Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Pallapa, G. ; Center for Res. in Wireless Mobility & Networking, Univ. of Texas at Arlington, Arlington, TX, USA ; Di Francesco, M. ; Das, S.K.

In a pervasive system, users have very dynamic and rich interactions with the environment and its elements, including other users. To efficiently support users in such environments, a high-level representation of the system (namely, context) is usually exploited. However, since pervasive environments are inherently people-centric, context might consist of sensitive information. As a consequence, privacy concerns arise, especially in terms of how to control information disclosure to third parties (e.g., other users). In this paper we propose context-aware approaches to privacy preservation in wireless and mobile pervasive environments. Specifically, we design two schemes: (i) to reduce the interactions between the user and the system, and (ii) to exploit the interactions between different users. Both of our solutions are adaptive, thus suitable for dynamic scenarios. In addition, our schemes require limited computational and storage resources, so that they can be implemented on resource-constrained personal and sensing devices. We apply our solutions to a smart healthcare scenario, and show that our schemes not only effectively protect the user privacy, but also significantly reduce the interactions with the system, thus improving the user experience.

Published in:

World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a

Date of Conference:

25-28 June 2012