{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:19:43Z","timestamp":1776334783983,"version":"3.51.2"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030105907","type":"print"},{"value":"9783030105914","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Ubiquitous computing systems are commonplace. They have opened the door to great benefits for society as a whole. However, they have to be used with care, otherwise they can cause serious risks for their users. In this chapter, we analyze the privacy risks of ubiquitous computing systems from a new individual-centred perspective based on five privacy dimensions, namely identity, location, footprint, query and intelligence. We describe each dimension and provide an introductory view of the main privacy risks of these systems. Also, we discuss some of the challenges that derive from new trends in the field.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_12","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"201-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach"],"prefix":"10.1007","author":[{"given":"Agusti","family":"Solanas","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Batista","sequence":"additional","affiliation":[]},{"given":"Fran","family":"Casino","sequence":"additional","affiliation":[]},{"given":"Achilleas","family":"Papageorgiou","sequence":"additional","affiliation":[]},{"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Osman Abul and Cans\u0131n Bayrak. From location to location pattern privacy in location-based services. Knowledge and Information Systems, Jan 2018.","DOI":"10.1007\/s10115-017-1146-x"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC, pages 1\u20138, 1999.","DOI":"10.1145\/336992.336995"},{"key":"12_CR9","unstructured":"Eytan Adar. User 4xxxxx9: Anonymizing query logs. In Proc of Query Log Analysis Workshop, International Conference on World Wide Web, 2007."},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"Rakesh Agrawal","year":"2000","unstructured":"Rakesh Agrawal and Ramakrishnan Srikant. Privacy-Preserving Data Mining. ACM Sigmod Record, 29(2):439\u2013450, 2000.","journal-title":"ACM Sigmod Record"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, and Zhili Sun. Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges and countermeasures. IEEE Internet of Things Journal, pages 1\u20131, 2018.","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Mehrnaz Ataei and Christian Kray. Ephemerality is the new black: A novel perspective on location data management and location privacy in lbs. In Georg Gartner and Haosheng Huang, editors, Progress in Location-Based Services 2016, pages 357\u2013373, Cham, 2017. Springer International Publishing.","DOI":"10.1007\/978-3-319-47289-8_18"},{"key":"12_CR76","unstructured":"Alastair R. Beresford and Frank Stajano. Mix zones: User privacy in location-aware services. In 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14\u201317 March 2004, Orlando, FL, USA, pages 127\u2013131, 2004."},{"key":"12_CR84","doi-asserted-by":"crossref","unstructured":"John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP\u201907. IEEE Symposium on, pages 321\u2013334. IEEE, 2007.","DOI":"10.1109\/SP.2007.11"},{"key":"12_CR85","doi-asserted-by":"crossref","unstructured":"Claudio Bettini, X. Sean Wang, and Sushil Jajodia. Protecting privacy against location-based personal identification. In Willem Jonker and Milan Petkovi\u0107, editors, Secure Data Management, pages 185\u2013199. Springer, 2005.","DOI":"10.1007\/11552338_13"},{"issue":"1","key":"12_CR119","first-page":"47","volume":"2","author":"Kang Byeong-Ho","year":"2007","unstructured":"Kang Byeong-Ho. Ubiquitous computing environment threats and defensive measures. Int. J. Multimedia Ubiquit. Eng, 2(1):47\u201360, 2007.","journal-title":"Int. J. Multimedia Ubiquit. Eng"},{"key":"12_CR123","unstructured":"Ying Cai and Ge Xu. Cloaking with footprints to provide location privacy protection in location-based services, August 15 2017. US Patent 9,736,685."},{"key":"12_CR176","doi-asserted-by":"crossref","unstructured":"Simon Davies. The Data Protection Regulation: A Triumph of Pragmatism over Principle? European Data Protection Law Review, 2:290, 2016.","DOI":"10.21552\/EDPL\/2016\/3\/5"},{"key":"12_CR187","doi-asserted-by":"crossref","unstructured":"Josep Domingo-Ferrer. A three-dimensional conceptual framework for database privacy. In Workshop on Secure Data Management, pages 193\u2013202. Springer, 2007.","DOI":"10.1007\/978-3-540-75248-6_14"},{"key":"12_CR190","doi-asserted-by":"crossref","unstructured":"Yitao Duan and John Canny. Protecting user data in ubiquitous computing: Towards trustworthy environments. In International Workshop on Privacy Enhancing Technologies, pages 167\u2013185. Springer, 2004.","DOI":"10.1007\/11423409_11"},{"key":"12_CR244","doi-asserted-by":"crossref","unstructured":"Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, pages 89\u201398. Acm, 2006.","DOI":"10.1145\/1180405.1180418"},{"key":"12_CR248","doi-asserted-by":"crossref","unstructured":"Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pages 31\u201342, 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"12_CR287","doi-asserted-by":"crossref","unstructured":"Anco Hundepool, Josep Domingo-Ferrer, Luisa Franconi, Sarah Giessing, Eric Schulte Nordholt, Keith Spicer, and Peter-Paul De Wolf. Statistical disclosure control. John Wiley & Sons, 2012.","DOI":"10.1002\/9781118348239"},{"key":"12_CR290","unstructured":"IBM Marketing Cloud. 10 Key Marketing Trends for 2017 and Ideas for Exceeding Customer Expectations, 2017."},{"key":"12_CR293","unstructured":"insideBIGDATA. Guide to the Intelligent Use of Big Data on an Industrial Scale, 2017. Special Research Report."},{"key":"12_CR294","unstructured":"Internet World Stats. Internet usage statistics, the internet big picture, 2017."},{"key":"12_CR342","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.comcom.2015.07.017","volume":"73","author":"Panayiotis Kotzanikolaou","year":"2016","unstructured":"Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, and Michalis Korakakis. Lightweight private proximity testing for geospatial social networks. Computer Communications, 73:263\u2013270, 2016.","journal-title":"Computer Communications"},{"key":"12_CR346","doi-asserted-by":"crossref","unstructured":"Jukka M Krisp. Progress in location-based services. Springer, 2013.","DOI":"10.1007\/978-3-642-34203-5"},{"key":"12_CR348","volume-title":"Ubiquitous Computing Fundamentals","author":"John Krumm","year":"2016","unstructured":"John Krumm. Ubiquitous Computing Fundamentals. CRC Press, 2016."},{"key":"12_CR351","unstructured":"Ponnurangam Kumaraguru and Lorrie Faith Cranor. Privacy indexes: A survey of Westin\u2019s studies. Technical Report CMU-ISRI-5-138, Carnegei Mellon University, 2005."},{"key":"12_CR352","unstructured":"Ema Ku\u0161en and Mark Strembeck. Security-related Research in Ubiquitous Computing\u2013Results of a Systematic Literature Review. arXiv preprint arXiv:1701.00773, 2017."},{"key":"12_CR357","doi-asserted-by":"crossref","unstructured":"Marc Langheinrich. Privacy by design \u2013 principles of privacy-aware ubiquitous systems. In Gregory D. Abowd, Barry Brumitt, and Steven Shafer, editors, Ubicomp 2001: Ubiquitous Computing, pages 273\u2013291. Springer, 2001.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"12_CR358","doi-asserted-by":"crossref","unstructured":"Marc Langheinrich. A privacy awareness system for ubiquitous computing environments. In international conference on Ubiquitous Computing, pages 237\u2013245. Springer, 2002.","DOI":"10.1007\/3-540-45809-3_19"},{"issue":"6","key":"12_CR395","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2013.6525606","volume":"51","author":"Antoni Mart\u00ednez-Ballest\u00e9","year":"2013","unstructured":"Antoni Mart\u00ednez-Ballest\u00e9, Pablo A. P\u00e9rez-Mart\u00ednez, and Agusti Solanas. The pursuit of citizens\u2019 privacy: A privacy-aware smart city is possible. IEEE Communications Magazine, 51(6):136\u2013141, 2013.