Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract

نویسندگان

  • Neil J. Croft
  • Martin S. Olivier
چکیده

In certain circumstances an individual may not be in control of their private location information and thus vulnerable to a privacy violation. In this paper, we ensure location privacy through the establishment of a prohibitive contract in a situation where an individual wishes to minimize privacy loss and a service provider aims to maximize profits. Given the possible strategies we show that a privacy equilibrium can be found. This equilibrium, expressed in the form of a prohibitive contract, is established with the intention of preventing a possible privacy violation. Should within the constraints of the prohibitive contract, a violation occur, a suitable and efficient outcome for both parties presents itself. We further investigate how such violations may affect a user-centric location privacy system. Emphasis is placed on the economic and contract aspects of the parties’ relationship, rather than specific technical detail of location privacy. Utilizing the utilitarian paradigm approach, we evaluate the overall efficiency of the prohibitive contracts which we show postulates convergence towards an overall balanced system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

A Value Sensitive Design Investigation of Privacy for Location-Enhanced Computing

Building on principles of Value Sensitive Design, this paper presents a preliminary conceptual and technical investigation of privacy for location-enhanced computing. The following features are considered: directionality of information flow, information management, interpretability, awareness, control, scope of disclosure, and risk & recourse. Each feature is considered at three levels of syste...

متن کامل

A Comparative Study of the Concept of "Privacy" in the House of Islamic Countries in the Middle East (Case Study: Houses of Isfahan, Sanaa, Damascus)

One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...

متن کامل

بررسی ابزارها و روش‌های ایجاد محرمیت در خانه‎ی زینت‌الملک شیراز منطبق بر آیات و روایات اسلامی

Introduction Privacy is known as one of the most basic features of Islamic architecture. Home is the most private places for the person so it is essential to provide confidentiality and privacy in it. Islam, Quran Verses and Hadiths of Prophet Mohammad and imams have focused on creating privacy in the houses. In this way, the privacy has been the basic principle on traditional architectures ...

متن کامل

Privacy preservation in location-based advertising: A contract-based approach

Location-based advertising (LBA) is rapidly developing with the surging popularity of mobile devices and the advances in localization techniques. However, many LBA applications aggressively collect users’ location data without providing clear statements on the usage and disclosure strategies of such sensitive information, which raises severe privacy concerns. Existing privacy preservation mecha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Data Privacy

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2011