T3-PrivacySensitiveUbiquitousComputing

T3-PrivacySensitiveUbiquitousComputing - An Architecture for

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
An Architecture for Privacy-Sensitive Ubiquitous Computing 1 Cindy Nguyen An Architecture for Privacy-Sensitive Ubiquitous Computing By: Cindy Nguyen University Central of Florida Professor: Dr. Lotzi Bölöni Class: EEL6788 Date: Feb 15, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
An Architecture for Privacy-Sensitive Ubiquitous Computing 2 Cindy Nguyen University Central of Florida 1. Introduction 2. System Requirements 3. CONFAB System Architecture 4. Evaluation 5. Conclusion 6. Related Work 7. Future Work Outline
Background image of page 2
An Architecture for Privacy-Sensitive Ubiquitous Computing 3 Cindy Nguyen University Central of Florida Presents Significant advances : Wireless networks Sensors Devices of all form factors. Create new kinds of ubiquitous computing applications that can gather and communicate information at unprecedented levels, all in real-time. Introduction Find a Friend Call E911
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
An Architecture for Privacy-Sensitive Ubiquitous Computing 4 Cindy Nguyen University Central of Florida The problem – Privacy Risks : The same technologies also create new privacy risks. Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. Introduction Everyday Risks Extreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety Employers _________________________________ Over-monitoring Discrimination Reputation Friends, Family _________________________________ Over-protection Social obligations Embarrassment Government __________________________ Civil liberties
Background image of page 4
An Architecture for Privacy-Sensitive Ubiquitous Computing 5 Cindy Nguyen University Central of Florida The reasons need for privacy in ubiquitous computing : Privacy concerns exist wherever uniquely identifiable data relating to a person or persons are collected and stored, in digital form or otherwise. In some cases these concerns refer to how data is collected, stored, and associated. In other cases the issue is who is given access to information. Developers currently have little support in designing software architectures Creating interactions that are effective in helping end-users manage their privacy. Introduction
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
An Architecture for Privacy-Sensitive Ubiquitous Computing 6 Cindy Nguyen University Central of Florida The majority of previous work on privacy : Providing anonymity Keeping personal information Messages secret From hackers, governments, and faceless corporations. While anonymity and secrecy are clearly important, they only address a relatively narrow aspect of privacy and do not cover the many situations in everyday life where people do want to share information with others. Previous Work
Background image of page 6
An Architecture for Privacy-Sensitive Ubiquitous Computing 7 Cindy Nguyen University Central of Florida The problem is that it is still difficult to design and implement privacy-sensitive ubicomp applications. Previous work, such as:
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 41

T3-PrivacySensitiveUbiquitousComputing - An Architecture for

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online