Trust-based model for privacy control in context aware systems

W. Wagealla, S. Terzis, C. English

Research output: Contribution to conferencePaperpeer-review

87 Downloads (Pure)

Abstract

In context-aware systems, there is a high demand on providing privacy solutions to users when they are interacting and exchanging personal information. Privacy in this context encompasses reasoning about trust and risk involved in interactions between users. Trust, therefore, controls the amount of information that can be revealed, and risk analysis allows us to evaluate the expected benefit that would motivate users to participate in these interactions. In this paper, we propose a trust-based model for privacy control in context-aware systems based on incorporating trust and risk. Through this approach, it is clear how to reason about trust and risk in designing and implementing context-aware systems that provide mechanisms to protect users' privacy. Our approach also includes experiential learning mechanisms from past observations in reaching better decisions in future interactions. The outlined model in this paper serves as an attempt to solve the concerns of privacy control in context-aware systems. To validate this model, we are currently applying it on a context-aware system that tracks users' location. We hope to report on the performance evaluation and the experience of implementation in the near future.
Original languageEnglish
Number of pages5
Publication statusPublished - 15 Oct 2003
EventSecond Workshop on Security in Ubiquitous Computing at the Fifth Annual Conference on Ubiquitous Computing (UbiComp2003) - Washington, USA
Duration: 12 Oct 200315 Oct 2003

Conference

ConferenceSecond Workshop on Security in Ubiquitous Computing at the Fifth Annual Conference on Ubiquitous Computing (UbiComp2003)
CityWashington, USA
Period12/10/0315/10/03

Keywords

  • trust management
  • privacy control
  • computer security
  • network security

Fingerprint

Dive into the research topics of 'Trust-based model for privacy control in context aware systems'. Together they form a unique fingerprint.

Cite this