computer science, vol 3479. Springer, Berlin
111.
go back to reference Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany
112.
go back to reference Ylitalo J, Nikander P (2006) BLIND: a complete identity protection framework for end-points. In: Security protocols. Lecture notes in computer science, vol 3957. Springer, Berlin Ylitalo J, Nikander P (2006) BLIND: a complete identity protection framework for end-points. In: Security protocols. Lecture notes in computer science, vol 3957. Springer, Berlin
Metadata
Title
A survey on addressing privacy together with quality of context for context management in the Internet of Things
Authors
Sophie Chabridon
Romain Laborde
Thierry Desprats
Arnaud Oglaza
Pierrick Marie
Samer Machara Marquez
Publication date
01-02-2014
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 1-2/2014
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0387-2

Other articles of this Issue 1-2/2014

Annals of Telecommunications 1-2/2014 Go to the issue

Premium Partner