Skip to main content

Towards a New Classification of Location Privacy Methods in Pervasive Computing

  • Conference paper

Abstract

Over the last decade many methods for location privacy have been proposed, but the mapping between classes of location based services and location privacy methods is not obvious. This entails confusion for developers, lack of usage of privacy methods, and an unclear road-map ahead for research within location privacy. This paper presents a two-dimensional classification of existing methods for location privacy grouping them by the type of location based service to which they apply and location privacy method category. The types of location based services identified are Point-of-Interest, Social Networking, Collaborative Sensing, and Route Tracing, and the high level location privacy method categories are Anonymization, Classical Security, Spatial Obfuscation, Temporal Obfuscation, and Protocol. It is found that little work exists on location privacy in the areas of Social Networking and Collaborative Sensing, and that insufficient work has been done in Route Tracing. It is concluded that none of the existing methods cover all applications of Route Tracing. It is, therefore, suggested that a new overall method should be proposed to solve the problem of location privacy in Route Tracing. Furthermore, future challenges are identified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, M.S.: Privacy in pervasive environments: next generation labeling protocols. Personal Ubiquitous Comput. 8, 430–439 (2004)

    Article  Google Scholar 

  2. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: Proc. 22nd Int. Conference on Distributed Computing Systems, 2002, pp. 74–83 (2002)

    Google Scholar 

  3. Andersen, M.S.: On limitations of existing methods for location privacy. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2011)

    Google Scholar 

  4. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proc. of the 3rd conf. on European Conference on Computer-Supported Cooperative Work, pp. 77–92. Kluwer Academic Publishers, Norwell (1993)

    Google Scholar 

  6. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  7. Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures (2006)

    Google Scholar 

  8. Christin, D., Reinhardt, A., Kanhere, S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software (2011) (in Press) (accepted manuscript)

    Google Scholar 

  9. Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proc. of the 6th Int. Conf. on Mobile Systems, Applications, and Services, MobiSys 2008, pp. 211–224. ACM, New York (2008)

    Google Scholar 

  10. Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-controllable security and privacy for pervasive computing. In: Proc. of the 8th IEEE Workshop on Mobile Computing Systems and Applications (2007)

    Google Scholar 

  11. Coroama, V.: The Smart Tachograph – Individual Accounting of Traffic Costs and Its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 135–152. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Duckham, M., Kulik, L.: In: Drummond, J. (ed.) Dynamic & mobile GIS: investigating change in space and time. CRC (2006)

    Google Scholar 

  13. Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proc. of the 25th IEEE Int. Conf on Distributed Computing Systems, pp. 620–629 (2005)

    Google Scholar 

  15. Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS, pp. 620–629 (2004)

    Google Scholar 

  16. Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving object trajectories. In: 2007 Int. Conf. on Mobile Data Management (2007)

    Google Scholar 

  17. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31–42. ACM, New York (2003)

    Google Scholar 

  18. Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-aware location sensor networks. In: Proc. of the 9th Conf. on Hot Topics in Operating Systems, vol. 9 (2003)

    Google Scholar 

  19. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38–46 (2006)

    Article  Google Scholar 

  20. Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: 1st Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks (2005)

    Google Scholar 

  21. Hong, D., Yuan, M., Shen, V.Y.: Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In: Proc. of the 7th Int. Conf. on Human Computer Interaction with Mobile Devices & Services (2005)

    Google Scholar 

  22. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004, pp. 177–189. ACM, New York (2004)

    Google Scholar 

  23. Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  24. Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  25. Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13, 391–399 (2009)

    Article  Google Scholar 

  26. Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  27. Mascetti, S., Bettini, C., Freni, D., Sean Wang, X., Jajodia, S.: Privacy-aware proximity based services. In: Proc. of the 10th Int. Conf. on Mobile Data Management: Systems, Services and Middleware (2009)

    Google Scholar 

  28. Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE Int. Conf. on Network Protocols (2007)

    Google Scholar 

  29. Meyerowitz, J., Choudhury, R.R.: Hiding stars with fireworks: location privacy through camouflage. In: Proc. of the 15th Annual Int. Conf. on Mobile Computing and Networking (2009)

    Google Scholar 

  30. Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proc. of the 32nd Int. Conf. on Very Large Data Bases (2006)

    Google Scholar 

  31. Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., West, R., Boda, P.: Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of the 7th Int. Conf. on Mobile Systems, Applications, and Services

    Google Scholar 

  32. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2, 56–64 (2003)

    Article  Google Scholar 

  33. Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  34. Scipioni, M.P., Langheinrich, M.: I’m here! privacy challenges in mobile location sharing. In: 2nd Int. Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2010)

    Google Scholar 

  35. Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems (2006)

    Google Scholar 

  36. Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE 24th Int. Conf. on Data Engineering (2008)

    Google Scholar 

  37. Zhi, Z., Choong, Y.K.: Anonymizing geographic ad hoc routing for preserving location privacy. In: 25th IEEE Int. Conf. on Distributed Computing Systems Workshops (2005)

    Google Scholar 

  38. Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62–76. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Andersen, M.S., Kjærgaard, M.B. (2012). Towards a New Classification of Location Privacy Methods in Pervasive Computing. In: Puiatti, A., Gu, T. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30973-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30973-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30972-4

  • Online ISBN: 978-3-642-30973-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics