Activities and work packages
PRIAM is organized into three strongly tight work packages:
WP1: Privacy from the legal and social perspective
The first objective of WP1 is to investigate whether the current legal European framework with respect to privacy is suitable for the ambient intelligence world and, if not, to study the kind of adaptations or complementary provisions that would be appropriate.
In most European legislations, the citizen has the right to:
One of the outputs of WP1 will be a contribution to this study with proposals concerning the most appropriate types of regulation for privacy in ambient systems. The regulation might be administrative, deontological (legal ethics) based on the moral obligations of the actors in the system, or contractual for each of the ambient services.
WP2: Definition of privacy policies for the ambient intelligence world
Several frameworks have been proposed for the definition of privacy policies, especially for websites: P3P and E-P3P, for example, make it possible to express privacy statements using XML with a specific vocabulary. While inspiration can be taken from these approaches, they suffer several shortcomings (lack of preciseness or expressiveness, lack of formal definition, ambiguity, etc.) and were not designed for the exchanges of data on resource constrained devices.
WP3: Implementation of privacy policies on the ambient intelligence architecture
The goal of WP3 is to reflect on the feasibility of implementing privacy control policies and mechanisms in ambient environments, and in particular, on the techniques that need to be implemented in the software environments on ambient computing devices.
Several challenges are posed in terms of implementation. These can roughly be classified into two categories that will be addressed by PRIAM: operating system and cryptography issues.
As far as operating systems are concerned, the first concern is memory limitation. This obviously requires that audit logs record as little information as possible. This is particularly hard since the number of other devices with which a device can communicate is extremely large, so a log of interaction could become large also. On the other hand, audit logs need to contain enough information to be able to analyze for detection of violations to the privacy policies in place.
Another challenge relates to the fact that most devices will not be under the control of trustworthy authorities so physical tampering is possible. The device and its operating system must provide measures to protect the integrity and confidentiality of the audit log and of the privacy control policies. The integrity of the audit log is especially important to make it usable in court.
The lack of resources available on the ambient intelligence devices also introduces new challenges in terms of cryptography. In a context where devices are limited and geographically located, in a large-scale environment, a trade-off has to be found between efficiency and risk. A risk analysis model has to be defined considering adversaries with much more resources. New security challenges as well as open problems in cryptographic systems appear in this context.