Skip to main content
Erschienen in: Annals of Telecommunications 1-2/2014

01.02.2014

A survey on addressing privacy together with quality of context for context management in the Internet of Things

verfasst von: Sophie Chabridon, Romain Laborde, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez

Erschienen in: Annals of Telecommunications | Ausgabe 1-2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Making the Internet of Things (IoT) a reality will contribute to extend the context-aware ability of numerous sensitive applications. We can foresee that the context of users will include not only their own spatio-temporal conditions but also those of the things situated in their ambient environment and at the same time, thanks to the IoT, those that are located in other remote spaces. Consequently, next-generation context managers have to interact with the IoT underlying technologies and must, even more than before, address both privacy and quality of context (QoC) requirements. In this article, we show that the notions of privacy and QoC are intimately related and sometimes contradictory and survey the recent works addressing them. Current solutions usually consider only one notion, and very few of them started to bridge privacy and QoC. We identify some of the remaining challenges that next-generation context managers have to deal with to favour users’ acceptability by providing both the optimal QoC level and the appropriate privacy protection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abid Z, Chabridon S, Conan D (2009) A framework for quality of context management. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin Abid Z, Chabridon S, Conan D (2009) A framework for quality of context management. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
2.
Zurück zum Zitat Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD conference
3.
Zurück zum Zitat Alcalde Bagüés S, Zeidler A, Fernández-Valdivielso C, Matias I (2007) Disappearing for a while-using white lies in pervasive computing. In: Proceedings of the ACM workshop on privacy in electronic society, ACM, pp 80–83 Alcalde Bagüés S, Zeidler A, Fernández-Valdivielso C, Matias I (2007) Disappearing for a while-using white lies in pervasive computing. In: Proceedings of the ACM workshop on privacy in electronic society, ACM, pp 80–83
4.
Zurück zum Zitat Arcangeli J-P, et al (2012) INCOME—multi-scale context management for the Internet of Things. In: International conference on ambient intelligence (AmI). Lecture notes in computer science, vol 7683. Springer, Berlin Arcangeli J-P, et al (2012) INCOME—multi-scale context management for the Internet of Things. In: International conference on ambient intelligence (AmI). Lecture notes in computer science, vol 7683. Springer, Berlin
5.
Zurück zum Zitat Ashley P, Hada S, et al (2003) Enterprise privacy authorization language (EPAL 1.2) Ashley P, Hada S, et al (2003) Enterprise privacy authorization language (EPAL 1.2)
6.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
7.
Zurück zum Zitat Bai G, Gu L, Feng T, Guo Y, Chen X (2010) Context-aware usage control for android. In: Security and privacy in communication networks, Springer, New York, pp 326–343CrossRef Bai G, Gu L, Feng T, Guo Y, Chen X (2010) Context-aware usage control for android. In: Security and privacy in communication networks, Springer, New York, pp 326–343CrossRef
8.
Zurück zum Zitat Basseville M, Nikiforov I, et al (1993) Detection of abrupt changes: theory and application, vol 104. Prentice-Hall, Englewood Cliffs Basseville M, Nikiforov I, et al (1993) Detection of abrupt changes: theory and application, vol 104. Prentice-Hall, Englewood Cliffs
9.
Zurück zum Zitat Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1–24:45 Bellavista P, Corradi A, Fanelli M, Foschini L (2012) A survey of context data distribution for mobile ubiquitous systems. ACM Comput Surv 44(24):24:1–24:45
10.
Zurück zum Zitat Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161–180CrossRef Bettini C, Brdiczka O, Henricksen K, Indulska J, et al (2010) A survey of context modelling and reasoning techniques. Pervasive Mob Comp 6(2):161–180CrossRef
11.
Zurück zum Zitat Bisdikian C, Sensoy M, Norman TJ, Srivastava MB (2012) Trust and obfuscation principles for quality of information in emerging pervasive environments. In: IEEE international conference on pervasive computing and communications, PerCom 2012, 19–23 March 2012, Lugano, workshop proceedings, pp 44–49 Bisdikian C, Sensoy M, Norman TJ, Srivastava MB (2012) Trust and obfuscation principles for quality of information in emerging pervasive environments. In: IEEE international conference on pervasive computing and communications, PerCom 2012, 19–23 March 2012, Lugano, workshop proceedings, pp 44–49
12.
Zurück zum Zitat Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0 := data minimization + user control contextual integrity. Inf Technol 53(1):34–40 Borcea-Pfitzmann K, Pfitzmann A, Berg M (2011) Privacy 3.0 := data minimization + user control contextual integrity. Inf Technol 53(1):34–40
13.
Zurück zum Zitat Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington Brgulja N, Kusber R, David K, Baumgarten M (2009) Measuring the probability of correctness of contextual information in context aware systems. In: 8th IEEE international conference on dependable, autonomic and secure computing, Washington
14.
Zurück zum Zitat Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006) Managing quality of context in pervasive computing. In: Sixth international conference on quality software, QSIC 2006 Bu Y, Gu T, Tao X, Li J, Chen S, Lu J (2006) Managing quality of context in pervasive computing. In: Sixth international conference on quality software, QSIC 2006
15.
Zurück zum Zitat Buchholz T, Kupper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: 10th international workshop HPOVUA, Geneva Buchholz T, Kupper A, Schiffers M (2003) Quality of context information: what it is and why we need it. In: 10th international workshop HPOVUA, Geneva
17.
Zurück zum Zitat Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR Canny J (2002) Collaborative filtering with privacy via factor analysis. In: 25th ACM SIGIR
18.
Zurück zum Zitat Castellucia C, Druschel P, Fischer Hübner S et al. (2011) Privacy, accountability and trust—challenges and opportunities. Technical report MSU-CSE-00-2, ENISA Castellucia C, Druschel P, Fischer Hübner S et al. (2011) Privacy, accountability and trust—challenges and opportunities. Technical report MSU-CSE-00-2, ENISA
19.
Zurück zum Zitat Cavoukian A, Chibba M (2009) Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings conference of the Centre for Advanced Studies on Collaborative Research, Toronto pp 358–360 Cavoukian A, Chibba M (2009) Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings conference of the Centre for Advanced Studies on Collaborative Research, Toronto pp 358–360
20.
Zurück zum Zitat Cavoukian A, Tapscott D (1996) Who knows: safeguarding your privacy in a networked world. McGraw-Hill, New York Cavoukian A, Tapscott D (1996) Who knows: safeguarding your privacy in a networked world. McGraw-Hill, New York
22.
Zurück zum Zitat Chakraborty S, Charbiwala Z, Choi H, Raghavan KR, Srivastava MB (2012) Balancing behavioral privacy and information utility in sensory data flows. Pervasive Mob Comput 8(3):331–345CrossRef Chakraborty S, Charbiwala Z, Choi H, Raghavan KR, Srivastava MB (2012) Balancing behavioral privacy and information utility in sensory data flows. Pervasive Mob Comput 8(3):331–345CrossRef
23.
Zurück zum Zitat Chakraborty S, Choi H, Srivastava MB (2011) Demystifying privacy in sensory data: a QoI based approach In: Percom workshops Chakraborty S, Choi H, Srivastava MB (2011) Demystifying privacy in sensory data: a QoI based approach In: Percom workshops
24.
Zurück zum Zitat Chakraborty S, Raghavan KR, Srivastava MB, Bisdikian C, Kaplan LM (2012) An obfuscation framework for controlling value of information during sharing. In: IEEE statistical signal processing workshop Chakraborty S, Raghavan KR, Srivastava MB, Bisdikian C, Kaplan LM (2012) An obfuscation framework for controlling value of information during sharing. In: IEEE statistical signal processing workshop
25.
Zurück zum Zitat Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef
26.
