Open AccessJournal Article
Towards Achieving Personalized Privacy for Location-Based Services
Nayot Poolsappasit,Indrakshi Ray +1 more
Reads0
Chats0
TLDR
The architecture of a system that allows one to specify and enforce location privacy and that can be easily integrated with existing systems providing LBSs is discussed and the feasibility of the approach is demonstrated.Abstract:Â
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBSs). Although LBSs provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Consequently, location data of individuals used by such services must be adequately protected. Such services will require new models for expressing privacy preferences for location data and mechanisms for enforcing them. We identify the factors on which location privacy depends and propose models for expressing privacy that can be used by LBSs. We discuss the architecture of a system that allows one to specify and enforce location privacy and that can be easily integrated with existing systems providing LBSs. We demonstrate the feasibility of our approach by developing a prototype.read more
Citations
More filters
Proceedings Article
Cybercasing the joint: on the privacy implications of geo-tagging
Gerald Friedland,Robin Sommer +1 more
TL;DR: It is argued that the security and privacy community needs to shape the further development of geo-location technology for better protecting users from the consequences of using geo-tagged information to mount real-world attacks.
Journal Article
The PROBE Framework for the Personalized Cloaking of Private Locations
TL;DR: A novel privacy model and an architectural framework for the personalized cloaking of semantic locations that satisfies the privacy constraints specified by the user in the privacy profile (obfuscated location) is presented.
Journal ArticleDOI
Privacy preservation in the dissemination of location data
TL;DR: The aim of the paper is to provide a brief survey of the attack scenarios, the privacy guaranties and the data transformations employed to protect user privacy in real time and to provide an overview of the cases that are covered by existing research.
Proceedings ArticleDOI
Protecting location privacy against spatial inferences: the PROBE approach
TL;DR: This paper presents a novel approach that obfuscates the user location by taking into account the geographical context and user's privacy preferences and proposes a strategy for generating obfuscated spaces and an efficient algorithm which implements such a strategy.
Journal ArticleDOI
Normality Mining: Privacy Implications of Behavioral Profiles Drawn From GPS Enabled Mobile Phones
TL;DR: This paper reports in detail on a short case study tracking four people persistently for six weeks using mobile handsets, the GPS locations of these people have been mined to reveal places of interest and to create simple profiles.
References
More filters
Proceedings ArticleDOI
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Proceedings ArticleDOI
The new Casper: query processing for location services without compromising privacy
TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Proceedings ArticleDOI
Unpacking "privacy" for a networked world
Leysia Palen,Paul Dourish +1 more
TL;DR: A model of privacy as a dynamic, dialectic process is outlined, and three tensions that govern interpersonal privacy management in everyday life are discussed, and these are used to explore select technology case studies drawn from the research literature.
Proceedings ArticleDOI
Private queries in location based services: anonymizers are not necessary
TL;DR: This work proposes a novel framework to support private location-dependent queries, based on the theoretical work on Private Information Retrieval (PIR), which achieves stronger privacy for snapshots of user locations and is the first to provide provable privacy guarantees against correlation attacks.
Proceedings ArticleDOI
Location Privacy in Mobile Systems: A Personalized Anonymization Model
Bugra Gedik,Ling Liu +1 more
TL;DR: A suite of scalable and yet efficient spatio-temporal cloaking algorithms, called CliqueCloak algorithms, are developed to provide high quality personalized location k-anonymity, aiming at avoiding or reducing known location privacy threats before forwarding requests to LBS provider(s).
Related Papers (5)
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Marco Gruteser,Dirk Grunwald +1 more
Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges
Priti Jagwani,Saroj Kaushik +1 more