Location Privacy Protection Through Obfuscation
نویسنده
چکیده
Introduction. Technical improvements of detection and transmission of location information, together with the widespread adoption of mobile communication devices and location-based services for business, social or informational purposes, are increasing the privacy concerns. Better, more elaborated solutions are necessary to provide users (Rule Makers, as they are called in geopriv) the possibility to express privacy policies and technical means to implement them. This is easier said than done. Some important scenarios can be dealt with, in a satisfactory way using Pseudonymor Anonymity-based techniques, because the real identity of the individual is irrelevant for the service. If necessary, the individual and the recipient of the location information can run a “pseudonym-agreement protocol”, similar to some unauthenticated key agreements. But there is a large class of situations in which the identity of the individual to be located is to be explicitly disclosed (or known) to the recipient. Let us suppose a user wants to make his position available via a presence service or within an online social forum to his contacts. Then, he will prefer to disclose his location with a high precision to close friends and with a low ones to others. In some cases, he may wish to disclose his location within 10 or within 100 km. Further, let us assume, he does not want to lie about his location, and the algorithm should not force him to do so.
منابع مشابه
Optimizing the Location Obfuscation in Location-Based Mobile Systems
A major concern regarding location-based applications in mobile systems is the user’s location privacy, i.e. the exposure of user’s location information to unauthorized third parties. Location obfuscation is a common privacy protection mechanism that provides imprecise location information in order to create uncertainty for an adversary. However, in a mobile setup the way of determining the rep...
متن کاملLocation Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling ...
متن کاملProtecting Location Privacy through Semantics-aware Obfuscation Techniques
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. To protect location privacy the usual strategy is to obfuscate the actual position of the user with a coarse location and then forward the obfuscated location to the LBS provider. Existing techniques for location obfuscation are only based on geometric methods...
متن کاملPrivacy-aware location privacy preference recommendations
Location-Based Services have become increasingly popular due to the prevalence of smart devices and location-sharing applications such as Facebook and Foursquare. The protection of people’s sensitive location data in such applications is an important requirement. Conventional location privacy protection methods, however, such as manually defining privacy rules or asking users to make decisions ...
متن کاملLocation Privacy Protection Mechanisms in Location-Sharing Service
The blooming of location-sharing services has led to serious privacy concerns, particularly location privacy concerns. In this paper, we first discuss the definition of location privacy and then review several location privacy protection mechanisms. After that, we classify location privacy protection mechanisms into four categories: legislation & regulatory, anonymity & obfuscation, protocol an...
متن کاملPrivacy Games: Optimal User-Centric Data Obfuscation
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a personalized (e.g., location-based) service. Data obfuscation is a prevalent user-centric approach to protecting users’ privacy in such systems: the untrusted entity only receives a noisy version of user’s data. Perturbing data before sharing it, however, comes at the price of the users’ utility ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010