ABSTRACT
Despite the proliferation of location-based services on mobile platforms, privacy concerns still refrain many people from using them regularly. Moreover, current location sharing tools often present over-simplistic privacy settings by which users are forced to the binary alternative of sharing everything or nothing. The goal of this research is to build novel privacy-aware tools through which users can share their location more easily and in the way they consider more appropriate. Starting from the study of the sharing functionalities and how people use them, I aim at building a platform for efficiently sharing location, supported by a usable interface through which users can easily understand how sharing works and feel in control of their data. Furthermore, the security mechanisms employed are conceived such that privacy is considered as an integral part of the sharing mechanisms, in a privacy-by-design approach.
- S. Amin, S. Andrews, S. Apte, J. Arnold, J. Ban, M. Benko, R. Bayen, B. Chiou, C. Claudel, C. Claudel, et al. Mobile Century Using GPS Mobile Phones as Traffic Sensors: A Field Experiment.Google Scholar
- G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pages 29--44, 2005.Google Scholar
- A. R. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1):46--55, 2003. Google ScholarDigital Library
- A. R. Beresford and F. Stajano. Mix Zones: User Privacy in Location-aware Services. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pages 127--131, 2004. Google ScholarDigital Library
- M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. Advances in Cryptology - EUROCRYPT 1998, pages 127--144, 1998.Google ScholarCross Ref
- S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 81--90, USA, 2005. ACM. Google ScholarDigital Library
- C. Dong and N. Dulay. Longitude: a privacy-preserving location sharing protocol for mobile applications. Trust Management V, pages 133--148, 2011.Google ScholarCross Ref
- P. Dourish and K. Anderson. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction, 21(3):319--342, 2006. Google ScholarDigital Library
- M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of the Third international conference on Pervasive Computing, pages 152--170. Springer-Verlag, 2005. Google ScholarDigital Library
- N. Eagle, A. Pentland, and D. Lazer. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36):15274--15278, 2009.Google ScholarCross Ref
- B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy, 2004.Google Scholar
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys '03), pages 31--42, USA, 2003. ACM Press. Google ScholarDigital Library
- M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In In Proceedings of the Second International Conference on Security in Pervasive Computing, pages 179--192. Springer, 2005. Google ScholarDigital Library
- B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5:38--46, 2006. Google ScholarDigital Library
- J. H. Kang, W. Welbourne, B. Stewart, and G. Borriello. Extracting places from traces of locations. ACM SIGMOBILE Mobile Computing and Communications Review, 9:58--68, 2005. Google ScholarDigital Library
- J. Krumm. Inference attacks on location tracks. In Proceedings of the 5th international conference on Pervasive Computing, pages 127--143. Springer-Verlag, 2007. Google ScholarDigital Library
- J. Krumm. A survey of computational location privacy. Personal Ubiquitous Computing, 13:391--399, 2009. Google ScholarDigital Library
- M. Langheinrich. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of the 3rd international conference on Ubiquitous Computing, pages 273--291. Springer-Verlag, 2001. Google ScholarDigital Library
- S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The VLDB Journal - The International Journal on Very Large Data Bases, 20(4):541--566, 2011. Google ScholarDigital Library
- D. Patterson, L. Liao, D. Fox, and H. Kautz. Inferring high-level behavior from low-level sensors. In Proceedings of the 5th international conference on Ubiquitous computing, pages 73--89, 2003.Google ScholarCross Ref
- M. P. Scipioni and M. Langheinrich. I'm Here! Privacy Challenges in Mobile Location Sharing. Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), 2010. Co-located with Pervasive 2010.Google Scholar
- M. P. Scipioni and M. Langheinrich. Towards a new privacy-aware location sharing platform. Journal of Internet Services and Information Security, 1, 2011.Google Scholar
- M. P. Scipioni and M. Langheinrich. To Share or Not To Share? An Activity-centered Approach for Designing Usable Location Sharing Tools. Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM), 2012. Co-located with Soups 2012.Google Scholar
- E. Toch, J. Cranshaw, P. Drielsma, J. Tsai, P. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 129--138. ACM, 2010. Google ScholarDigital Library
- J. Tsai, P. Kelley, L. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. In Research Conference on Communication, Information and Internet Policy, 2009.Google Scholar
- Y. Zheng, Y. Chen, Q. Li, X. Xie, and W. Ma. Understanding transportation modes based on GPS data for Web applications. ACM Transactions on the Web (TWEB), 4(1):1--36, 2010. Google ScholarDigital Library
Index Terms
- A privacy-by-design approach to location sharing
Recommendations
Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs
COMPSAC '13: Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications ConferenceSharing location in SNSs has witnessed rapid development in recent years. Privacy is undoubtedly a barrier to the adoption of such location sharing services. In this paper, we investigate what factors affect users' privacy concerns and how privacy ...
Anonymization models for directional location based service environments
Location based services (LBS) aim to deliver information based on a mobile user's location. However, knowledge of the location can be used by an adversary to physically locate the person, leading to the risk of physical harm, as well as possible leakage ...
Location sharing privacy preference: analysis and personalized recommendation
IUI '14: Proceedings of the 19th international conference on Intelligent User InterfacesLocation-based systems are becoming more popular with the explosive growth in popularity of smart phones. However, the user adoption of these systems is hindered by growing user concerns about privacy. To design better location-based systems that ...
Comments