TY - GEN
T1 - Privacy preserving ubiquitous service provisioning based on Bayesian network conversion
AU - Kasai, Hiroyuki
AU - Uchida, Wataru
AU - Kurakake, Shoji
PY - 2005
Y1 - 2005
N2 - Protecting personal privacy is already seen as a crucial requirement in the implementation of service provisioning in the ubiquitous environment. From the view point of preserving personal privacy, the simplest approach would be for users not to reveal any kind of private information at any time while keeping the number of available services unrestricted. Meanwhile, from the service provider's point of view, though this has been not clearly stated so far, their service logics should also be hidden from others because those logics may leak their know-how. This paper presents a novel ubiquitous service provisioning mechanism mat gives more opportunities for users to get available services while preserving the secrecy of users' and providers' sensitive information. The basic idea of this mechanism is to share service execution procedures between the service provider and the user by exchanging converted, service logic described in the form of Bayesian decision networks. This paper describes the proposed mechanism and the conversion algorithm for the Bayesian networks, and details the system architecture and implementation.
AB - Protecting personal privacy is already seen as a crucial requirement in the implementation of service provisioning in the ubiquitous environment. From the view point of preserving personal privacy, the simplest approach would be for users not to reveal any kind of private information at any time while keeping the number of available services unrestricted. Meanwhile, from the service provider's point of view, though this has been not clearly stated so far, their service logics should also be hidden from others because those logics may leak their know-how. This paper presents a novel ubiquitous service provisioning mechanism mat gives more opportunities for users to get available services while preserving the secrecy of users' and providers' sensitive information. The basic idea of this mechanism is to share service execution procedures between the service provider and the user by exchanging converted, service logic described in the form of Bayesian decision networks. This paper describes the proposed mechanism and the conversion algorithm for the Bayesian networks, and details the system architecture and implementation.
KW - Bayesian network
KW - Logic conversion
KW - Privacy protection
KW - Service logic
UR - http://www.scopus.com/inward/record.url?scp=33847018121&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847018121&partnerID=8YFLogxK
U2 - 10.1109/SECCMW.2005.1588298
DO - 10.1109/SECCMW.2005.1588298
M3 - Conference contribution
AN - SCOPUS:33847018121
SN - 0780394690
SN - 9780780394698
T3 - Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
SP - 72
EP - 81
BT - Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
T2 - Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005
Y2 - 5 September 2006 through 9 September 2006
ER -