Zurück zum Zitat Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2–21CrossRef Conti M, Das SK, Bisdikian C, Kumar M, et al (2012) Looking ahead in pervasive computing: challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob Comput 8(1):2–21CrossRef
27.
Zurück zum Zitat Coutaz J, Crowley JL, Dobson S, Garlan D (2005) Context is key. Commun ACM 48(3):49–53CrossRef Coutaz J, Crowley JL, Dobson S, Garlan D (2005) Context is key. Commun ACM 48(3):49–53CrossRef
28.
Zurück zum Zitat Covington M, Long W, Srinivasan S, Dey A, Ahamad M, Abowd G (2001) Securing context-aware applications using environment roles. In: 6th ACM symposium on access control models and technologies Covington M, Long W, Srinivasan S, Dey A, Ahamad M, Abowd G (2001) Securing context-aware applications using environment roles. In: 6th ACM symposium on access control models and technologies
29.
Zurück zum Zitat Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM Covington M, Sastry M (2006) A contextual attribute-based access control model. In: OTM
30.
Zurück zum Zitat Danezis G, Gürses S (2010) A critical review of 10 years of privacy technology. In: Surveillance cultures: a global surveillance society?, UK Danezis G, Gürses S (2010) A critical review of 10 years of privacy technology. In: Surveillance cultures: a global surveillance society?, UK
31.
Zurück zum Zitat Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. In: NDSS
32.
Zurück zum Zitat de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel V (2013) Unique in the crowd: the privacy bounds of human mobility. Nat Sci Rep 3:1376 de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel V (2013) Unique in the crowd: the privacy bounds of human mobility. Nat Sci Rep 3:1376
34.
Zurück zum Zitat Diaz C (2005) Anonymity privacy in electronic services. PhD thesis, Cath. Univ. Leuven Diaz C (2005) Anonymity privacy in electronic services. PhD thesis, Cath. Univ. Leuven
35.
Zurück zum Zitat Dingledine R, Mathewson N, Syverson PF (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego Dingledine R, Mathewson N, Syverson PF (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego
36.
Zurück zum Zitat Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming (ICALP) Springer, Venice Dwork C (2006) Differential privacy. In: International colloquium on automata, languages and programming (ICALP) Springer, Venice
37.
Zurück zum Zitat Filho JB (2010) A family of context-based access control models for pervasive environments. PhD thesis, MSTII Doctoral School, Joseph Fourier University, Grenoble Filho JB (2010) A family of context-based access control models for pervasive environments. PhD thesis, MSTII Doctoral School, Joseph Fourier University, Grenoble
38.
Zurück zum Zitat Filho JB, Agoulmine N (2011) A quality-aware approach for resolving context conflicts in context-aware systems. IEEE/IFIP conference on embedded and ubiquitous computing Filho JB, Agoulmine N (2011) A quality-aware approach for resolving context conflicts in context-aware systems. IEEE/IFIP conference on embedded and ubiquitous computing
39.
Zurück zum Zitat Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1–103CrossRef Flinn J (2012) Cyber foraging: bridging mobile and cloud computing. Synth Lect Mob Pervasive Comput 7(2):1–103CrossRef
40.
Zurück zum Zitat Freytag J-C (2009) Context quality and privacy—friends or rivals? In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin Freytag J-C (2009) Context quality and privacy—friends or rivals? In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
42.
Zurück zum Zitat Graf C, Busch M, Schulz T, Hochleitner C, Skeide Fuglerud K (2012) D2.7 updated design guidelines on the security feedback provided by the “Things”. Technical report, uTRUSTit project Graf C, Busch M, Schulz T, Hochleitner C, Skeide Fuglerud K (2012) D2.7 updated design guidelines on the security feedback provided by the “Things”. Technical report, uTRUSTit project
44.
Zurück zum Zitat Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127–140CrossRef Han Q, Hakkarinen D, Boonma P, Suzuki J (2010) Quality-aware sensor data collection. Int J Sens Netw 7(3):127–140CrossRef
45.
