Nothing Special   »   [go: up one dir, main page]

Skip to main content

Privacy in Georeferenced Context-Aware Services: A Survey

  • Chapter
Privacy in Location-Based Applications

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5599))

Abstract

Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The privacy concerns that LBS have raised are likely to become even more serious when several context data, other than location and time, are sent to service providers as part of an Internet request. This paper provides a classification and a brief survey of the privacy preservation techniques that have been proposed for this type of services. After identifying the benefits and shortcomings of each class of techniques, the paper proposes a combined approach to achieve a more comprehensive solution for privacy preservation in georeferenced context-aware services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
USD 15.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 15.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems (CHI 2003), pp. 129–136. ACM Press, New York (2003)

    Google Scholar 

  2. Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6), 440–454 (2004)

    Article  Google Scholar 

  3. Bettini, C., Mascetti, S., Wang, X.S.: Privacy Protection through Anonymity in Location-based Services. In: Handbook of Database Security: Applications and Trends, pp. 509–530 (2008)

    Google Scholar 

  4. Riboni, D., Pareschi, L., Bettini, C.: Shadow attacks on users’ anonymity in pervasive computing environments. Pervasive and Mobile Computing 4(6), 819–835 (2008)

    Article  Google Scholar 

  5. Atallah, M.J., Frikken, K.B.: Privacy-Preserving Location-Dependent Query Processing. In: ICPS 2004: Proceedings of the The IEEE/ACS International Conference on Pervasive Services, pp. 9–17. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  6. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), pp. 121–132. ACM Press, New York (2008)

    Chapter  Google Scholar 

  7. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)

    Google Scholar 

  8. Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 366–375. IEEE Computer Society Press, Los Alamitos (2008)

    Chapter  Google Scholar 

  9. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31–42. USENIX Association (2003)

    Google Scholar 

  10. Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)

    Article  Google Scholar 

  11. Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), pp. 901–909. ACM Press, New York (2005)

    Google Scholar 

  12. Neuman, B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  13. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  14. Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM 42(2), 32–48 (1999)

    Article  Google Scholar 

  15. Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 193–206. ACM Press, New York (2002)

    Google Scholar 

  16. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, p. 21. USENIX Association (2004)

    Google Scholar 

  17. Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  18. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002), p. 74. IEEE Computer Society Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  19. Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  21. Kumar, A., Karnik, N.M., Chafle, G.: Context sensitivity in role-based access control. Operating Systems Review 36(3), 53–66 (2002)

    Article  Google Scholar 

  22. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 249–260. IEEE Computer Society Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  23. Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: A Semantic Context-Aware Adaptive Policy Model. In: Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2007), pp. 129–140. IEEE Computer Society, Los Alamitos (2007)

    Chapter  Google Scholar 

  24. Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications 32(9), 40–48 (1994)

    Article  Google Scholar 

  25. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  26. Hengartner, U., Steenkiste, P.: Avoiding Privacy Violations Caused by Context-Sensitive Services. Pervasive and Mobile Computing 2(3), 427–452 (2006)

    Article  Google Scholar 

  27. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186–208 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang, C.D., Feng, L.C., Wang, Q.: Zero-Knowledge-Based User Authentication Technique in Context-aware System. In: International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE 2007, pp. 874–879 (2007)

    Google Scholar 

  29. Hengartner, U., Steenkiste, P.: Access control to people location information. ACM Trans. Inf. Syst. Secur. 8(4), 424–456 (2005)

    Article  Google Scholar 

  30. Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J.: Geolocation policy: A document format for expressing privacy preferences for location information (January 2009), http://www.ietf.org/internet-drafts/draft-ietf-geopriv-policy-18.txt

  31. Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P., Sahuguet, A., Varadarajan, S., Vyas, A.: Enabling Context-Aware and Privacy-Conscious User Data Sharing. In: Proceedings of the 2004 IEEE International Conference on Mobile Data Management (MDM 2004), pp. 187–198. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

  32. Atluri, V., Shin, H.: Efficient Security Policy Enforcement in a Location Based Service Environment. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 61–76. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  33. Atluri, V., Chun, S.A.: A geotemporal role-based authorisation system. International Journal of Information and Computer Security 1(1–2), 143–168 (2007)

    Article  Google Scholar 

  34. Corradi, A., Montanari, R., Tibaldi, D.: Context-Based Access Control Management in Ubiquitous Environments. In: Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 253–260. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  35. Sacramento, V., Endler, M., Nascimento, F.N.: A Privacy Service for Context-aware Mobile Computing. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 182–193. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  36. Zhang, Q., Qi, Y., Zhao, J., Hou, D., Zhao, T., Liu, L.: A Study on Context-aware Privacy Protection for Personal Information. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), pp. 1351–1358. IEEE Computer Society, Los Alamitos (2007)

    Chapter  Google Scholar 

  37. Bakken, D.E., Parameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. IEEE Security & Privacy 2(6), 34–41 (2004)

    Article  Google Scholar 

  38. Xiao, X., Tao, Y.: Personalized privacy preservation. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 229–240. ACM Press, New York (2006)

    Chapter  Google Scholar 

  39. Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  40. Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem. 1(3), 241–260 (2004)

    Article  Google Scholar 

  41. Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 929–940. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  42. Sheikh, K., Wegdam, M., van Sinderen, M.: Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. Journal of Software 3(3), 83–93 (2008)

    Article  Google Scholar 

  43. Samarati, P.: Protecting Respondents’ Identities in Microdata Release. IEEE Trans. on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  44. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  45. Shin, H., Atluri, V., Vaidya, J.: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. In: Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), pp. 73–80 (2008)

    Google Scholar 

  46. Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-Preserving Event Detection in Pervasive Spaces. In: Proceedings of the 7th IEEE International Conference on Pervasive Computing and Communications (PerCom 2009) (2009)

    Google Scholar 

  47. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of ICDE 2006. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  48. Riboni, D., Pareschi, L., Bettini, C., Jajodia, S.: Preserving Anonymity of Recurrent Location-based Queries. In: Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME 2009) (to appear, 2009)

    Google Scholar 

  49. Pareschi, L., Riboni, D., Agostini, A., Bettini, C.: Composition and Generalization of Context Data for Privacy Preservation. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Proceedings of the Workshops, pp. 429–433. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  50. Papadopoulou, E., McBurney, S., Taylor, N., Williams, M.H., Dolinar, K., Neubauer, M.: Using User Preferences to Enhance Privacy in Pervasive Systems. In: Proceedings of the Third International Conference on Systems (ICONS 2008), pp. 271–276. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  51. Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) Pervasive 2008. LNCS, vol. 5013, pp. 280–297. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  52. Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  53. Simon, D., Cifuentes, C., Cleal, D., Daniels, J., White, D.: Java\(^{\mbox{\tiny TM}}\) on the bare metal of wireless sensor devices: the squawk Java virtual machine. In: Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006), pp. 78–88. ACM Press, New York (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Riboni, D., Pareschi, L., Bettini, C. (2009). Privacy in Georeferenced Context-Aware Services: A Survey. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03511-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03510-4

  • Online ISBN: 978-3-642-03511-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics