Publication Type:
Conference Paper
Source:
International Conference on Ubiquitous Computing - UbiComp, Springer Verlag, GÖteberg, Sweden (0)
Keywords:
Privacy- Marc Langheinrich
Abstract:
Protecting personal privacy is going to be a prime concern for the deployment
of ubiquitous computing systems in the real world. With daunting Orwellian
visions looming, it is easy to conclude that tamper-proof technical protection
mechanisms such as strong anonymization and encryption are the only
solutions to such privacy threats. However, we argue that such perfect protection
for personal information will hardly be achievable, and propose instead to build
systems that help others respect our personal privacy, enable us to be aware of
our own privacy, and to rely on social and legal norms to protect us from the
few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous
computing environments that allows data collectors to both announce and
implement data usage policies, as well as providing data subjects with technical
means to keep track of their personal information as it is stored, used, and
possibly removed from the system. Even though such a system cannot guarantee
our privacy, we believe that it can create a sense of accountability in a world of
invisible services that we will be comfortable living in and interacting with.
Notes:
Purpose:
· Create a sense of accountability
· Anonymities vs. Real identity
Solutions:
· Notice: privacy policies & policy announcement
· Choice and consent: privacy agreements
· Proximity and locality: locality information
· Access and recourse: data access, and data logs.
4 Core concept of the system:
1. Machine-readable privacy policies (to provide choice and consent)
2. Policy announcement mechanism (to give notice)
3. Privacy proxies (to support access)
4. Privacy aware database (to support recourse: usage logs)
References:
1. Mark Stefik. Trusted Systems. Scientific American, pages 78-81, March 1997