Abstract
Over the last decade many methods for location privacy have been proposed, but the mapping between classes of location based services and location privacy methods is not obvious. This entails confusion for developers, lack of usage of privacy methods, and an unclear road-map ahead for research within location privacy. This paper presents a two-dimensional classification of existing methods for location privacy grouping them by the type of location based service to which they apply and location privacy method category. The types of location based services identified are Point-of-Interest, Social Networking, Collaborative Sensing, and Route Tracing, and the high level location privacy method categories are Anonymization, Classical Security, Spatial Obfuscation, Temporal Obfuscation, and Protocol. It is found that little work exists on location privacy in the areas of Social Networking and Collaborative Sensing, and that insufficient work has been done in Route Tracing. It is concluded that none of the existing methods cover all applications of Route Tracing. It is, therefore, suggested that a new overall method should be proposed to solve the problem of location privacy in Route Tracing. Furthermore, future challenges are identified.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Comput. 8, 430–439 (2004)
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: Proc. 22nd Int. Conference on Distributed Computing Systems, 2002, pp. 74–83 (2002)
Andersen, M.S.: On limitations of existing methods for location privacy. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2011)
Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)
Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proc. of the 3rd conf. on European Conference on Computer-Supported Cooperative Work, pp. 77–92. Kluwer Academic Publishers, Norwell (1993)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures (2006)
Christin, D., Reinhardt, A., Kanhere, S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software (2011) (in Press) (accepted manuscript)
Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proc. of the 6th Int. Conf. on Mobile Systems, Applications, and Services, MobiSys 2008, pp. 211–224. ACM, New York (2008)
Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-controllable security and privacy for pervasive computing. In: Proc. of the 8th IEEE Workshop on Mobile Computing Systems and Applications (2007)
Coroama, V.: The Smart Tachograph – Individual Accounting of Traffic Costs and Its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 135–152. Springer, Heidelberg (2006)
Duckham, M., Kulik, L.: In: Drummond, J. (ed.) Dynamic & mobile GIS: investigating change in space and time. CRC (2006)
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proc. of the 25th IEEE Int. Conf on Distributed Computing Systems, pp. 620–629 (2005)
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS, pp. 620–629 (2004)
Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving object trajectories. In: 2007 Int. Conf. on Mobile Data Management (2007)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31–42. ACM, New York (2003)
Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-aware location sensor networks. In: Proc. of the 9th Conf. on Hot Topics in Operating Systems, vol. 9 (2003)
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38–46 (2006)
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: 1st Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks (2005)
Hong, D., Yuan, M., Shen, V.Y.: Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In: Proc. of the 7th Int. Conf. on Human Computer Interaction with Mobile Devices & Services (2005)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004, pp. 177–189. ACM, New York (2004)
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)
Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)
Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13, 391–399 (2009)
Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Mascetti, S., Bettini, C., Freni, D., Sean Wang, X., Jajodia, S.: Privacy-aware proximity based services. In: Proc. of the 10th Int. Conf. on Mobile Data Management: Systems, Services and Middleware (2009)
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE Int. Conf. on Network Protocols (2007)
Meyerowitz, J., Choudhury, R.R.: Hiding stars with fireworks: location privacy through camouflage. In: Proc. of the 15th Annual Int. Conf. on Mobile Computing and Networking (2009)
Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd Int. Conf. on Very Large Data Bases (2006)
Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., West, R., Boda, P.: Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of the 7th Int. Conf. on Mobile Systems, Applications, and Services
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 56–64 (2003)
Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Scipioni, M.P., Langheinrich, M.: I’m here! privacy challenges in mobile location sharing. In: 2nd Int. Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2010)
Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems (2006)
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE 24th Int. Conf. on Data Engineering (2008)
Zhi, Z., Choong, Y.K.: Anonymizing geographic ad hoc routing for preserving location privacy. In: 25th IEEE Int. Conf. on Distributed Computing Systems Workshops (2005)
Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62–76. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Andersen, M.S., Kjærgaard, M.B. (2012). Towards a New Classification of Location Privacy Methods in Pervasive Computing. In: Puiatti, A., Gu, T. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30973-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-30973-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30972-4
Online ISBN: 978-3-642-30973-1
eBook Packages: Computer ScienceComputer Science (R0)