Zurück zum Zitat Hedbom H (2009) A survey on transparency tools for enhancing privacy. In: The future of identity in the information society, vol 298. Springer, Berlin Hedbom H (2009) A survey on transparency tools for enhancing privacy. In: The future of identity in the information society, vol 298. Springer, Berlin
46.
Zurück zum Zitat Henricksen K, Indulska J (2004) Modelling and using imperfect context information. In: IEEE PERCOM 1st workshop CoMoRea Henricksen K, Indulska J (2004) Modelling and using imperfect context information. In: IEEE PERCOM 1st workshop CoMoRea
47.
Zurück zum Zitat Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: Third IEEE international conference on PerCom workshops, Hawaii Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: Third IEEE international conference on PerCom workshops, Hawaii
48.
Zurück zum Zitat Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS Inglesant P, Sasse MA, Chadwick D, Shi LL (2008) Expressions of expertness: the virtuous circle of natural language for access control policy specification. In: SOUPS
49.
Zurück zum Zitat Accuracy ISO (2011) (Trueness and precision) of measurement methods and results—part 1: introduction and basic principles. ISO/WD 15725-1 document Accuracy ISO (2011) (Trueness and precision) of measurement methods and results—part 1: introduction and basic principles. ISO/WD 15725-1 document
50.
Zurück zum Zitat ITU Internet Reports (2005) The Internet of Things, 7th edn. ITU, Geneva ITU Internet Reports (2005) The Internet of Things, 7th edn. ITU, Geneva
51.
Zurück zum Zitat Kelly D, Raines R, Grimaila M, Baldwin R, Mullins B (2008) A survey of state-of-the-art in anonymity metrics. In: 1st ACM workshop on network data anonymization. ACM Kelly D, Raines R, Grimaila M, Baldwin R, Mullins B (2008) A survey of state-of-the-art in anonymity metrics. In: 1st ACM workshop on network data anonymization. ACM
52.
Zurück zum Zitat Kim Y, Lee K (2006) A quality measurement method of context information in ubiquitous environments, vol 2. In: ICHIT ’06 proceedings of the 2006 international conference on hybrid information technology Kim Y, Lee K (2006) A quality measurement method of context information in ubiquitous environments, vol 2. In: ICHIT ’06 proceedings of the 2006 international conference on hybrid information technology
53.
Zurück zum Zitat Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42–51CrossRef Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42–51CrossRef
54.
Zurück zum Zitat Krause M, Hochstatter I (2005) Challenges in modelling and using quality of context (QoC). In: Mobility aware technologies and applications, vol 3744. Springer, Berlin Krause M, Hochstatter I (2005) Challenges in modelling and using quality of context (QoC). In: Mobility aware technologies and applications, vol 3744. Springer, Berlin
55.
Zurück zum Zitat Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies, SACMAT ’08, ACM, New York, pp 113–122 Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies, SACMAT ’08, ACM, New York, pp 113–122
56.
Zurück zum Zitat Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53–66CrossRef Kumar A, Karnik NM, Chafle G (2002) Context sensitivity in role-based access control. Oper Syst Rev 36(3):53–66CrossRef
57.
Zurück zum Zitat Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95–160 Langheinrich M (2009) Privacy in ubiquitous computing. In: Krumm J (ed) Ubiquitous computing. CRC, Boca Raton, pp 95–160
58.
Zurück zum Zitat Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81–99CrossRef Lazouski A, Martinelli F, Mori P (2010) Usage control in computer security: a survey. Elsevier Comput Sci Rev 4(2):81–99CrossRef
59.
Zurück zum Zitat Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440–454CrossRef Lederer S, Hong J, Dey A, Landay J (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquit Comput 8(6):440–454CrossRef
60.
Zurück zum Zitat Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3:1–3:52 Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3:1–3:52
61.
