In this paper, we present a complete overview of Ambient Intelligence (AmI) focused in its applications, considering the involved domain and technologies. The applications include AmI at home, care of elderly and people with disabilities, healthcare, education, business, public services, leisure and entertainment. The aim of this survey of AmI's applications is to show its socials and ethical implications and specially privacy issues. Intelligent Environments (IE) collect and process a massive amount of person-related and sensitive data. These data must ensure privacy of the users. An important concern in AmI´s applications is privacy. Addressing design by privacy, an important challenge to consider is the development of an architecture that includes the different privacy policies and how can we fusion them in a specific application domain. Ensuring privacy in Intelligent Environments is a difficult problem to solve, as there are different perceptions of privacy and its role in computing for each user. In the so called 'design by privacy' we have to identify the relevant design issues that should be addressed for its developing. Here we present an approach to the dimensions to consider, in order to provide privacy in the design of Ambient Intelligence's applications.
Intelligent Environments (IE) collect and process a massive amount of personrelated and sensitive information. The aim of this work is to show the awareness of privacy issues in AmI and to identify the relevant design issues that should be addressed in order to provide privacy in the design of Ambient Intelligence's applications focused in the user´s domain and involved technologies. We propose a conceptual framework in order to enforce privacy that takes care of interaction between technologies and devices, users and application´s domain with different modules that contain different steps relating to the privacy policies.
Abstract. In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.