ABSTRACT
Location cloaking methods enable the protection of private location data. Different temporal and spatial approaches to cloak a specific user location (e.g., k-anonymity) have been suggested. Besides the research focusing on functionality, little work has been done on how cloaking methods should be presented to the user. In practice common location referencing services force the user to either accept or deny exact positioning. Therefore, users are not enabled to regulate private location information on a granular level. To improve the usage of location cloaking methods and foster location privacy protection, we conducted a user study (N = 24) comparing different visualized cloaking methods. The results of our lab study revealed a preference for visualizations using already known and well understood real world entities. Thus, the usage of simple and real world concepts can contribute to the application of cloaking methods and subsequently to location privacy protection.
- Andersen, M.S., Kjargaard, M.B., Grønbæk, K. 2013. The SITA principle for location privacy---Conceptual model and architecture. In Privacy and Security in Mobile Systems (PRISMS), IEEE, 1--8.Google Scholar
- Barkhuus, L. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In SIGCHI Conference on Human Factors in Computing Systems, ACM, 367--376. Google ScholarDigital Library
- Beresford, A., Stajano, F. 2003. Location Privacy in Pervasive Computing. IEEE Pervasive Computing. Google ScholarDigital Library
- Bernheim Brush, A.J., Krumm, J., Scott, J. 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. Conf. on Ubiquitous computing, ACM. Google ScholarDigital Library
- Chow, C., Mokbel, M.F. 2009. Privacy in Location-based Services: A System Architecture Perspective. Sigspatial Special, 1(2), 23--27. Google ScholarDigital Library
- Damiani, M.L., Bertino, E., Silvestri, C. 2010. The Probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2), 123--148. Google ScholarDigital Library
- Duckham, M., Kulik, L. 2006. Location Privacy and Location-Aware Computing. In J. Drummond, Dynamic & Mobile GIS: Investigating Change in Space and Time, 3, Boca Raton, FL.: CRC Press.Google Scholar
- Gruteser, M., Grunwald, D. 2003. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Conference on Mobile systems, applications and services. ACM, 31--42. Google ScholarDigital Library
- Henne, B., Kater, C., Smith, M., Brenner, M. 2013. Selective cloaking: Need-to-know for location-based apps. In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on Privacy, Security and Trust, IEEE, 19--26.Google ScholarCross Ref
- Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press. Google ScholarDigital Library
- Preibusch, S. 2013. Guide to measuring privacy concern: Review of survey and observational instruments. In International Journal of Human-Computer Studies, 71(12), 1133--1143. Google ScholarDigital Library
- Sheehan, K.B. 2002 Towards a Typology of Internet user and Online Privacy Concerns. The Information Society, 18 (1), 21--32.Google ScholarCross Ref
- Smith, H.J., Milberg, S.J., Burke, S.J. Information privacy: Measuring individuals concerns about organizational practices. MIS quarterly, 20(2). Google ScholarDigital Library
- Tang, K.P. 2010. Sometimes Less is More: Multi-Perspective Exploration of Disclosure Abstractions in Location-Aware Social Mobile Applications. Doctoral Thesis, HCII, Carnegie Mellon University. Google ScholarDigital Library
- Tang, K.P., Hong, J.I., Siewiorek, D.P. 2011. Understanding how visual representations of location feeds affect end-user privacy concerns. In Conference on Ubiquitous computing, ACM. Google ScholarDigital Library
- Wilson, S., Cranshaw, J., Sadeh, N., Acquisti, A., Cranor, L.F., Springfield, J., Jeong, S.Y., Balasubramanian, A. 2013. Privacy manipulation and acclimation in a location sharing application. In ACM international joint conference on Pervasive and ubiquitous computing, 549--558. Google ScholarDigital Library
- Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M. 2012. Measuring mobile users' concerns for information privacy. In Joey, F.G. (Ed.), International conference on information systems.Google Scholar
- Xue, M., Kalnis, P., Pung, H. 2009. Location Diversity: Enhanced Privacy Protection in Location Based Services. In 4th International Symposium on Location and Context Awareness. Google ScholarDigital Library
- Yiu, M.L., Jensen, C.S., Huang, X., Lu, H. 2008. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: International Conference on Data Engineering. IEEE, 366--375. Google ScholarDigital Library
Index Terms
Which cloak dresses you best?: comparing location cloaking methods for mobile users
Recommendations
Unraveling an old cloak: k-anonymity for location privacy
WPES '10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic societyThere is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential ...
Geo-indistinguishability: differential privacy for location-based systems
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityThe growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious privacy concerns. In this paper we introduce geoind, a ...
ESOT: a new privacy model for preserving location privacy in Internet of Things
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which ...
Comments