To read this content please select one of the options below:

LooM: An anonymity quantification method in pervasive computing environments

Miyuki Imada (NTT Network Innovation Labs, Tokyo, Japan)
Masakatsu Ohta (NTT Network Innovation Labs, Tokyo, Japan)
Masayasu Yamaguchi (NTT Network Innovation Labs, Tokyo, Japan)
Sun Yong Kim (NTT Network Innovation Labs, Tokyo, Japan)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 4 April 2008

213

Abstract

Purpose

The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing environments.

Design/methodology/approach

The main feature is that the method quantitatively controls anonymity by a single value (disclosure threshold value) using a classification algorithm of the decision tree. The value is not affected by the set size of users or the distribution of users' private information. The effectiveness of this method is confirmed by simulation using sample databases of attribute‐value pairs. Proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements and applies web questionnaire survey data to this model.

Findings

LooM can be applicable to a variety of pervasive computing and communication services handling a huge amount of data containing privacy information.

Originality/value

The paper proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements.

Keywords

Citation

Imada, M., Ohta, M., Yamaguchi, M. and Yong Kim, S. (2008), "LooM: An anonymity quantification method in pervasive computing environments", International Journal of Pervasive Computing and Communications, Vol. 4 No. 1, pp. 110-123. https://doi.org/10.1108/17427370810873147

Publisher

:

Emerald Group Publishing Limited

Copyright © 2008, Emerald Group Publishing Limited

Related articles