Zurück zum Zitat Machara Marquez S, Chabridon S, Taconet C (2013) Models@Run.time for privacy and quality of context level agreements in the Internet of Things. Technical report, UMR SAMOVAR, Télécom SudParis Machara Marquez S, Chabridon S, Taconet C (2013) Models@Run.time for privacy and quality of context level agreements in the Internet of Things. Technical report, UMR SAMOVAR, Télécom SudParis
62.
Zurück zum Zitat Manzoor A (2010) Quality of context in pervasive systems: models, techniques, and applications. PhD thesis, School of Computer Science, Wien TU Manzoor A (2010) Quality of context in pervasive systems: models, techniques, and applications. PhD thesis, School of Computer Science, Wien TU
63.
Zurück zum Zitat Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi:10.1017/S000000000000000. Special issue on web and mobile information servicesMATH Manzoor A, Truong H-L, Dustdar S (2012) Quality of context: models and applications for context-aware systems in pervasive environments. Knowl Eng Rev. doi:10.​1017/​S000000000000000​. Special issue on web and mobile information servicesMATH
64.
Zurück zum Zitat Manzoor A, Truong HL, Dustdar S (2008) On the evaluation of quality of context. In: Smart sensing and context, Springer, Berlin Manzoor A, Truong HL, Dustdar S (2008) On the evaluation of quality of context. In: Smart sensing and context, Springer, Berlin
65.
Zurück zum Zitat Marie P, Desprats T, Chabridon S, Sibilla M (2013) A meta-model for the management of the quality of context information. Technical report, University, Toulouse, IRIT Marie P, Desprats T, Chabridon S, Sibilla M (2013) A meta-model for the management of the quality of context information. Technical report, University, Toulouse, IRIT
66.
Zurück zum Zitat Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157–169CrossRef Marx G (2001) Murky conceptual waters: the public and the private. Ethics Inf Technol 3(3):157–169CrossRef
68.
Zurück zum Zitat McKeever S, Ye J, Coyle L, Dobson S (2009) A context quality model to support transparent reasoning with uncertain context. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin McKeever S, Ye J, Coyle L, Dobson S (2009) A context quality model to support transparent reasoning with uncertain context. In: First international workshop on quality of context. Lecture notes in computer science, vol 5786. Springer, Berlin
69.
Zurück zum Zitat Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling Mehta B (2007) Learning from what others know: privacy preserving cross system personalization. In: 11th conferences on user modeling
70.
Zurück zum Zitat Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef Miorandi S, an Sicari D, De Pellegrini F, Chlamtac I (2012) Survey Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516CrossRef
71.
Zurück zum Zitat Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. In: IEEE symposium security and privacy Narayanan A, Shmatikov V (2008) Robust De-anonymization of large sparse datasets. In: IEEE symposium security and privacy
72.
Zurück zum Zitat Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, CTIT School, University of Twente, NL Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, CTIT School, University of Twente, NL
73.
Zurück zum Zitat Neisse R, Pretschner A, Di Giacomo V (2011) A trustworthy usage control enforcement framework. In: 6th international conference on ARES Neisse R, Pretschner A, Di Giacomo V (2011) A trustworthy usage control enforcement framework. In: 6th international conference on ARES
74.
Zurück zum Zitat Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: 9th conference for young computer scientists, Hunan Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: 9th conference for young computer scientists, Hunan
75.
Zurück zum Zitat Nguyen DH, Mynatt ED (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report GIT-GVU-02-16, Georgia Techniques, Atlanta Nguyen DH, Mynatt ED (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report GIT-GVU-02-16, Georgia Techniques, Atlanta
77.
Zurück zum Zitat OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data
78.
Zurück zum Zitat Official Journal of the European Communities (2002) EU Directive 2002/58/ec on the processing of personal data and the protection of privacy in the electronic communications sector Official Journal of the European Communities (2002) EU Directive 2002/58/ec on the processing of personal data and the protection of privacy in the electronic communications sector
79.
Zurück zum Zitat Official Journal of the European Communities (1995) EU Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and the free movement of such data Official Journal of the European Communities (1995) EU Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and the free movement of such data
80.
