Protecting People Location Information ( Extended

نویسنده

  • Peter Steenkiste
چکیده

Ubiquitous computing environments rely on the availability of location information about people to provide location-specific services. However, location is a sensitive piece of information. For example, it is often possible to gather information about the current activities of a person from her location. Therefore, location information should not be distributed to just anyone. The solution is to allow people to specify location policies that state who should be allowed to locate them. In this paper, we present and motivate key features that should be supported by location policies. We have implemented a prototype of a secure people location service that supports many of the features discussed here, and we are currently evaluating the system with real users in the context of the CMU Aura project [1].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantic and Sensitivity Aware Location Privacy Protection for the Internet of Things

Everyday applications and ubiquitous devices contribute data to the Internet of Things, oftentimes including sensitive information of people. This opens new challenges for protecting users’ data from adversaries, who can perform different types of attacks using combinations of private and publicly available information. In this paper, we discuss some of the main challenges, especially regarding...

متن کامل

Privacy through Fake yet Semantically Real Traces

Camouflaging data by generating fake information is a wellknown obfuscation technique for protecting data privacy. The effectiveness of this technique in protecting users’ privacy highly depends on the resemblance of fake information to reality, such that an adversary cannot easily filter such fake information out. In this paper, we focus on a very sensitive and increasingly exposed type of dat...

متن کامل

Protecting Access to People Location Information

Ubiquitous computing provides new types of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, and only authorized entities should be able to learn it. We present several challenges that arise for the specification and implementation of policies controlling access to location information. For example, there can be m...

متن کامل

Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers

Well, someone can decide by themselves what they want to do and need to do but sometimes, that kind of person will need some protecting persons while protecting the people second annual workshop on information privacy and nat references. People with open minded will always try to seek for the new things and information from many sources. On the contrary, people with closed mind will always thin...

متن کامل

Protecting People on the Move through Virtual Personal Security

Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002