Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications

Elena Vildjiounaite, Petteri Alahuhta, Pasi Ahonen, David Wright, Michael Friedewald

2006

Abstract

Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.

References

  1. Aschmoneit, P.; Höbig, M.,eds. (2002). Context-Aware Collaborative Environments for Next Generation Business Networks: Scenario Document, COCONET deliverable D 2.2.
  2. Palmas, G.; Tsapatsoulis, N.; Apolloni, B. et al. (2001). Generic Artefacts Specification and Acceptance Criteria. Oresteia Deliverable D01. Milan: STMicroelectronics s.r.l
  3. Savidis, A. et al. (2001). Report on Key Reference Scenarios. 2WEAR Deliverable D1.
  4. Åkesson, K.-P.; Humble, J.; Crabtree, A.; Bullock, A. (2001). Usage and Development Scenarios for the Tangible Toolbox. ACCORD Deliverable D1.3.
  5. Amigo scenarios: http://www.ctit.utwente.nl/research/projects/telematics/other/amigo.doc/
  6. Kim, S. W.; Kim, M. C.; Park, S. H. et al. (2004): Gate reminder: a design case of a smart reminder. In: Benyon, D.; Moody, P. et al. (Eds.): Proceedings of the Conference on Designing Interactive Systems, Cambridge, MA, USA, August 1-4, 2004. ACM, pp. 81-90
  7. Orr, R. J.; Raymond, R.; Berman, J.; Seay, F. (1999). A System for Finding Frequently Lost Objects in the Home, Technical Report 99-24, Georgia Tech.
  8. Gemmel, J., Williams, L., Wood, K., Lueder, R., Bell, G., (2004) Passive Capture and Ensuing Issues for a Personal Lifetime Store, CAPRE 04
  9. Langheinrich, M. (2001): Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G. D.; Brumitt, B. et al. (Hrsg.): Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp 2001). Berlin und Heidelberg,: Springer-Verlag (Lecture Notes in Computer Science, 2201), pp. 273-291.
  10. Langheinrich, M. (2003): The DC-Privacy Troubadour - Assessing Privacy Implications of DC-Projects. In: Designing for Privacy Workshop. DC Tales Conference, Santorini, Greece.
  11. Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M., (2005) Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing, In: W. Weber, J. Rabaey, E. Aarts (Eds.): Ambient Intelligence. Springer-Verlag, pp. 5-29.
  12. Friedewald, M., Vildjiounaite, E., Punie, Y., Wright, D., Privacy, identity and security in ambient intelligence: A scenario analysis, Telematics and Informatics, In Press
  13. Hong, J., Ng, J, Lederer, S., Landay, J., Privacy Risk Models for Designing PrivacySensitive Ubiquitous Computing Systems, in DIS 2004
  14. Lahlou, S.; Jegou, F. (2003). European Disappearing Computer Privacy Design Guideslines v1. Ambient Agora Deliverable D15.4. Electricité de France.
  15. Nissenbaum, H. (2004), Privacy as Contextual Integrity, Washington Law Review 79, No.1
  16. Camenisch, J., ed.,. PRIME Deliverable D16.1, 2005.
  17. Bellotti, V., Sellen, A., Design for Privacy in Ubiquitous Comp. Environments, ECSCW'93
  18. Nasoz, F., Alvarez, K., Lisetti, C., Finkelstein, N., (2003), Emotion Recognition from Physiological Signals for User Modelling of Affect, In Proceedings of the 3rd Workshop on Affective and Attitude User Modelling (Pittsburgh, PA, USA, June 2003)
  19. Nabeth, T., et al., FIDIS Deliverable 2.2: Set of use cases and scenarios.
  20. Knospe, H.; Pohl, H. (2004): RFID Security. In: Information Security Technical Report 9, No. 4, pp. 30-41
  21. Cranor, L., P3P: Making Privacy Policies More Useful, IEEE Security and Privacy, 2003
  22. http://www.aclu.org/safefree/nsaspying/23989res20060131.html
  23. http://swami.jrc.es/pages/index.htm
Download


Paper Citation


in Harvard Style

Vildjiounaite E., Alahuhta P., Ahonen P., Wright D. and Friedewald M. (2006). Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications . In Proceedings of the 3rd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2006) ISBN 978-972-8865-51-1, pages 49-61. DOI: 10.5220/0002499800490061


in Bibtex Style

@conference{iwuc06,
author={Elena Vildjiounaite and Petteri Alahuhta and Pasi Ahonen and David Wright and Michael Friedewald},
title={Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications},
booktitle={Proceedings of the 3rd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2006)},
year={2006},
pages={49-61},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002499800490061},
isbn={978-972-8865-51-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2006)
TI - Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications
SN - 978-972-8865-51-1
AU - Vildjiounaite E.
AU - Alahuhta P.
AU - Ahonen P.
AU - Wright D.
AU - Friedewald M.
PY - 2006
SP - 49
EP - 61
DO - 10.5220/0002499800490061