Zurück zum Zitat Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: IEEE international symposium on UbiSafe computing Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: IEEE international symposium on UbiSafe computing
81.
Zurück zum Zitat Okagawa T, Nishida K, Miura A (2003) A proposed routing procedure in IP2. In: IEEE 58th VTC, vol 3 Okagawa T, Nishida K, Miura A (2003) A proposed routing procedure in IP2. In: IEEE 58th VTC, vol 3
84.
Zurück zum Zitat Pearson S (2012) Privacy management in global organisations. In: Communications and multimedia security, Springer Pearson S (2012) Privacy management in global organisations. In: Communications and multimedia security, Springer
85.
Zurück zum Zitat Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60–68CrossRef Pearson S, Casassa Mont M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60–68CrossRef
87.
Zurück zum Zitat Pfitzmann A, Waidner M (1985) Networks without user observability: design options. In: Advances in cryptology—EUROCRYPT, workshop on the theory and application of cryptographic techniques, Linz, Austria. Lecture notes in computer science, vol 219. Springer, Berlin, pp 245–253 Pfitzmann A, Waidner M (1985) Networks without user observability: design options. In: Advances in cryptology—EUROCRYPT, workshop on the theory and application of cryptographic techniques, Linz, Austria. Lecture notes in computer science, vol 219. Springer, Berlin, pp 245–253
88.
Zurück zum Zitat Preuveneers D, Berbers Y (2006) Quality extensions and uncertainty handling for context ontologies. In: Proceedings of context and ontologies: theory practice and applications, Italy Preuveneers D, Berbers Y (2006) Quality extensions and uncertainty handling for context ontologies. In: Proceedings of context and ontologies: theory practice and applications, Italy
89.
Zurück zum Zitat Preuveneers D, Berbers Y (2007) Architectural backpropagation support for managing ambiguous context in smart environments. In: Fourth conference on universal access in HCI. Lecture notes in computer science, vol 4555. Springer, Berlin Preuveneers D, Berbers Y (2007) Architectural backpropagation support for managing ambiguous context in smart environments. In: Fourth conference on universal access in HCI. Lecture notes in computer science, vol 4555. Springer, Berlin
91.
Zurück zum Zitat Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10–18CrossRef Ranganathan A, Al-Muhtadi J, Campbell RH (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput 3(2):10–18CrossRef
92.
Zurück zum Zitat Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51–58CrossRef Roman R, Najera P, Lopez J (2011) Securing the Internet of Things. IEEE Comput 44(9):51–58CrossRef
93.
Zurück zum Zitat Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266–2279CrossRef Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266–2279CrossRef
94.
Zurück zum Zitat Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8:14–23CrossRef Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8:14–23CrossRef
95.
Zurück zum Zitat Schmid S, Eggert L, Brunner M, Quittek J (2005) TurfNet: an architecture for dynamically composable networks. In: Autonomic communication. Lecture notes in computer science, vol 3457. Springer, Berlin Schmid S, Eggert L, Brunner M, Quittek J (2005) TurfNet: an architecture for dynamically composable networks. In: Autonomic communication. Lecture notes in computer science, vol 3457. Springer, Berlin
96.
Zurück zum Zitat Schmidt A (2006) Ontology-based user context management: the challenges of imperfection and time-dependence. In: Conference on ontologies, databases and applications. Lecture notes in computer science, vol 4275. Springer, Berlin Schmidt A (2006) Ontology-based user context management: the challenges of imperfection and time-dependence. In: Conference on ontologies, databases and applications. Lecture notes in computer science, vol 4275. Springer, Berlin
97.
Zurück zum Zitat Schrammel J, Hochleitner C, Tscheligi M (2011) Privacy, trust and interaction in the Internet of Things. In: Ambient intelligence. Lecture notes in computer science, vol 7040. Springer, Berlin, pp 378–379 Schrammel J, Hochleitner C, Tscheligi M (2011) Privacy, trust and interaction in the Internet of Things. In: Ambient intelligence. Lecture notes in computer science, vol 7040. Springer, Berlin, pp 378–379
98.
