Abstract
When we consider wearable computers, smart homes, and various sensors omnipresent in our environment and the data collected by such systems, we can see that ensuring privacy and security is a big challenge in ubiquitous computing (UbiComp). This is due to the fact that ubiquitous computing is highly integrated into our daily lives, making the dependability of these systems ever more central and yet difficult to control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE, 63ā69 (1975)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. IEEE Computer (June 2004)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information TheoryĀ 6(22) (1976)
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)
Robinson, P., Zimmer, T.: Structured analysis of security in ubiquitous computing (2007)
Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing context-aware applications using environment roles. In: ACM Workshop on Role Based Access Control (2001)
for Standardization, I.O.: ISO9 ISO IS 15408 (1999), http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=40613
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity and identity management a consolidated proposal for terminology (May 2006), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD RecordĀ 1(33) (2004)
McGraw, G.: A new class of wireless attacks (2001), http://www.linuxsecurity.com/articles/network_security_article-3858.html
Wang, H., Huang, J., Qu, Y., Xi, J.: Web services: problems and future directions. Journal of Web SemanticsĀ 1 (2004)
Orr, R., Abowd, G.: The smart floor: A mechanism for natural user identification and tracking. Technical report, Georgia Institute of Technology (2000)
Lee, W., Stolfo, S., Mok, K.: Adaptive intrusion detection: A data mining approach. Artificial Intelligence ReviewĀ 16 (2000)
Wood, A., Stankovic, J.: Denial of services in sensor networks. IEEE Computer (October 2002)
Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, SIGMOD 1996 (1996)
OāLeary, D.E.: Knowledge discovery as a threat to database security. In: Knowledge Discovery in Databases. AAAI/MIT Press (1991)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 439ā450 (2000)
Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining privacy for data mining. In: Natural Science Foundation Workshop on Next Generation Data Mining, pp. 126ā133 (2002)
Zhan, J.Z., Chang, L.W., Matwin, S.: Privacy-preserving collaborative sequential pattern mining. In: Proceedings of Workshop on Link Analysis, Counter-terrorism and Privacy (2004)
Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. Technical report, SRI International (1998)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based SystemsĀ 5(10) (2002)
Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), pp. 620ā629 (2005)
Mokbel, M.F., Chow, C., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006)
Bettini, C., SeanWang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Proceedings of 2nd VLDB Workshop on Secure Data Management, SDM (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Giannotti, F., Saygin, Y. (2010). Privacy and Security in Ubiquitous Knowledge Discovery. In: May, M., Saitta, L. (eds) Ubiquitous Knowledge Discovery. Lecture Notes in Computer Science(), vol 6202. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16392-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16392-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16391-3
Online ISBN: 978-3-642-16392-0
eBook Packages: Computer ScienceComputer Science (R0)