Advertisement

On Usable Location Privacy for Android with Crowd-Recommendations

  • Benjamin Henne
  • Christian Kater
  • Matthew Smith
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8564)

Abstract

The boom of smart devices with location capabilities has also led to a boom of apps that use location data for many different purposes. While there are of course apps that require users’ precise locations, such as navigation apps, many apps would work equally well with less precision. Currently, apps that request location information are granted access to location data with maximum precision or not at all. In this work we present a location obfuscation approach for Android devices, which focuses on the usability aspects. Based on results of focus group discussions (n,=,19) we designed and implemented a solution that can be used by even unskilled users. When an app requests for location data the first time, the user configures accuracy of location data that is to be revealed to the app by selecting one of five precision levels. Unskilled users are supported by crowd-based recommendations.

Keywords

mobile usable security and privacy location crowd-sourcing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Beede, R., Warbritton, D., Han, R.: Myshield: Protecting mobile device data via security circles. Tech. Rep. CU-CS-1091-12, Univ. of Colorado Boulder (2012)Google Scholar
  2. 2.
    Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15(7), 679–694 (2011)CrossRefGoogle Scholar
  3. 3.
    Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: Mockdroid: Trading privacy for application functionality on smartphones. In: Proc. HotMobile 2011, pp. 49–54. ACM (2011)Google Scholar
  4. 4.
    Brush, A.B., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proc. UbiComp 2010, pp. 95–104. ACM (2010)Google Scholar
  5. 5.
    Fisher, D., Dorner, L., Wagner, D.: Location Privacy: User Behavior In The Field. In: Proc. SPSM 2012, pp. 51–56. ACM (2012)Google Scholar
  6. 6.
    Henne, B., Kater, C., Brenner, M., Smith, M.: Selective cloaking: Need-to-know for location-based apps. In: Proc. PST 2013. IEEE (2013)Google Scholar
  7. 7.
    Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proc. CCS 2011, pp. 639–652. ACM (2011)Google Scholar
  8. 8.
    Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proc. UbiComp 2012, pp. 501–510. ACM (2012)Google Scholar
  9. 9.
    Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proc. CHI 2012, pp. 391–394. ACM (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Benjamin Henne
    • 1
  • Christian Kater
    • 1
  • Matthew Smith
    • 2
  1. 1.Distributed Computing & Security GroupLeibniz Universität HannoverHannoverGermany
  2. 2.Usable Security and Privacy GroupUniversität BonnBonnGermany

Personalised recommendations