[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Context-aware System for Dynamic Privacy Risk Inference

Published: 01 December 2019 Publication History

Abstract

With the rapid expansion of smart cyber–physical systems and environments, users become more and more concerned about their privacy, and ask for more involvement in the protection of their data. However, users may not be necessarily aware of the direct and indirect privacy risks they take to properly protect their privacy. In this paper, we propose a context-aware semantic reasoning system, denoted as the Privacy Oracle, capable of providing users with a dynamic overview of the privacy risks taken as their context evolves. To do so, the system continuously models, according to a proposed Semantic User Environment Modeling (SUEM) ontology, the knowledge (received by the system) about the user of interest and his surrounding cyber–physical environment. In parallel, it performs continuous reasoning over modeled information, by relying on set of privacy rules, in order to dynamically infer the privacy risks taken by the user. To validate our approach, we developed a prototype based on the semantic web tools such as OWL API, SWRL API and the inference engine Pellet. We evaluated the system performance by considering multiple use cases. Our experimental results show that the Privacy Oracle can assist users by dynamically detecting their incurred privacy risks, and by tracking, in real-time, the evolution of those risks as user context changes.

References

[1]
Sweeney L., K-anonymity: A model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10 (05) (2002) 557–570.
[2]
Machanavajjhala A., Gehrke J., Kifer D., Venkitasubramaniam M., ∖ell-Diversity: Privacy Beyond∖kappa-Anonymity, IEEE, 2006, p. 24.
[3]
Dwork C., Differential privacy: A survey of results, in: International Conference on Theory and Applications of Models of Computation, Springer, 2008, pp. 1–19.
[4]
Oulmakhzoune S., Cuppens-Boulahia N., Cuppens F., Morucci S., Barhamgi M., Benslimane D., Privacy query rewriting algorithm instrumented by a privacy-aware access control model, Ann. Télécommun. 69 (1–2) (2014) 3–19.
[5]
Barhamgi M., Benslimane D., Amghar Y., Cuppens-Boulahia N., Cuppens F., Privcomp: a privacy-aware data service composition system, in: Joint 2013 EDBT/ICDT Conferences, EDBT ’13 Proceedings, Genoa, Italy, March 18-22, 2013, 2013, pp. 757–760.
[6]
Barhamgi M., Bandara A.K., Yu Y., Belhajjame K., Nuseibeh B., Protecting privacy in the cloud: Current practices, future directions, IEEE Comput. 49 (2) (2016) 68–72.
[7]
Kolter J.P., User-centric Privacy: A Usable and Provider-independent Privacy Infrastructure, Vol. 41, BoD–Books on Demand, 2010.
[8]
Knijnenburg B.P., Simplifying privacy decisions: Towards interactive and adaptive solutions., in: Decisions@ RecSys, 2013, pp. 40–41.
[9]
N. Vollmer, Table of contents EU General Data Protection Regulation (EU-GDPR), http://www.privacy-regulation.eu/en/index.htm, 2018.
[10]
Castelluccia C., Cunche M., Metayer D.L., Morel V., Enhancing transparency and consent in the iot, in: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), 2018, pp. 116–119.
[11]
Addo I.D., Ahamed S.I., Yau S.S., Buduru A., A reference architecture for improving security and privacy in internet of things applications, in: 2014 IEEE International Conference on Mobile Services, 2014, pp. 108–115.
[12]
Data in the post-gdpr world, Comput. Fraud Secur. 2018 (9) (2018) 17–18.
[14]
G.M. Stevens, Data security breach notification laws, tech. rep., Congressional Research Service, 2012.
[15]
E. McCallister, Guide to protecting the confidentiality of personally identifiable information (PII), Tech. Rep. NIST SP 800-122, National Institute of Standards and Technology, Gaithersburg, MD, 2010.
[16]
Callahan M., Us dhs handbook for safeguarding sensitive personally identifiable information, Washington, DC (2012).
[17]
V.Y. Pillitteri, T.L. Brewer, Guidelines for smart grid cybersecurity, Tech. Rep. NISTIR 7628 Revision 1, National Institute of Standards and Technology, 2014 Guidelines for Smart Grid Cybersecurity.
[18]
Lisovich M.A., Mulligan D.K., Wicker S.B., Inferring personal information from demand-response systems, IEEE Secur. Priv. 8 (1) (2010).
[19]
Barhamgi M., Perera C., Ghedira C., Benslimane D., User-centric privacy engineering for the internet of things, IEEE Cloud Comput. 5 (5) (2018) 47–57.
[20]
Perera C., Zaslavsky A., Christen P., Georgakopoulos D., Context aware computing for the internet of things: A survey, IEEE Commun. Surv. Tutor. 16 (1) (2014) 414–454.
[21]
Dey A.K., Abowd G.D., Salber D., A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications, Human–Comput. Interact. 16 (2–4) (2001) 97–166.
[22]
Sanchez L., Lanza J., Olsen R., Bauer M., Girod-Genet M., A generic context management framework for personal networking environments, in: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, 2006, pp. 1–8.
[23]
S. Cox, C. Little, Time ontology in OWL, W3C Recommendation. https://www.w3.org/TR/owl-time/, 2017.
[24]
A. Haller, K. Janowicz, S. Cox, Semantic sensor network ontology, https://www.w3.org/TR/vocab-ssn/, 2017.
[25]
Mansour E., Chbeir R., Arnould P., Hssn: an ontology for hybrid semantic sensor networks, In the 23rd International Database Engineering & Applications Symposium (IDEAS1́9) (2019) To appear.
[26]
Seydoux N., Drira K., Hernandez N., Monteil T., IoT-O, a core-domain IoT ontology to represent connected devices networks, in: Knowledge Engineering and Knowledge Management, 10024, Springer International Publishing, 2016, pp. 561–576.
[27]
Baader F., Horrocks I., Sattler U., Description logics, in: Handbook on ontologies, Springer, 2004, pp. 3–28.
[28]
OWL Web Ontology Language Reference, https://www.w3.org/TR/owl-ref/, 2004.
[29]
[30]
H. Ian, P.-S. Peter F., B. Harold, T. Said, G. Benjamin, D. Mike, SWRL: A Semantic Web Rule Language Combining OWL and RuleML, https://www.w3.org/Submission/2004/SUBM-SWRL-20040521/, 2004.
[31]
Skillen K.-L., Chen L., Nugent e.a., Ontological user profile modeling for context-aware application personalization, in: International Conference on Ubiquitous Computing and Ambient Intelligence, Springer, 2012, pp. 261–268.
[32]
Sutterer M., Droegehorn O., David K., UPOS: User profile ontology with situation-dependent preferences support, in: Advances in Computer-Human Interaction, IEEE, 2008, pp. 230–235.
[33]
Klyne G., Reynolds F., Woodrow C., Ohto H., Hjelm J., Butler M.H., Tran L., Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies, 2004, https://www.w3.org/TR/CCPP-struct-vocab/.
[34]
Skillen K.-L., Chen L., Nugent C.D., Donnelly M.P., Solheim I., A user profile ontology based approach for assisting people with dementia in mobile environments, in: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, 2012, pp. 6390–6393.
[35]
D. Brickley, L. Miller, FOAF Vocabulary Specification, http://xmlns.com/foaf/spec/, 2014.
[36]
Stan J., Egyed-Zsigmond E., Joly A., Maret P., A user profile ontology for situation-aware social networking, in: 3rd Workshop on Artificial Intelligence Techniques for Ambient Intelligence (AITAmI2008), 2008.
[37]
M. Bermudez-Edo, T. Elsaleh, P. Barnaghi, K. Taylor, IoT-Lite Ontology, https://www.w3.org/Submission/2015/SUBM-iot-lite-20151126/, 2015.
[38]
Kotis K., Katasonov A., An IoT-ontology for the Representation of Interconnected, Clustered and Aligned Smart Entities, 2012, p. 14.
[39]
Strang T., Linnhoff-Popien C., A context modeling survey, in: Workshop on Advanced Context Modelling, Reasoning and Management, UbiComp, Vol. 4, 2004, pp. 34–41.
[40]
Rodríguez N.D., Cuéllar M.P., Lilius J., Calvo-Flores M.D., A survey on ontologies for human behavior recognition, ACM Comput. Surv. 46 (4) (2014) 43.
[41]
Abowd G.D., Dey A.K., Brown P.J., Davies N., Smith M., Steggles P., Towards a better understanding of context and context-awareness, in: International Symposium on Handheld and Ubiquitous Computing, Springer, 1999, pp. 304–307.
[42]
Dey A.K., Mankoff J., Designing mediation for context-aware applications, ACM Trans. Comput.-Human Interact. (TOCHI) 12 (1) (2005) 53–80.
[43]
Ryan N., Pascoe J., Morse D., Enhanced reality fieldwork: the context aware archaeological assistant, Bar Int. Ser. 750 (1999) 269–274.
[44]
Thevenin D., Coutaz J., Plasticity of user interfaces: Framework and research agenda., in: Interact, Vol. 99, 1999, pp. 110–117.
[45]
Wang X.H., Zhang D., Gu T., Pung H.K., Ontology based context modeling and reasoning using OWL, in: Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second IEEE Annual Conference on, Ieee, 2004, pp. 18–22.
[46]
Kim J., Chung K.-Y., Ontology-based healthcare context information model to implement ubiquitous environment, Multimedia Tools Appl. 71 (2) (2014) 873–888.
[47]
Schilit B., Adams N., Want R., Context-aware computing applications, in: Mobile Computing Systems and Applications, 1994. Proceedings., Workshop on, IEEE, 1994, pp. 85–90.
[48]
Ejigu D., Scuturici M., Brunie L., An ontology-based approach to context modeling and reasoning in pervasive computing, in: Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on, IEEE, 2007, pp. 14–19.

Index Terms

  1. Context-aware System for Dynamic Privacy Risk Inference
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Future Generation Computer Systems
        Future Generation Computer Systems  Volume 101, Issue C
        Dec 2019
        1295 pages

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        Published: 01 December 2019

        Author Tags

        1. Privacy engineering
        2. Privacy risk
        3. Context-aware computing
        4. Semantic reasoning
        5. Ontology
        6. Internet of Things

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 12 Dec 2024

        Other Metrics

        Citations

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media