DOI QR코드

DOI QR Code

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee (Graduate School of Industrial Information, Daegu University) ;
  • Kim, Jae-Joon (School of Computer and Communication, Daegu University)
  • Received : 2010.02.18
  • Accepted : 2010.03.24
  • Published : 2010.06.30

Abstract

This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

Keywords

References

  1. “P3P1.0: The Platform for Privacy Preferences 1.0 Specification,” W3C, http://www.w3.org/TG/P3P/, 2002.
  2. P. Ashley, S. Hada, G. Karjth, M. Schunter, E-P3P, “Privacy Policies and Privacy Authorization,” ACM Workshop on Privacy in The Electronic Society (WPES), pp.103-109, 2002. https://doi.org/10.1145/644527.644538
  3. “Identity Management Systems (IMS): Identification and Comparison Study,” Commissioned by the Joint Research Centre, Seville, Spain, September 2003. http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.
  4. Kurkovsky, O Rivera, J Bhalodi, “Classification of Privacy Management Techniques in Pervasive Computing,” International Journal of u- and e-Service, Science and Technology, Vol.11, No.1, pp.55-71, 2007
  5. Michiru Tanaka, Jun Sasaki, Yutaka Funyu, and Yoshimi Teshigawara, “A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones,” Frontiers in Artificial Intelligence and Applications; Proceedings of the 2008 conference on Information Modelling and Knowledge Bases XIX, Vol.166, pp.346-353, 2008.
  6. Md. Nurul Huda and Eiji Kamioka, “Privacy Protection in Mobile Agent based Service Domain,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA’05), Vol.2, pp.482-487, 2005. https://doi.org/10.1109/ICITA.2005.218
  7. M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” Proceedings of International Conference on Ubiquitous Computing 2002 (UbiComp 2002), pp.237-245, 2002.
  8. Xiaodong Jiang, Jason I. Hong, James A. Landay “Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing”, Proceedings of the 4th international conference on Ubiquitous Computing, Sep., pp.176-193, 2002. https://doi.org/10.1007/3-540-45809-3_14
  9. “Introduction to the Liberty Alliance Identity Architecture,” Liberty Alliance Project, http://www.Projectliberty.org/, March, 2003.
  10. Scott Cantor, John Kemp, “Liberty ID-FF Protocols and Schema Specification,” Version 1.2 Liberty Alliance Project, January, 2004.
  11. “SourceID: Federated identity infrastructure,” Ping Identity, 2004, http://www.sourceid.org/.
  12. “Microsoft .NET Passpost, “Microsoft, 2004, http://www.microsoft.com/net/services/passport/.
  13. S.R. Cho and S.H. Jin, “A Digital Identity Interchange Framework for User-Centric ID Management,” http://eettrends.etri.re.kr, Vol.23, No.6, pp.102-111, December, 2008.
  14. Xiang Yang, Yuanyi Zhang, Qinzhou Niu, Xiaomei Tao, Luo Wu, “A Mobile-Agent-Based Application Model Design of Pervasive Mobile Devices,” Proceedings of Pervasive Computing and Applications, pp.1-6, 2007. https://doi.org/10.1109/ICPCA.2007.4365402

Cited by

  1. Preserving Differential Privacy for Similarity Measurement in Smart Environments vol.2014, 2014, https://doi.org/10.1155/2014/581426