ABSTRACT
The ubiquity of positioning devices poses a natural security challenge: users want to take advantage of location-related services as well as social sharing of their position but at the same time have security concerns about how much information should be shared about their exact position. This paper discusses different location-privacy problems, their formalization and the novel notion of indistinguishability regions that allows one to proof that a given obfuscation function provides a good trade-off between location sharing and privacy.
- C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Trans. Dependable Secur. Comput., 8: 13--27, January 2011. Google ScholarDigital Library
- R. Barnes, M. Thomson, J. Winterbottom, and H. Tschofenig. Location Configuration Extensions for Policy Management. http://www.ietf.org/id/draft-ietf-geopriv-policy-uri-01.txt, June 2011.Google Scholar
- A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 02(1): 46--55, 2003. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 371--380, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pages 31--42, New York, NY, USA, 2003. ACM. Google ScholarDigital Library
- R. Kim. Location-based services worth $10B by 2016. http://gigaom.com/2011/06/09/location-based-services-worth-10b-by-2016/, June 2011.Google Scholar
- J. Krumm. Inference Attacks on Location Tracks. In Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, pages 127--143, Berlin, Heidelberg, 2007. Springer-Verlag. Google ScholarDigital Library
- P. Samarati and L. Sweeney. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P), Oakland, CA, May 1998.Google Scholar
- H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, J. Polk, and J. Rosenberg. Common Policy: A Document Format for Expressing Privacy Preferences. http://tools.ietf.org/html/rfc4745, Feb 2007.Google Scholar
- Senator Edwards, J. Location Privacy Protection Act of 2001. http://www.techlawjournal.com/cong107/privacy/location/s1164is.asp, July 2001.Google Scholar
- J.-H. Song, V. W. Wong, and V. C. Leung. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks. Mob. Netw. Appl., 15: 160--171, February 2010. Google ScholarDigital Library
- M. Thomson. Obscuring Location. http://tools.ietf.org/html/draft-thomson-geopriv-location-obscuring-03, June 2011.Google Scholar
- C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-Related Privacy in Geo-Social Networks. IEEE Internet Computing, 15: 20--27, 2011. Google ScholarDigital Library
- A. F. Westin. Privacy and Freedom. New York Atheneum, 1 edition, 1967.Google Scholar
Index Terms
- Indistinguishable regions in geographic privacy
Recommendations
H-LPS: a hybrid approach for user's location privacy in location-based services
Applications providing location-based services (LBS) have gained much attention and importance with the notion of the internet of things (IoT). Users are utilising LBS by providing their location information to third-party service providers. However, ...
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Location Privacy Protection for Smartphone Users
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityAs smartphones are increasingly used to run apps that provide users with location-based services, the users' location privacy has become a major concern. Existing solutions to this concern are deficient in terms of practicality, efficiency, and ...
Comments