Information Exposure Control through Data Manipulation for Ubiquitous Computing

NSPW '04: Proceedings of the 2004 workshop on New security paradigms(2004)

引用 28|浏览2
暂无评分
摘要
The vision of Ubiquitous Computing (22) creates the world in which information is omnipresent, migrating seamlessly through the en- vironment to be accessible whenever and wherever needed. Such a vision poses substantial challenges to information security and privacy protection. Unlike in traditional, static, execution environments, information in the Ubiquitous world is exposed, throughout its lifetime, to con- stantly varying security and privacy threats caused by the inherent dynamicity and unpredictability of the new computing environment and its mobility. Existing data protection mechanisms, built for non- or predictably slowly-changing environments, are unable to strike the balance in the information availability vs. security and privacy threat trade-off in the Ubiquitous world thus hindering the feasibility of the overall vision. In this paper, we present our initial work on a novel paradigm for in- formation security and privacy protection in the ubiquitous world. We model security and privacy threats through sets of contextual attributes and mitigate the projected risks through proactive and reactive data format transformations, subsetting and forced migra- tions while trying to maximize information availability. We also try to make the approach exible, scalable and infrastructure indepen- dent, as required by the very vision of the Ubiquitous Computing.
更多
查看译文
关键词
privacy threat trade-off,privacy threat,model security,information availability,ubiquitous world,privacy protection,ubiquitous computing,varying security,information security,overall vision,information exposure control,data manipulation,security assurance,agile methods,data protection,software development process,security,security engineering
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要