Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Free access

The loss of location privacy in the cellular age

Published: 01 August 2012 Publication History

Abstract

How to have the best of location-based services while avoiding the growing threat to personal privacy.

References

[1]
Agnew, J.A. Place and Politics: The Geographical Mediation of State and Society. Unwin Hyman, London, 1987.
[2]
Agre, P.E. Computation and Human Experience. Cambridge University Press, Cambridge, U.K., 1997.
[3]
Apple. Q&A on Location Data; http://www.apple.com/pr/library/2011/04/27Apple-Q-A-on-Location-Data.html
[4]
Bilton, N. 3G Apple iOS devices are storing users location data. The New York Times (Apr. 20, 2011).
[5]
Blumenthal, J., Reichenbach, F., and Timmermann, D. Position estimation in ad hoc wireless sensor networks with low complexity. In Proceedings of the Second Joint Workshop on Positioning, Navigation, and Communication and First Ultra-Wideband Expert Talk (Hannover, Germany, Mar. 2005), 41--49.
[6]
Clarke, R.A. Information technology and dataveillance. Commun. ACM 31, 5 (May 1988), 498--512.
[7]
Cresswell, T. Place: A Short Introduction. Wiley-Blackwell, Malden, MA, 2004.
[8]
Deleuze, G. Postscript on the societies of control. October 59 (Winter 1992), 3--7.
[9]
Djuknic, G.M., and Richton, R.E. Geolocation and assisted GPS. Computer 34 (Feb. 2001), 123--125.
[10]
Durrell, L. Balthazaar. Faber & Faber, London, 1960.
[11]
Evfimievski, A., Srikant, R., Agrawal, R., and Gehrke, J. Privacy-preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Edmonton, July 23--26). ACM Press, New York, 2002, 217--228.
[12]
Federal Communications Commission. Notice of Proposed Rulemaking Docket 94--102. Washington, D.C., 1994.
[13]
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., and Tan, K.-L. Private queries in location-based services: Anonymizers are not necessary. In Proceedings of the ACM SIGMOD International Conference on Management of Data (Vancouver, B.C., June 9--12). ACM Press, New York, 2008, 121--132.
[14]
Gruteser, M. and Grunwald, D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (San Francisco, May 5--8). ACM Press, New York, 2003, 31--42.
[15]
Hansell, S. AOL removes search data on vast group of Web users. The New York Times (Aug. 8, 2006).
[16]
Kaplan, E.D. Understanding GPS Principles and Applications. Artech House Publishers, Boston, 1996.
[17]
Khoshgozaran, A. and Shahabi, C. Blind evaluation of nearest-neighbor queries using space transformation to preserve location privacy. In Proceedings of the 10th International Symposium on Spatial and Temporal Databases (Boston, July 16--18). springer-Verlag, Berlin, 2007, 239--257.
[18]
Kifer, D. and Machanavajjhala, A. No free lunch in data privacy. In Proceedings of the SIGMOD 2011 International Conference on Management of Data (Athens, June 12--16). ACM Press, New York, 2011, 193--204.
[19]
Malpas, J. Place and Experience: A Philosophical Topography. Cambridge University Press, Cambridge, U.K., 2007.
[20]
Morrissey, S. iOS Forensic Analysis for iPhone, iPad, and iPod Touch. Apress, New York, 2010.
[21]
Narayanan, A. and Shmatikov, V. Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (Oakland, CA, May 18--21). IEEE Computer Society Press, Washington, D.C., 2008, 111--125.
[22]
Netflix Prize Rules; http://www.netflixprize.com//rules
[23]
Relph, E. Place and Placelessness. Routledge Kegan & Paul, London, 1976.
[24]
Shannon, C. Communication theory of secrecy systems. Bell System Technical Journal 28, 4 (Oct. 1949), 656--715.
[25]
Sweeney, L. k-anonymity: A model for protecting privacy. International Journal Uncertainty, Fuzziness and Knowledge-Based Systems 10, 5 (Oct. 2002), 557--570.
[26]
Tribble, G.B. Testimony of Dr. Guy "Bud" Tribble, Vice President for Software Technology, Apple Inc.; http://judiciary.senate.gov/pdf/11-5-10%20Tribble%20Testimony.pdf
[27]
Wicker, S.B. Cellular telephony and the question of privacy. Commun. ACM 54, 7 (July 2011), 88--98.
[28]
Williamson, J. Decoding Advertisements: Ideology and Meaning in Advertising. Marion Boyars Publishers Ltd., London, 1978.
[29]
Yoshida, J. Enhanced 911 service spurs integration of GPs into cell phones. EE Times (Aug. 16 1999); http://www.eetimes.com/electronics-news/4038635/Enhanced-911-service-spurs-integration-of-GPs-into-cell-phones
[30]
Zang, H. and Bolot, J. C. Anonymization of location data does not work: A large-scale measurement study. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking (Las Vegas, Sept. 19--23). ACM Press, New York, 2011, 145--156.

Cited By

View all
  • (2024)Exploring Cross-Site User Modeling without Cross-Site User Identity Linkage: A Case Study of Content Preference PredictionACM Transactions on Information Systems10.1145/369783243:1(1-28)Online publication date: 1-Oct-2024
  • (2024)Attacking and Defending Deep-Learning-Based Off-Device Wireless Positioning SystemsIEEE Transactions on Wireless Communications10.1109/TWC.2024.335528823:8_Part_1(8883-8895)Online publication date: 1-Aug-2024
  • (2023)Designing a 6G Testbed for Location: Use Cases, Challenges, Enablers and RequirementsIEEE Access10.1109/ACCESS.2023.324077511(10053-10091)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 55, Issue 8
August 2012
105 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2240236
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2012
Published in CACM Volume 55, Issue 8

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)626
  • Downloads (Last 6 weeks)50
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Cross-Site User Modeling without Cross-Site User Identity Linkage: A Case Study of Content Preference PredictionACM Transactions on Information Systems10.1145/369783243:1(1-28)Online publication date: 1-Oct-2024
  • (2024)Attacking and Defending Deep-Learning-Based Off-Device Wireless Positioning SystemsIEEE Transactions on Wireless Communications10.1109/TWC.2024.335528823:8_Part_1(8883-8895)Online publication date: 1-Aug-2024
  • (2023)Designing a 6G Testbed for Location: Use Cases, Challenges, Enablers and RequirementsIEEE Access10.1109/ACCESS.2023.324077511(10053-10091)Online publication date: 2023
  • (2022)Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)10.1109/MASS56207.2022.00067(426-434)Online publication date: Oct-2022
  • (2022)Experiments and Analyses of Anonymization Mechanisms for Trajectory Data PublishingJournal of Computer Science and Technology10.1007/s11390-022-2409-x37:5(1026-1048)Online publication date: 1-Oct-2022
  • (2022)Rehumanize geoprivacy: from disclosure control to human perceptionGeoJournal10.1007/s10708-022-10598-488:1(189-208)Online publication date: 16-Feb-2022
  • (2022)The representation of argumentation in scientific papersJournal of the Association for Information Science and Technology10.1002/asi.2459073:6(863-878)Online publication date: 26-Apr-2022
  • (2022)Understanding the effects of message cues on COVID‐19 information sharing on TwitterJournal of the Association for Information Science and Technology10.1002/asi.2458773:6(847-862)Online publication date: 26-Apr-2022
  • (2022)“Not all my friends are friends”Journal of the Association for Information Science and Technology10.1002/asi.2458073:6(797-810)Online publication date: 26-Apr-2022
  • (2021)Bilateral Privacy-Utility Tradeoff in Spectrum Sharing Systems: A Game-Theoretic ApproachIEEE Transactions on Wireless Communications10.1109/TWC.2021.306592720:8(5144-5158)Online publication date: Aug-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media