Protection of privacy in pervasive computing environments

Heng Seng Cheng, Daqing Zhang, Joo Geok Tan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we present two techniques. The first technique called Privacy Sensitive Information dilUting Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.

Original languageEnglish
Title of host publicationProceedings ITCC 2005 - International Conference on Information Technology
Subtitle of host publicationCoding and Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages242-247
Number of pages6
ISBN (Print)0769523153, 9780769523156
DOIs
Publication statusPublished - 1 Jan 2005
Externally publishedYes
EventITCC 2005 - International Conference on Information Technology: Coding and Computing - Las Vegas, NV, United States
Duration: 4 Apr 20056 Apr 2005

Publication series

NameInternational Conference on Information Technology: Coding and Computing, ITCC
Volume2

Conference

ConferenceITCC 2005 - International Conference on Information Technology: Coding and Computing
Country/TerritoryUnited States
CityLas Vegas, NV
Period4/04/056/04/05

Fingerprint

Dive into the research topics of 'Protection of privacy in pervasive computing environments'. Together they form a unique fingerprint.

Cite this