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"12_CR400","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1108\/JICES-08-2013-0030","volume":"12","author":"Tobias Matzner","year":"2014","unstructured":"Tobias Matzner. Why privacy is not enough privacy in the context of \u201cubiquitous computing\u201d and \u201cbig data\u201d. Journal of Information, Communication and Ethics in Society, 12(2):93\u2013106, 2014.","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"12_CR408","doi-asserted-by":"crossref","unstructured":"Imran Memon, Qasim Ali Arain, Muhammad Hammad Memon, Farman Ali Mangi, and Rizwan Akhtar. Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30(16), 2017.","DOI":"10.1002\/dac.3312"},{"key":"12_CR424","doi-asserted-by":"crossref","unstructured":"Seyyed Mohamamd Reza Moosavi and Abolghasem Sadeghi-Niaraki. A survey of smart electrical boards in ubiquitous sensor networks for geomatics applications. The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, 40(1):503, 2015.","DOI":"10.5194\/isprsarchives-XL-1-W5-503-2015"},{"key":"12_CR437","unstructured":"Irene C. L. Ng and Susan Y. L. Wakenshaw. The internet-of-things: Review and research directions. International Journal of Research in Marketing, 34(1):3\u201321, 2017."},{"issue":"1","key":"12_CR438","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s00779-009-0229-4","volume":"14","author":"David H Nguyen","year":"2010","unstructured":"David H. Nguyen and Gillian R. Hayes. Information privacy in institutional and end-user tracking and recording technologies. Personal and Ubiquitous Computing, 14(1):53\u201372, 2010.","journal-title":"Personal and Ubiquitous Computing"},{"key":"12_CR454","doi-asserted-by":"crossref","unstructured":"Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, and Urs Hengartner. Achieving efficient query privacy for location based services. In Mikhail J. Atallah and Nicholas J. Hopper, editors, Privacy Enhancing Technologies, pages 93\u2013110. Springer, 2010.","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"12_CR459","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"Achilleas Papageorgiou","year":"2018","unstructured":"Achilleas Papageorgiou, Michael Strigkos, Eugenia A. Politou, Efthimios Alepis, Agusti Solanas, and Constantinos Patsakis. Security and privacy analysis of mobile health applications: The alarming state of practice. IEEE Access, 6:9390\u20139403, 2018.","journal-title":"IEEE Access"},{"key":"12_CR460","doi-asserted-by":"crossref","unstructured":"Constantinos Patsakis, Panayiotis Kotzanikolaou, and M\u00e9lanie Bouroche. Private proximity testing on steroids: An ntru-based protocol. In Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21\u201322, 2015, Proceedings, pages 172\u2013184, 2015.","DOI":"10.1007\/978-3-319-24858-5_11"},{"key":"12_CR461","unstructured":"Pablo A. P\u00e9rez-Mart\u00ednez and Agusti Solanas. W3-privacy: the three dimensions of user privacy in lbs. In 12th ACM Intl. Symp. Mobile Ad Hoc Networking and Computing, 2011."},{"key":"12_CR462","doi-asserted-by":"crossref","unstructured":"Pablo A. P\u00e9rez-Mart\u00ednez, Agusti Solanas, and Antoni Mart\u00ednez-Ballest\u00e9. Location Privacy Through Users\u2019 Collaboration: A Distributed Pseudonymizer. In Proceedings of the 3rd International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), pages 338\u2013341, 2009.","DOI":"10.1109\/UBICOMM.2009.60"},{"key":"12_CR484","doi-asserted-by":"crossref","unstructured":"Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, and Wei Zhao. Protection of query privacy for continuous location based services. In INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10\u201315 April 2011, Shanghai, China, pages 1710\u20131718, 2011.","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"12_CR486","doi-asserted-by":"crossref","unstructured":"Eugenia Politou, Efthimios Alepis, and Constantinos Patsakis. Forgetting personal data and revoking consent under the gdpr: Challenges and proposed solutions. Journal of Cybersecurity, page tyy001, 2018.","DOI":"10.1093\/cybsec\/tyy001"},{"issue":"6","key":"12_CR506","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1109\/TIFS.2017.2656470","volume":"12","author":"John D Roth","year":"2017","unstructured":"John D. Roth, Murali Tummala, John C. McEachen, and James W. Scrofani. On location privacy in LTE networks. IEEE Trans. Information Forensics and Security, 12(6):1358\u20131368, 2017.","journal-title":"IEEE Trans. Information Forensics and Security"},{"issue":"1","key":"12_CR513","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MPRV.2015.5","volume":"14","author":"Florian Schaub","year":"2015","unstructured":"Florian Schaub, Bastian K\u00f6nings, and Michael Weber. Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1):34\u201343, 2015.","journal-title":"IEEE Pervasive Computing"},{"key":"12_CR518","unstructured":"Jaydip Sen. Ubiquitous computing: Potentials and challenges. arXiv preprint arXiv:1011.1960, 2010."},{"key":"12_CR533","unstructured":"Agusti Solanas and Josep Domingo-Ferrer. Location privacy in location-based services: Beyond ttp-based schemes. In In Proceedings of the 1st international workshop on privacy in location-based applications (PILBA), pages 12\u201323, 2008."},{"key":"12_CR534","unstructured":"Agusti Solanas and Antoni Mart\u00ednez-Ballest\u00e9. V-MDAV: a multivariate microaggregation with variable group size. In 17th COMPSTAT Symposium of the IASC, pages 917\u2013925, 2006."},{"issue":"8","key":"12_CR535","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2014.6871673","volume":"52","author":"Agusti Solanas","year":"2014","unstructured":"Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. P\u00e9rez-Mart\u00ednez, Roberto Di Pietro, Despina N. Perrea, and Antoni Mart\u00ednez-Ballest\u00e9. Smart health: A context-aware health paradigm within smart cities. IEEE Communications Magazine, 52(8):74\u201381, 2014.","journal-title":"IEEE Communications Magazine"},{"key":"12_CR536","unstructured":"Agusti Solanas, Jens H. Weber, Ayse Basar Bener, Frank van der Linden, and Rafael Capilla. Recent advances in healthcare software: Toward context-aware and smart solutions. IEEE Software, 34(6):36\u201340, 2017."},{"key":"12_CR547","unstructured":"The European Parliament and the Council of the European Union. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/ec (General Data Protection Regulation). Official Journal of the European Union, 119(1), 2016."},{"key":"12_CR562","doi-asserted-by":"crossref","unstructured":"Lachlan Urquhart, Neelima Sailaja, and Derek McAuley. Realising the right to data portability for the domestic internet of things. Personal and Ubiquitous Computing, pages 1\u201316, 2017.","DOI":"10.2139\/ssrn.2933448"},{"key":"12_CR571","doi-asserted-by":"crossref","unstructured":"Jinbao Wang, Zhipeng Cai, Yingshu Li, Donghua Yang, Ji Li, and Hong Gao. Protecting query privacy with differentially private k-anonymity in location-based services. Personal and Ubiquitous Computing, Mar 2018.","DOI":"10.1007\/s00779-018-1124-7"},{"key":"12_CR573","doi-asserted-by":"crossref","unstructured":"Shengling Wang, Qin Hu, Yunchuan Sun, and Jianhui Huang. Privacy preservation in location-based services. IEEE Communications Magazine, 56(3):134\u2013140, MARCH 2018.","DOI":"10.1109\/MCOM.2018.1700288"},{"issue":"3","key":"12_CR578","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/329124.329126","volume":"3","author":"Mark Weiser","year":"1999","unstructured":"Mark Weiser. The computer for the 21st century. Mobile Computing and Communications Review, 3(3):3\u201311, 1999.","journal-title":"Mobile Computing and Communications Review"},{"issue":"4","key":"12_CR589","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1721654.1721674","volume":"53","author":"Sergey Yekhanin","year":"2010","unstructured":"Sergey Yekhanin. Private Information Retrieval. Communications of the ACM, 53(4):68\u201373, 2010.","journal-title":"Communications of the ACM"},{"key":"12_CR599","doi-asserted-by":"crossref","unstructured":"Huang Zhangwei and Xin Mingjun. A distributed spatial cloaking protocol for location privacy. In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, volume 2, pages 468\u2013471, April 2010.","DOI":"10.1109\/NSWCTC.2010.243"}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T15:17:30Z","timestamp":1610637450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_12","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}