2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies 2009
DOI: 10.1109/ngmast.2009.23
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Friendly Smart Environments

Abstract: In this paper we describe our approach on protecting user privacy in smart environments, particularly smart homes, which we call eHomes. These are environments with devices such as sensors, computational units, actors, which are seamlessly integrated in the environment, and objects we use in our everyday life. In order to provide more convenience to its users such environments can be personalized.As these environments become ubiquitous, thus supporting mobility of the users, new privacy threats arise. These ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Figure 2 shows the distribution over the years of the selected publications, according to the publication date. [12] Privacy-Friendly smart environments Vinkovits et al [13] Anonymous networking meets real-world business req. .…”
Section: F Final Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 2 shows the distribution over the years of the selected publications, according to the publication date. [12] Privacy-Friendly smart environments Vinkovits et al [13] Anonymous networking meets real-world business req. .…”
Section: F Final Selectionmentioning
confidence: 99%
“…Another application domain category that is considered in this survey is smart environments. In this category, we considered papers that deal with smart homes, smart buildings, smart cities, and more [12], [15], [17], [20], [29]. These are environments with versatile smart devices and objects integrated to bring convenience for the users while using them in their everyday life.…”
Section: ) Smart Environmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…In reference to security of data, 'security' and 'privacy' are often used interchangeably (e.g. Ahamed et al 2007a;Armac et al 2009;Busnel and Giroux 2010;Chan et al 2008;Dhukaram et al 2011;Elkhodr et al 2011;Garcia-Morchon et al 2009;Mana et al 2011;Stuart et al 2008;Wang et al 2008). The concepts must be differentiated by their ends: security is concerned with guaranteeing the quality of the data collected by and passing through a system in terms of "confidentiality, integrity and availability" (Giannotti and Saygin 2010, p. 75), enabling users to protect privacy by controlling dissemination of their data and preventing hacks or breaches (Peppet 2014).…”
Section: Informational Privacymentioning
confidence: 99%
“…[177] Therefore, individuals should always be informed of the presence of RFID tags and readers, the purpose for which the data are collected and processed, who the responsible controller is and whether the data are stored and made available to other parties. [178] However, privacy protection and system performance have conflicting requirements and goals, [177] and autonomy of SWE users is inclined to conflict with safety and health. [176] Therefore, it is particularly important to investigate these issues to determine the adequate balance between them.…”
Section: Security Issues and Data Protectionmentioning
confidence: 99%