Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1503402.1503412acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Towards a scalable model for location privacy

Published: 04 November 2008 Publication History

Abstract

With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. Specifically, location data of individuals that are used by such services must be protected from security and privacy breaches. Such services will require new models for expressing privacy preferences for location data and mechanisms for enforcing them. We identify the factors on which location privacy depends and propose a scalable model for expressing privacy that can be used for LBS and other applications where the privacy of location information must be protected.

References

[1]
C. Y. Chow, M. F. Mokbel, and X. Liu. A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Service. Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pages 171--178, 2006.
[2]
S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 81--90, New York, NY, USA, April 2005. ACM Press.
[3]
J. Cuellar, J. Morris, and D. Mulligan. RFC 4079: Geopriv requirements. Internet Engineering Task Force (IETF) Internet Draft. http://www.ietf.org/ids.by.wg/geopriv.html, 2003.
[4]
B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of the 25th International Conference on Distributed Computing Systems, pages 620--629, 2005.
[5]
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pages 31--42, 2003.
[6]
H. Kido, Y. Yanagisawa, and T. Satoh. An Anonymous Communication Technique using Dummies for Location-based Services. Proceedings of IEEE International Conference on Pervasive Services, pages 88--97, 2005.
[7]
M. F. Mokbel, C. Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. Proceedings of the 32nd International Conference on Very Large Data Bases, pages 763--774, September 2006.
[8]
L. Palen and P. Dourish. Unpacking" privacy" for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136, New York, NY, USA, 2003. ACM Press.
[9]
I. Smith, S. Consolvo, J. Hightower, J. Hughes, G. Iachello, A. LaMarca, J. Scott, T. Sohn, and G. Abowd. Social Disclosure of Place: From Location Technology to Communication Practice. Proceedings of the 3rd International Pervasive Computing Conference, pages 134--151, 2005.
[10]
E. Snekkenes. Concepts for personal location privacy policies. In Proceedings of the 3rd ACM conference on Electronic Commerce, pages 48--57, New York, NY, USA, 2001. ACM Press.

Cited By

View all
  • (2017)A result evaluation on anonymiser and active object based TTP location privacy framework2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC)10.1109/ICOMICON.2017.8279149(1-6)Online publication date: Aug-2017
  • (2017)Analysis of 2T 1D memory cell with various active capacitors2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC)10.1109/ICOMICON.2017.8279129(1-6)Online publication date: Aug-2017
  • (2015)In-Network Trajectory Privacy PreservationACM Computing Surveys10.1145/281818348:2(1-29)Online publication date: 12-Oct-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPRINGL '08: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
November 2008
94 pages
ISBN:9781605583242
DOI:10.1145/1503402
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. location privacy
  3. privacy

Qualifiers

  • Research-article

Funding Sources

Conference

SPRINGL 08
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A result evaluation on anonymiser and active object based TTP location privacy framework2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC)10.1109/ICOMICON.2017.8279149(1-6)Online publication date: Aug-2017
  • (2017)Analysis of 2T 1D memory cell with various active capacitors2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC)10.1109/ICOMICON.2017.8279129(1-6)Online publication date: Aug-2017
  • (2015)In-Network Trajectory Privacy PreservationACM Computing Surveys10.1145/281818348:2(1-29)Online publication date: 12-Oct-2015
  • (2013)Preprocess before You BuildProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.85(564-569)Online publication date: 8-Sep-2013
  • (2010)2PASSIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2010.2621:10(1458-1472)Online publication date: 1-Oct-2010
  • (2009)Towards Achieving Personalized Privacy for Location-Based ServicesTransactions on Data Privacy10.5555/1556406.15564112:1(77-99)Online publication date: 1-Apr-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media