skip to main content
10.1145/1982185.1982283acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

ProQuPri: towards anonymity protection with privacy quantification for context-aware applications

Published: 21 March 2011 Publication History

Abstract

Privacy is the most often-cited criticism of context awareness in pervasive environments and may be the utmost barrier to its enduring success. Users certainly desire to be notified of potential data capture. Context-based pervasive applications have the vulnerabilities of tracking and capturing extensive portions of users' activities. Whether such data capture is an actual threat or not, users' perceptions of such possibilities may discourage them from using and adopting pervasive applications. So far in context-based pervasive applications, location data has been the main focus to make users anonymous. However in reality, anonymity depends on all the privacy sensitive data collected by the applications. Protecting anonymity with the help of an anonymizer has the susceptibility of a single point of failure. In this poster, we propose a formal model ProQuPri (Protect Anonymity and Quantify Privacy) that preserves users' anonymity without anonymizer while quantifies the amount of privacy at the time asking for services from untrustworthy service providers. Before placing a request, each user can protect his own anonymity by collaborating with his peers.

References

[1]
Dey, A. K. and Abowd, G. D. 1999. Towards a better understanding of context and context-awareness. Technical Report. Georgia Institute of Technology, GVU Center.
[2]
Cuellar, J., Morris, J. B., and Mulligan, D. 2002. Geopriv Requirements, Internet draft, Nov. Last Accessed: www.ietf.org/rfc/rfc3693.txt
[3]
Langheinrich, M. 2002. A Privacy Awareness System for Ubiquitous Computing Environments. In Proceedings of Ubiquitous Computing. Ubicomp. 2002, 237--245.
[4]
Salber, D., Dey, A. K., and Abowd, G. D. 1999. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proceedings of Conference on Human Factors in Computing Systems. 1999. 434--441.
[5]
Sweeney, L. 2002. Achieving k-anonymity privacy protection using generalization and suppression. In Int. J. Uncertain. Fuzz. 10, 6. 2002. 571--588.
[6]
Talukder, N. and Ahamed, S. I. 2008. FPCS: A Formal Approach for Privacy-Aware Context-Based Services. In Proceedings of Computer Software and Applications Conference. COMPSAC. 2008. 432--439.

Index Terms

  1. ProQuPri: towards anonymity protection with privacy quantification for context-aware applications

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '11: Proceedings of the 2011 ACM Symposium on Applied Computing
      March 2011
      1868 pages
      ISBN:9781450301138
      DOI:10.1145/1982185

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 March 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anonymity
      2. context-aware
      3. privacy
      4. quantification

      Qualifiers

      • Poster

      Conference

      SAC'11
      Sponsor:
      SAC'11: The 2011 ACM Symposium on Applied Computing
      March 21 - 24, 2011
      TaiChung, Taiwan

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 107
        Total Downloads
      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media