skip to main content
10.1145/3098279.3122138acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
extended-abstract

Which cloak dresses you best?: comparing location cloaking methods for mobile users

Published:04 September 2017Publication History

ABSTRACT

Location cloaking methods enable the protection of private location data. Different temporal and spatial approaches to cloak a specific user location (e.g., k-anonymity) have been suggested. Besides the research focusing on functionality, little work has been done on how cloaking methods should be presented to the user. In practice common location referencing services force the user to either accept or deny exact positioning. Therefore, users are not enabled to regulate private location information on a granular level. To improve the usage of location cloaking methods and foster location privacy protection, we conducted a user study (N = 24) comparing different visualized cloaking methods. The results of our lab study revealed a preference for visualizations using already known and well understood real world entities. Thus, the usage of simple and real world concepts can contribute to the application of cloaking methods and subsequently to location privacy protection.

References

  1. Andersen, M.S., Kjargaard, M.B., Grønbæk, K. 2013. The SITA principle for location privacy---Conceptual model and architecture. In Privacy and Security in Mobile Systems (PRISMS), IEEE, 1--8.Google ScholarGoogle Scholar
  2. Barkhuus, L. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In SIGCHI Conference on Human Factors in Computing Systems, ACM, 367--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Beresford, A., Stajano, F. 2003. Location Privacy in Pervasive Computing. IEEE Pervasive Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bernheim Brush, A.J., Krumm, J., Scott, J. 2010. Exploring end user preferences for location obfuscation, location-based services, and the value of location. Conf. on Ubiquitous computing, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chow, C., Mokbel, M.F. 2009. Privacy in Location-based Services: A System Architecture Perspective. Sigspatial Special, 1(2), 23--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Damiani, M.L., Bertino, E., Silvestri, C. 2010. The Probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2), 123--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Duckham, M., Kulik, L. 2006. Location Privacy and Location-Aware Computing. In J. Drummond, Dynamic & Mobile GIS: Investigating Change in Space and Time, 3, Boca Raton, FL.: CRC Press.Google ScholarGoogle Scholar
  8. Gruteser, M., Grunwald, D. 2003. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Conference on Mobile systems, applications and services. ACM, 31--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Henne, B., Kater, C., Smith, M., Brenner, M. 2013. Selective cloaking: Need-to-know for location-based apps. In Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on Privacy, Security and Trust, IEEE, 19--26.Google ScholarGoogle ScholarCross RefCross Ref
  10. Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Preibusch, S. 2013. Guide to measuring privacy concern: Review of survey and observational instruments. In International Journal of Human-Computer Studies, 71(12), 1133--1143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sheehan, K.B. 2002 Towards a Typology of Internet user and Online Privacy Concerns. The Information Society, 18 (1), 21--32.Google ScholarGoogle ScholarCross RefCross Ref
  13. Smith, H.J., Milberg, S.J., Burke, S.J. Information privacy: Measuring individuals concerns about organizational practices. MIS quarterly, 20(2). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tang, K.P. 2010. Sometimes Less is More: Multi-Perspective Exploration of Disclosure Abstractions in Location-Aware Social Mobile Applications. Doctoral Thesis, HCII, Carnegie Mellon University. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Tang, K.P., Hong, J.I., Siewiorek, D.P. 2011. Understanding how visual representations of location feeds affect end-user privacy concerns. In Conference on Ubiquitous computing, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wilson, S., Cranshaw, J., Sadeh, N., Acquisti, A., Cranor, L.F., Springfield, J., Jeong, S.Y., Balasubramanian, A. 2013. Privacy manipulation and acclimation in a location sharing application. In ACM international joint conference on Pervasive and ubiquitous computing, 549--558. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M. 2012. Measuring mobile users' concerns for information privacy. In Joey, F.G. (Ed.), International conference on information systems.Google ScholarGoogle Scholar
  18. Xue, M., Kalnis, P., Pung, H. 2009. Location Diversity: Enhanced Privacy Protection in Location Based Services. In 4th International Symposium on Location and Context Awareness. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Yiu, M.L., Jensen, C.S., Huang, X., Lu, H. 2008. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: International Conference on Data Engineering. IEEE, 366--375. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Which cloak dresses you best?: comparing location cloaking methods for mobile users

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobileHCI '17: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services
        September 2017
        874 pages
        ISBN:9781450350754
        DOI:10.1145/3098279

        Copyright © 2017 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 September 2017

        Check for updates

        Qualifiers

        • extended-abstract

        Acceptance Rates

        MobileHCI '17 Paper Acceptance Rate45of224submissions,20%Overall Acceptance Rate179of811submissions,22%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader