Factsheet On Location Privacy In Pervasive Computing Term Paper

PAGES
2
WORDS
874
Cite
Related Topics:

Location Privacy in Pervasive Computing Lab workers wore bats (small mobile devices with radio transceivers and ultrasonic transmitters) to provide position information to location-aware applications and colleagues in the lab. * The strong correlation between entry and exit motion is not modeled in anonymity sets. Per Shannon's1 definition of maximal entropy, only when all the members of an anonymity set are of interest to the observer, anonymity set size is a good measure of anonymity. *If all elements are equiprobable, for a set size of n, a log2 n bits of information is needed to identify one element.

Modeling user movements can show the anonymity level offered by the mix zone. Knowledge encoded in a movement matrix enables an observer to make a "guess" about user activity superior to the accuracy that can be achieved through a random choice. The identity of users is expressible as a conditional probability of the users' next action. A hostile observer can unlink pseudonyms more successfully than the size of the anonymity set suggests because the actions are not equiprobable.

Experimental Data From AT&T Lab

Mix Networks and Mix Zones

Applications Collude & Share Information About User Sightings

"To thwart more sophisticated attacks, users should change pseudonyms frequently, even while being tracked."

Beresford & Stajano 2003

"The mix zone store-and-forward network offers anonymous communication facilities."

Future Research

Prevent preferences from the multiple pseudonyms created from identifiably mapping back to the...

...

Shannon, "A Mathematical Theory of Communication," Bell System Tech. J., 27, July 1948, pp. 379-423, and Oct. 1948, pp. 623-656.
MIX NETWORK. A mix network consists of normal message-routing nodes and special mix nodes. A hostile observer monitoring network links cannot trace messages from their source to their destinations without the collusion of the mix nodes. Incoming and outgoing messages are made unlinkable as the mix node collects and reorders equal-length packets, according to a certain metric, prior to forwarding the messages. As the size of an anonymity set increases, so does the anonymity it provides. A smaller anonymity set has less anonymity to offer.

2. F. Stajano, Securtiy for Ubiquitous Computing, John Wiley & sons, New York, 2002.

3. D. Chaum, "Untraceable Electronic Mail, Return Addresses and Digital Pseudonums," Comm. ACM, vol. 24, no. 2, 1981, pp. 84-88.

4. D. Chaum, "The…

Sources Used in Documents:

Pervasive computing can enable observers to achieve submeter accuracy of the comings and goings of those they track. Stejano (2002) argues that a change of scale of several orders of magnitude impacts qualitative as well as quantitative data -- this is a residual problem in pervasive computing. Many location systems track users in an ongoing fashion, gathering huge amounts of information that has the potential to be sensitive and valuable data. Options for controlling the information that is tracked by location systems are limited. Users want to be in control of access to their private and personal data. Users also want to experience applications with the ease that is a result of data tracking.

Resources 5 -- Harvard

* The inherent tension that exists in the privacy-protection framework can be addressed through the use of pseudonyms that are changed frequently. This measure provides a way for users to avoidance having their identification revealed by the locations they visit. Beresford and Stanjano describe techniques they have developed for mapping the location privacy issue to anonymous communication through the application of mix zones, and they provide examples of two anonymity assessment metrics: anonymity sets and entropy.


Cite this Document:

"Factsheet On Location Privacy In Pervasive Computing" (2012, August 21) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/factsheet-on-location-privacy-in-pervasive-109384

"Factsheet On Location Privacy In Pervasive Computing" 21 August 2012. Web.25 April. 2024. <
https://www.paperdue.com/essay/factsheet-on-location-privacy-in-pervasive-109384>

"Factsheet On Location Privacy In Pervasive Computing", 21 August 2012, Accessed.25 April. 2024,
https://www.paperdue.com/essay/factsheet-on-location-privacy-in-pervasive-109384

Related Documents

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Privacy Laws Are a Big
PAGES 6 WORDS 1816

They are also required to assess and address risks to customer information in all areas of operations, including employee management and training, information systems, and detecting and managing system failures. They must address what information is collected and stored as well as whether there is a business need for that particular information. Depending on the type of business operations, privacy laws govern how companies collect, store, and use customer identifiable

For example, almost all companies doing business on the Internet will have a link disclosing their privacy policy and the steps they will take to ensure the customer's privacy. Privacy matters become an issue because, in order to transact business of the Internet, one is required to enter such personal information as credit card numbers, addresses, emails and personal phone numbers. The vast majority of online businesses will have policy disclosure

Privacy Notices
PAGES 6 WORDS 1839

Privacy By law, majority of business institutions are required to provide their customers with information regarding their privacy policies on an annual basis. Business institutions are prohibited from sharing nonpublic personally identifiable customer information with non- affiliated third parties, unless consumers are clearly provided with an opportunity to opt-out. However, there have been concerns among people, as the opt-out process is time consuming for many individuals and in some cases privacy

Consequently, the large-scale implant of chips would certainly have damaging effects on people. One of the latest reports of people having their privacy broken is when residents from Milton Keynes, UK, have informed police officers that a Google representative started taking picture of their houses. The person had been driving a Google Street View car which is part of a program meant to offer Google operators 360 degrees images of

Privacy Rights in the Case
PAGES 15 WORDS 6316

Layne', in December 1994, the Office of the Information and Privacy Commissioner received a compliant that the Vancouver Police Department had taken a decision to block out the faces of those person who were being interviewed by the police in the program, "To Serve and to Protect." The complainant was KF Media Inc., of Vancouver B.C. KF Media Inc. who was the producer of the program, and it generally