Using Extracted Behavioral Features to Improve Privacy for Shared Route Tracks

  • Mads Schaarup Andersen
  • Mikkel Baun Kjærgaard
  • Kaj Grønbæk
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 107)

Abstract

Track-based services, such as road pricing, usage-based insurance, and sports trackers, require users to share entire tracks of locations, however this may seriously violate users’ privacy. Existing privacy methods suffer from the fact that they degrade service quality when adding privacy. In this paper, we present the concept of privacy by substitution that addresses the problem without degrading service quality by substituting location tracks with less privacy invasive behavioral data extracted from raw tracks of location data or other sensing data. We explore this concept by designing and implementing TracM, a track-based community service for runners to share and compare their running performance. We show how such a service can be implemented by substituting location tracks with less privacy invasive behavioral data. Furthermore, we discuss the lessons learned from building TracM and discuss the application of the concept to other types of track-based services.

Keywords

Location Privacy Track-based services Privacy-By-Substitution Behavioral Features Running 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alka box (2012), http://www.alkabox.dk/
  2. 2.
    Endomondo (2012), http://www.endomodo.com/
  3. 3.
    Garmin connect (2012), http://connect.garmin.com/
  4. 4.
    Gpsies.com (2012), http://www.gpsies.com/
  5. 5.
    Ananthanarayanan, G., Haridasan, M., Mohomed, I., Terry, D., Thekkath, C.A.: Startrack: a framework for enabling track-based applications. In: Proc. of the 7th Int. Conf. on Mobile Systems, Applications, and Services (2009)Google Scholar
  6. 6.
    Andersen, M.S., Kjærgaard, M.B.: Towards a New Classification of Location Privacy Methods in Pervasive Computing. In: Puiatti, A., Gu, T. (eds.) MobiQuitous 2011. LNICST, vol. 104, pp. 150–161. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  7. 7.
    Kjærgaard, M.B.: Location-based services on mobile phones: Minimizing power consumption. IEEE Pervasive Computing 11(1), 67–73 (2012)CrossRefGoogle Scholar
  8. 8.
    Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Langdal, J., Schougaard, K.R., Kjærgaard, M.B., Toftkjær, T.: PerPos: A Translucent Positioning Middleware Supporting Adaptation of Internal Positioning Processes. In: Gupta, I., Mascolo, C. (eds.) Middleware 2010. LNCS, vol. 6452, pp. 232–251. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  10. 10.
    Mueller, F., Agamanolis, S.: Sports over a distance. Comput. Entertain. 3 (2005)Google Scholar
  11. 11.
    Mun, M., Reddy, S., Shilton, K., Yau, N., Burke, J., Estrin, D., Hansen, M., Howard, E., West, R., Boda, P.: Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proc. of the 7th Int. Conf. on Mobile Systems, Applications, and Services. ACM (2009)Google Scholar
  12. 12.
    Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C.: Anonymous User Tracking for Location-Based Community Services. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 116–133. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Scipioni, M.P., Langheinrich, M.: I’m here! privacy challenges in mobile location sharing. In: 2nd Int. Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, IWSSI/SPMU 2010 (2010)Google Scholar
  14. 14.
    Veltkamp, R.C.: Shape matching: similarity measures and algorithms. In: International Conference on Shape Modeling and Applications, SMI 2001, pp. 188–197 (May 2001)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Mads Schaarup Andersen
    • 1
  • Mikkel Baun Kjærgaard
    • 1
  • Kaj Grønbæk
    • 1
  1. 1.Department of Computer ScienceAarhus UniversityDenmark

Personalised recommendations