Sciweavers

Share
PERCOM
2008
ACM

Protecting Users' Anonymity in Pervasive Computing Environments

9 years 11 months ago
Protecting Users' Anonymity in Pervasive Computing Environments
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this field can still be considered in its infancy. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a set of defense techniques is proposed. These techniques are validated through the use of a simulator and an extensive set of experiments.
Linda Pareschi, Daniele Riboni, Claudio Bettini
Added 24 Dec 2009
Updated 24 Dec 2009
Type Conference
Year 2008
Where PERCOM
Authors Linda Pareschi, Daniele Riboni, Claudio Bettini
Comments (0)
books