Privacy Control Requirements for Context-Aware Mobile Services

Author(s):  
Amr Ali Eldin ◽  
Zoran Stojanovic

With the rapid developments of mobile telecommunications technology over the last two decades, a new computing paradigm known as ‘anywhere and anytime’ or ‘ubiquitous’ computing has evolved. Consequently, attention has been given not only to extending current Web services and mobile service models and architectures, but increasingly also to make these services context-aware. Privacy represents one of the hot topics that has questioned the success of these services. In this chapter, we discuss the different requirements of privacy control in context-aware services architectures. Further, we present the different functionalities needed to facilitate this control. The main objective of this control is to help end users make consent decisions regarding their private information collection under conditions of uncertainty. The proposed functionalities have been prototyped and integrated in a UMTS location-based mobile services test bed platform on a university campus. Users have experienced the services in real time. A survey of users’ responses on the privacy functionality has been carried out and analyzed as well. Users’ collected response on the privacy functionality was positive in most cases. Additionally, results obtained reflected the feasibility and usability of this approach.

Author(s):  
Amr Ali Eldin ◽  
Zoran Stojanovic

With the rapid developments of mobile telecommunications technology over the last two decades, a new computing paradigm known as ‘anywhere and anytime’ or ‘ubiquitous’ computing has evolved. Consequently, attention has been given not only to extending current Web services and mobile service models and architectures, but increasingly also to make these services context-aware. Privacy represents one of the hot topics that has questioned the success of these services. In this chapter, we discuss the different requirements of privacy control in context-aware services architectures. Further, we present the different functionalities needed to facilitate this control. The main objective of this control is to help end users make consent decisions regarding their private information collection under conditions of uncertainty. The proposed functionalities have been prototyped and integrated in a UMTS locationbased mobile services testbed platform on a university campus. Users have experienced the services in real time. A survey of users’ responses on the privacy functionality has been carried out and analyzed as well. Users’ collected response on the privacy functionality was positive in most cases. Additionally, results obtained reflected the feasibility and usability of this approach.


Author(s):  
Alexandra Chapko ◽  
Andreas Emrich ◽  
Stephan Flake ◽  
Frank Golatowski ◽  
Marc Gräßle ◽  
...  

This article presents a framework which enables end users to create small, sharply focused mobile services directly on a mobile device. By this, end users are no longer only consumers of mobile services; they also become producers and providers of mobile services. The domain of mobile health and fitness applications has been chosen to demonstrate the feasibility of the approach. The article presents the underlying platform for easy creation of mobile services and describes the implementation of a Web-based editor for easy mobile service creation as well as our solution to access device capabilities out of Web applications.


2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Shun Li ◽  
Junhao Wen ◽  
Xibin Wang

With the great development of mobile services, the Quality of Services (QoS) becomes an essential factor to meet end users’ personalized requirement on the nonfunctional performance of mobile services. However, most of the QoS values in real cases are unattainable because a service user would only invoke some specific mobile services. Therefore, how to predict the missing QoS values and recommend high-quality services to end users becomes a significant challenge in mobile service recommendation research. Previous QoS prediction researches demonstrate that the nonfunctional performance of mobile services is closely related to users’ location information. However, most location-aware QoS prediction methods ignore the premise that the obtainable QoS values observed by different users in same location region would probably be untrustworthy, which will lead to inaccurate and unreliable prediction results. To make credible location-aware QoS prediction, we propose a hybrid matrix factorization method integrated location and reputation information (LRMF) to predict the unattainable QoS values. Our approach firstly cluster users into different locational region based on their geographical distribution, and then we compute users’ reputation to identify untrustworthy users in every locational region. Finally, the unknown QoS values can be predicted by integrating locational cluster information and users’ reputation into a hybrid matrix factorization model. Comprehensive experiments are conducted on a public QoS dataset which contains sufficient real-world service invocation records. The evaluation results indicate that our LRMF method can effectively reduce the impact of unreliable users on QoS prediction and make credible mobile service recommendation.


