Keeping Ubiquitous Computing To Yourself: Privacy Protection in UbiComp Karim Adam Computing Research Centre The Open University
Outline of presentation Motivation Objectives Approach
Why Privacy? Privacy protection probably more crucial in UbiComp than other Computing paradigms Lack of feedback Lack of control Deviation from social norms
Objectives To provide privacy protection To manage privacy protection using privacy policies To aid in the re-use of privacy policies
The way we do this is by…… A matching concept Introducing noise – obfuscation, anonymity,… A utility-based approach
Semi-automatic derivation of privacy policies [Yee & Korba, 2005] Based on: Derivation from 3 rd Party surveys Retrieval from community of peers
Utility Model [Acquisti(2002)] The Utility, of completing a certain transaction t is given by: Keeping information private Completing a transaction Cost of using technology
Thanks for your attention!!