Advertisement

Privacy for Profitable Location Based Services

  • Tobias Kölsch
  • Lothar Fritsch
  • Markulf Kohlweiss
  • Dogan Kesdogan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3450)

Abstract

Location based services (LBS) are distributed multi-party infrastructures with the opportunity to generate profitable m-business applications. Also, LBS pose a great risk for their users’ privacy, as they have access to private information about a person’s whereabouts in a particular context. As location data is the essential input for LBS, protection of privacy in LBS is not a problem of providing anonymity by supressing data release, but a problem of identity management and control over information handling. In this paper we show a solution that ensures a LBS user’s control over location information with managed identities. At the same time, our solution enables profitable business models, e.g. for mobile telephony operators. Additionally, we provide fine-grained consent management for the LBS user.

Keywords

Mobile Operator Internet Engineer Task Force Mobile Network Operator Application Provider Location Intermediary 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Turowski, K., Pousttchi, K.: Mobile Commerce: Grundlagen und Techniken. Springer, Berlin (2004)Google Scholar
  2. 2.
    Camponovo, G., Pigneur, Y.: Business model analysis applied to mobile business. In: ICEIS 2003 (2003)Google Scholar
  3. 3.
    PRIME WP 14.0:PRIME Public Deliverable D14.0a Framework V0. Technical report (2004) ,http://www.prime-project.eu.int
  4. 4.
    Myllymaki, J., Edlund, S.: Location Aggregation from Multiple Sources. In: Society, I.C., ed.: Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), Singapore (2002)Google Scholar
  5. 5.
    Rose, F.: The economics, concept and design of information intermediaries - A theoretic approach. In: Information Age Economy. Physica-Verlag, Heidelberg (1999)Google Scholar
  6. 6.
    Barkhuus, L., Dey, A.: Location Based Services for Mobile Telephony: a study of users’ privacy concerns (2003)Google Scholar
  7. 7.
    Sheehan, K.: Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society 18, 21–32 (2002)CrossRefGoogle Scholar
  8. 8.
    Sheehan, K.B., Grubbs Hoy, M.: Dimensions of Privacy Concern among Online Consumers. Journal of Public Policy and Marketing 19, 62–73 (2000)CrossRefGoogle Scholar
  9. 9.
    Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace. Technical report (2000)Google Scholar
  10. 10.
    Marx, G.: What’s in a name? - Some reflections on the Sociology of Anonymity. The Information Society 15 (1999)Google Scholar
  11. 11.
    Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: IFIP TC 6 International Workshop on Personal Wireless Communications, Aachen, Verlag der Augustinus Buchhandlung, pp. 105–116 (1995)Google Scholar
  12. 12.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)Google Scholar
  13. 13.
    Camenish, J., van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System - Research Report RZ 3419. Technical report, Zürich (2002)Google Scholar
  14. 14.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)CrossRefGoogle Scholar
  15. 15.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31–42 (2003)Google Scholar
  16. 16.
    Ashley, P., Hada, S., Günter, K., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) - IBM Research Report. Technical report (2003), http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index.html
  17. 17.
    Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification - W3C Recommendation. Technical report (2002)Google Scholar
  18. 18.
    Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA, pp. 48–57 (2001)Google Scholar
  19. 19.
    Jaisingh, J., Metha, S., Chaturvedi, A.: Privacy and Information Markets: An experimental study. In: PACIS,Volume Proceedings of the PACIS 2004, Shanghai (2004)Google Scholar
  20. 20.
    Acquisti, A.: Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. In: Camp, J.L., Lewis, S. (eds.) Economics of Information Security. Kluwer, Dordrecht (2004)Google Scholar
  21. 21.
    Oinonen, K.: TR101 - LIF Privacy Guidelines. (2002)Google Scholar
  22. 22.
    Müller, M.: Standards for Geographic Location and Privacy: IETF’s Geopriv. Datenschutz und Datensicherheit (DuD) 28, 297–303 (2004)Google Scholar
  23. 23.
    GSM Association: Location Based Services - Permanent Reference Document SE.23. Technical report (2003)Google Scholar
  24. 24.
    Marbrouk, M., et. al.: OpenGIS Location Services (OpenLS): Core Services (2004)Google Scholar
  25. 25.
    Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes Platform. Technical report, Lulea, Sweden (2002)Google Scholar
  26. 26.
    Huber, M., Dietl, T., Kammerl, J., Dornbusch, P.: Collecting and providing location information: The location trader. In: MoMuc, München, TU München (2003)Google Scholar
  27. 27.
    Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 205–219 (2001), http://drim.inf.tu-dresden.de/
  28. 28.
    Jendricke, U., tom Markotten, D.G.: Usability meets security - the identity-manager as your personal security assistant for the internet. In: Proceedings of 16th Annual Computer Security Applications Conference, New Orleans, USA (2000)Google Scholar
  29. 29.
    Kesdogan, D., Reichl, P., Junghärtchen, K.: Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 295–312. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  30. 30.
    Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 216–230. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  31. 31.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tobias Kölsch
    • 1
  • Lothar Fritsch
    • 2
  • Markulf Kohlweiss
    • 2
  • Dogan Kesdogan
    • 1
  1. 1.RWTH Aachen UniversityAachenGermany
  2. 2.Johann Wolfgang Goethe University Frankfurt am MainFrankfurt am MainGermany

Personalised recommendations