This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California at Berkeley Berkeley, CA, 94720-1776 USA [email protected] James A. Landay DUB Group Computer Science and Engineering University of Washington Seattle, WA 98105-4615 USA [email protected] ABSTRACT Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs. Categories and Subject Descriptors D.2.2 [ Software Engineering ]: Design Tools and Techniques – Software libraries. D.2.11 [ Software Engineering ]: Software Architectures – Domain-specific architectures. H.1.2 [ Models and Principles ]: User/Machine Systems – Human factors. H.5.2 [ Information Interfaces and Presentation ]: User Interfaces – User-centered design. K.4.1 [ Computers and Society ]: Public Policy Issues – Privacy. General Terms Design, Security, Human Factors Keywords Ubiquitous computing, privacy, toolkit, Confab, location 1. INTRODUCTION Westin defined information privacy as “the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” . While many people believe that ubiquitous computing holds great promise, privacy is easily its most often-cited criticism. Numerous interviews (e.g. [8, 35, 43]), essays (e.g. [21, 67, 69]), books (e.g. [11, 28]), and negative media coverage (e.g. [64, 71]) have described people’s concerns about the strong potential for abuse, general unease over a potential lack of control, and desire for privacy-sensitive systems. These concerns suggest that privacy may be the greatest barrier to the long-term success of ubiquitous computing. The large majority of previous work on privacy has tended to focus on providing anonymity or on keeping personal information and messages secret from hackers, governments, and faceless corporations. While anonymity and secrecy are clearly important, they only address a relatively narrow aspect of privacy and do not cover the many situations in everyday life where people do want to share information with others. For example, one could imagine to share information with others....
View Full Document
- Spring '08
- Speak, Information privacy, Confab