Location privacy in pervasive computing

被引:747
作者
Beresford, AR [1 ]
Stajano, F [1 ]
机构
[1] Univ Cambridge, Cambridge CB2 1TN, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/MPRV.2003.1186725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A technique called as the mix-zone, a new construction inspired by anonymous communication techniques, together with metrics for assessing user anonymity is discussed. Mix zones are based on location privacy, a particular type of information privacy. The applications of location privacy in pervasive computing are also discussed. When location systems track users automatically on an ongoing basis, they generate an enormous amount of potentially sensitive information. Privacy of location information controls access to this information.
引用
收藏
页码:46 / 55
页数:10
相关论文
共 11 条
  • [1] BANISAR DAVID, PRIVACY HUMAN RIGHTS
  • [2] Brandeis L., 1890, HARVARD LAW REV, V4, P193, DOI [10.2307/1321160, DOI 10.2307/1321160]
  • [3] CHAUM D, 1988, J CRYPTOL, V1, P66
  • [4] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [5] Pfitzmann A., 2001, Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings (Lecture Notes in Computer Science Vol.2009), P1
  • [6] SERJANTOV A, 2002, P WORKSH PRIV ENH TE
  • [7] A MATHEMATICAL THEORY OF COMMUNICATION
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (03): : 379 - 423
  • [8] A MATHEMATICAL THEORY OF COMMUNICATION
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (04): : 623 - 656
  • [9] Stajano F., 2002, Security for ubiquitous computing
  • [10] United Nations, 1948, UN DECL HUM RIGHTS