Author(s):  
Heinz-Josef Eikerling ◽  
Pietro Mazzoleni

The authors present a holistic approach for the efficient design, implementation, and validation of context-aware mobile services. The according concepts have been developed within the PLASTIC project which devises a methodology based on model-to-model transformations to be applied at different stages of the service lifecycle. Starting from a conceptual model, these models reflect characteristic properties of the mobile service under development such as context information. For the implementation of the service, a middleware suite then is used which comprises a set of constituents which significantly simplify and shorten the mobile services development cycle. The authors focus on demonstrating the concepts in terms of mobile business-to-business field services as opposed to business-to-consumer services. Here through the methodology and tools the dynamicity can be significantly enhanced. By using the contained adaptation mechanism, service specifications (static by nature) can be qualified to deal with additional information (e.g., context) needed for achieving a better quality of service and usability.


Author(s):  
Heinz-Josef Eikerling ◽  
Pietro Mazzoleni

The authors present a holistic approach for the efficient design, implementation, and validation of context-aware mobile services. The according concepts have been developed within the PLASTIC project which devises a methodology based on model-to-model transformations to be applied at different stages of the service lifecycle. Starting from a conceptual model, these models reflect characteristic properties of the mobile service under development such as context information. For the implementation of the service, a middleware suite then is used which comprises a set of constituents which significantly simplify and shorten the mobile services development cycle. The authors focus on demonstrating the concepts in terms of mobile business-to-business field services as opposed to business-to-consumer services. Here through the methodology and tools the dynamicity can be significantly enhanced. By using the contained adaptation mechanism, service specifications (static by nature) can be qualified to deal with additional information (e.g., context) needed for achieving a better quality of service and usability.


Author(s):  
Alexandra Chapko ◽  
Andreas Emrich ◽  
Stephan Flake ◽  
Frank Golatowski ◽  
Marc Gräßle ◽  
...  

This article presents a framework which enables end users to create small, sharply focused mobile services directly on a mobile device. By this, end users are no longer only consumers of mobile services; they also become producers and providers of mobile services. The domain of mobile health and fitness applications has been chosen to demonstrate the feasibility of the approach. The article presents the underlying platform for easy creation of mobile services and describes the implementation of a Web-based editor for easy mobile service creation as well as our solution to access device capabilities out of Web applications.


2014 ◽  
Vol 10 (2) ◽  
pp. 197-215 ◽  
Author(s):  
Shangguang Wang ◽  
Zibin Zheng ◽  
Zhengping Wu ◽  
Qibo Sun ◽  
Hua Zou ◽  
...  

With the popularity of mobile services, an effective context-aware mobile service adaptation is becoming more and more important for operators. In this paper, we propose a Co-evolution eXtended Classifier System (CXCS) to perform context-aware mobile service adaptation. Our key idea is to learn user context, match adaptation rule, and provide the best suitable mobile services for users. Different from previous adaptation schemes, our proposed CXCS can produce a new user's initial classifier population to quicken its converging speed. Moreover, it can make the current user to predict which service should be selected, corresponding to an uncovered context. We compare CXCS based on a common mobile service adaptation scenario with other five adaptation schemes. The results show the adaptation accuracy of CXCS is higher than 70% on average, and outperforms other schemes.


2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Lukasz Grzybowski ◽  
Julienne Liang ◽  
Christine Zulehner

Abstract In this paper, we analyze how fixed-mobile (quadruple-play) bundling impacts the decision of consumers to churn telecommunications services. We use a database from an European operator of fixed and mobile telecommunications services which includes information about 9.6 million fixed broadband subscribers and 14.2 million mobile subscribers between March 2014 and February 2015. These data is combined with socio-demographic characteristics from each municipality in this country. We find that consumers who bundle fixed and mobile services from the same provider are less likely to churn. Without fixed-mobile bundling the annual churn of fixed broadband consumers would increase from 8.4 to 9.2%. Furthermore, the consumer churn in the mobile market would increase from 11.5 to 13.1%. We conclude that in the current competitive environment in the country considered, bundling has a moderate impact on consumer retention on both fixed and mobile networks.


Sign in / Sign up

Export Citation Format

Share Document