Advertisement

Location Privacy in Mobile Computing Environments

  • John P. Baugh
  • Jinhua Guo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)

Abstract

In general, privacy can be viewed as the right to be left alone when desired (solitude), the right to remain anonymous (anonymity), and the right to confidentiality (secrecy of information). More specifically, location privacy is “the ability to prevent other parties from learning one’s current or past locations”. In this paper, we focus on two primitives that make up location privacy: identity information and location information. Identity information has to do with the static attributes and characteristics that uniquely identify a person. Information about an individual’s identity can also be inferred based upon their location at various times (in other words, their activities can give away identity information). The other type of information upon which we will focus, location information, deals specifically with the whereabouts of an individual or group. We will also describe location-aware applications and services and their relationship with location privacy.

Keywords

Global Position System Location Information Location Privacy Identity Information Vehicular Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Guo, J., Baugh, J.P.: Security and Privacy in Vehicle Safety Communication Applications. SAE International (2005)Google Scholar
  3. 3.
  4. 4.
    Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. ACM Transactions on Information Systems 10(1), 91–102 (1992)CrossRefGoogle Scholar
  5. 5.
    Getting, I.A.: The Global Positioning System. IEEE Spectrum 30(12), 36–47 (1993)CrossRefGoogle Scholar
  6. 6.
    Ward, A., Jones, A., Hopper, A.: A New Location Technique for the Active Office. IEEE Pers. Communication 4(5), 42–47 (1997)CrossRefGoogle Scholar
  7. 7.
    Priyantha, N.B., et al.: The Cricket Compass for Context-Aware Mobile ApplicationsGoogle Scholar
  8. 8.
    Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket Location-Support System. In: 6th ACM National Conference on Mobile Computing and Networking (ACM MOBICOM), Boston, MA (August 2000)Google Scholar
  9. 9.
    Smith, A., et al.: Tracking Moving Devices with the Cricket Location System. In: ACM MobiSys (2004)Google Scholar
  10. 10.
    Layton, J., Brain, M., Tyson, J.: How Cell Phones Work, http://www.howstuffworks.com
  11. 11.
  12. 12.
  13. 13.
    Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. In: Pervasive Computing, January-March 2003, p. 46. IEEE CS and IEEE Communications Society (2003)Google Scholar
  14. 14.
    Beresford, A.: Location Privacy in Ubiquitous Computing, Published in University of Cambridge Technical Report, UCAM-CL-TR-612 (January 2005)Google Scholar
  15. 15.
    Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)Google Scholar
  16. 16.
    Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access Configuration. In: DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, Naval Research Laboratory, Hilton Head, SC, vol. 1, pp. 34–40. IEEE CS Press, Los Alamitos (2000)CrossRefGoogle Scholar
  17. 17.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)Google Scholar
  18. 18.
    Chaum, D., van Heijst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  19. 19.
    Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)Google Scholar
  20. 20.
    Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)Google Scholar
  21. 21.
    Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)Google Scholar
  22. 22.
    Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret: Theory and Applications of Ring Signatures (2004)Google Scholar
  23. 23.
    United States Privacy Act, 5 U.S.C. § 552a (1974), http://www.usdoj.gov/04foia/privstat.htm
  24. 24.
    United States Electronic Communications Privacy Act (1986), http://straylight.law.cornell.edu/uscode/html/uscode18/usc_sup_01_18_10_I_20_119.html
  25. 25.
    United States Wireless Communications and Public Safety Act (1999), http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.438.IH
  26. 26.
    Wireless Location Privacy: Law and Policy in the U.S., EU and Japan, http://www.isoc.org/briefings/015/
  27. 27.
    Campbell, R., et al.: Towards Security and Privacy for Pervasive ComputingGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • John P. Baugh
    • 1
  • Jinhua Guo
    • 1
  1. 1.Department of Computer and Information ScienceUniversity of Michigan – DearbornDearborn

Personalised recommendations