Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Privacy In Ubiquitous Computing

Proposal of a "Neo-Model" to address the issue of privacy in ubiquitous computing.

Varshith Anand

on 16 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Privacy In Ubiquitous Computing

Double click anywhere & add an idea Privacy in Ubiquitous Computing:
The "Neo-Model" UbiComp Video Ubicomp... great feature!
But really? The issue of privacy Privacy Video Addressing this serious issue Previous Models Secure Persona Exchange
Trust-based Model Secure Persona Exchange based on Privacy Preferences Project(P3P) style system utilisation of multiple personas (represent user info and provide notice of data collection) notice-choice model at its core anonymisation & pseudonymation Trust-based Model Primarily applicable to Context-Aware systems
Initial step involves ‘Risk Evaluation’
Trust Representation – varying levels
Creation of Risk-Trust hierarchy pyramid
Establishment of privacy management policy
Multiple-choice access granting decisions
Neo Model combine Challenges of existing Models Adaptability of P3P
Non Existence of Privacy Enhancing Services for UbiComp Environments
Proposed "Neo-Model" Assigning Trust Values
Trust Value based personas
Strict need-to-know data flow
Grouping of Privacy Policies
Avoiding Law-based Recourse
Further Work and Conclusion A lot of further work and research must be done, just to conceptualize privacy in UbiComp systems.
These studies do not even consider the implementation details which may prove to be a challenge in itself .
UbiComp What-it-is
Full transcript