Zurück zum Zitat Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83–93CrossRef Sheikh K, Wegdam M, Sinderen MV (2008) Quality-of-context and its use for protecting privacy in context-aware systems. J Softw 3(3):83–93CrossRef
99.
Zurück zum Zitat Shen Y, Pearson S (2011) Privacy enhancing technologies: a review. Technical report HPL-2011-113, HP Labs Shen Y, Pearson S (2011) Privacy enhancing technologies: a review. Technical report HPL-2011-113, HP Labs
101.
Zurück zum Zitat Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477CrossRef Solove D (2006) A taxonomy of privacy. Univ Pennsylvania Law Rev 153(3):477CrossRef
102.
Zurück zum Zitat Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193–200 Stepien B, Matwin S, Felty A (2011) Advantages of a non-technical XACML notation in role-based models. In: 9th annual international conference on privacy, security and trust (PST), pp 193–200
103.
104.
Zurück zum Zitat Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1–2):203–220CrossRef Toch E, Wang Y, Cranor L (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1–2):203–220CrossRef
105.
Zurück zum Zitat Twidle K, Dulay N, Lupu E, Sloman M (2009) Ponder2: a policy system for autonomous pervasive environments. In: IEEE workshop on policies for distributed systems and networks Twidle K, Dulay N, Lupu E, Sloman M (2009) Ponder2: a policy system for autonomous pervasive environments. In: IEEE workshop on policies for distributed systems and networks
106.
Zurück zum Zitat Van Blarkom GW, Borking JJ, Olk JGE (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent softwares. College Bescherming Persoonsgegevens, The Hague Van Blarkom GW, Borking JJ, Olk JGE (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent softwares. College Bescherming Persoonsgegevens, The Hague
108.
Zurück zum Zitat Wang Y, Kobsa A (2008) Handbook of research on social and organizational liabilities in information security, chapter privacy enhancing technology. IGI Publishing, Hershey Wang Y, Kobsa A (2008) Handbook of research on social and organizational liabilities in information security, chapter privacy enhancing technology. IGI Publishing, Hershey
109.
Zurück zum Zitat Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220CrossRef Warren SD, Brandeis LD (1890) The right to privacy. Harvard Law Rev 4(5):193–220CrossRef
110.
Zurück zum Zitat Wishart R, Henricksen K, Indulska J (2005) Context obfuscation for privacy via ontological descriptions. In: 1st international workshop on location and context-awareness (LoCA). Lecture notes in computer science, vol 3479. Springer, Berlin Wishart R, Henricksen K, Indulska J (2005) Context obfuscation for privacy via ontological descriptions. In: 1st international workshop on location and context-awareness (LoCA). Lecture notes in computer science, vol 3479. Springer, Berlin
111.
Zurück zum Zitat Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany Yasar A-U-H, Paridel K, Preuveneers D, Berbers Y (2011) When efficiency matters: towards quality of context-aware peers for adaptive communication in VANETs. In: Intelligent vehicles symposium, Germany
112.
Zurück zum Zitat Ylitalo J, Nikander P (2006) BLIND: a complete identity protection framework for end-points. In: Security protocols. Lecture notes in computer science, vol 3957. Springer, Berlin Ylitalo J, Nikander P (2006) BLIND: a complete identity protection framework for end-points. In: Security protocols. Lecture notes in computer science, vol 3957. Springer, Berlin
Metadaten
Titel
A survey on addressing privacy together with quality of context for context management in the Internet of Things
verfasst von
Sophie Chabridon
Romain Laborde
Thierry Desprats
Arnaud Oglaza
Pierrick Marie
Samer Machara Marquez
Publikationsdatum
01.02.2014
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 1-2/2014
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-013-0387-2

Weitere Artikel der Ausgabe 1-2/2014

Annals of Telecommunications 1-2/2014 Zur Ausgabe