skip to main content
10.1145/2370216.2370314acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

A privacy-by-design approach to location sharing

Published:05 September 2012Publication History

ABSTRACT

Despite the proliferation of location-based services on mobile platforms, privacy concerns still refrain many people from using them regularly. Moreover, current location sharing tools often present over-simplistic privacy settings by which users are forced to the binary alternative of sharing everything or nothing. The goal of this research is to build novel privacy-aware tools through which users can share their location more easily and in the way they consider more appropriate. Starting from the study of the sharing functionalities and how people use them, I aim at building a platform for efficiently sharing location, supported by a usable interface through which users can easily understand how sharing works and feel in control of their data. Furthermore, the security mechanisms employed are conceived such that privacy is considered as an integral part of the sharing mechanisms, in a privacy-by-design approach.

References

  1. S. Amin, S. Andrews, S. Apte, J. Arnold, J. Ban, M. Benko, R. Bayen, B. Chiou, C. Claudel, C. Claudel, et al. Mobile Century Using GPS Mobile Phones as Traffic Sensors: A Field Experiment.Google ScholarGoogle Scholar
  2. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pages 29--44, 2005.Google ScholarGoogle Scholar
  3. A. R. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1):46--55, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. R. Beresford and F. Stajano. Mix Zones: User Privacy in Location-aware Services. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pages 127--131, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. Advances in Cryptology - EUROCRYPT 1998, pages 127--144, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 81--90, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dong and N. Dulay. Longitude: a privacy-preserving location sharing protocol for mobile applications. Trust Management V, pages 133--148, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Dourish and K. Anderson. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction, 21(3):319--342, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of the Third international conference on Pervasive Computing, pages 152--170. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Eagle, A. Pentland, and D. Lazer. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36):15274--15278, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  11. B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy, 2004.Google ScholarGoogle Scholar
  12. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys '03), pages 31--42, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In In Proceedings of the Second International Conference on Security in Pervasive Computing, pages 179--192. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5:38--46, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. H. Kang, W. Welbourne, B. Stewart, and G. Borriello. Extracting places from traces of locations. ACM SIGMOBILE Mobile Computing and Communications Review, 9:58--68, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Krumm. Inference attacks on location tracks. In Proceedings of the 5th international conference on Pervasive Computing, pages 127--143. Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Krumm. A survey of computational location privacy. Personal Ubiquitous Computing, 13:391--399, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Langheinrich. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of the 3rd international conference on Ubiquitous Computing, pages 273--291. Springer-Verlag, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The VLDB Journal - The International Journal on Very Large Data Bases, 20(4):541--566, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Patterson, L. Liao, D. Fox, and H. Kautz. Inferring high-level behavior from low-level sensors. In Proceedings of the 5th international conference on Ubiquitous computing, pages 73--89, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. P. Scipioni and M. Langheinrich. I'm Here! Privacy Challenges in Mobile Location Sharing. Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), 2010. Co-located with Pervasive 2010.Google ScholarGoogle Scholar
  22. M. P. Scipioni and M. Langheinrich. Towards a new privacy-aware location sharing platform. Journal of Internet Services and Information Security, 1, 2011.Google ScholarGoogle Scholar
  23. M. P. Scipioni and M. Langheinrich. To Share or Not To Share? An Activity-centered Approach for Designing Usable Location Sharing Tools. Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM), 2012. Co-located with Soups 2012.Google ScholarGoogle Scholar
  24. E. Toch, J. Cranshaw, P. Drielsma, J. Tsai, P. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 129--138. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Tsai, P. Kelley, L. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. In Research Conference on Communication, Information and Internet Policy, 2009.Google ScholarGoogle Scholar
  26. Y. Zheng, Y. Chen, Q. Li, X. Xie, and W. Ma. Understanding transportation modes based on GPS data for Web applications. ACM Transactions on the Web (TWEB), 4(1):1--36, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A privacy-by-design approach to location sharing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UbiComp '12: Proceedings of the 2012 ACM Conference on Ubiquitous Computing
        September 2012
        1268 pages
        ISBN:9781450312240
        DOI:10.1145/2370216

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 September 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        UbiComp '12 Paper Acceptance Rate58of301submissions,19%Overall Acceptance Rate764of2,912submissions,26%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader