Abstract
Current mobile phones feature a continuously increasing number of embedded sensors. This opens the doors to a wide range of novel mobile sensing applications, which can potentially benefit from sensor readings collected by billions of mobile phone subscribers. The collection of fine-grained sensor readings can however endanger multiple aspects of the privacy of the users contributing to these applications by, e.g., revealing their whereabouts or the social relationships. In this manuscript, we identify potential threats to privacy by considering each collected sensor modality individually. We then present selected privacy-preserving mechanisms specially tailored for mobile sensing applications and identify future research directions to further enhance the privacy protection of users contributing to such applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Prashanth Mohan, Venkata N. Padmanabhan, and Ramachandran Ramjee, “Nericell: Rich Monitoring of Road and Traffic Conditions Using Mobile Smartphones,” in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys), 2008.
- 2.
Rajib K. Rana et al., “Ear-Phone: An End-to-end Participatory Urban Noise Mapping System,” in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2010.
- 3.
Katie Shilton, “Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection,” Communications of the ACM 52 (2009).
- 4.
“Sun SPOT Main Board Technical Datasheet,” http://www.sunspotworld.com (accessed in 02.2012).
- 5.
“TelosB Datasheet,” http://www.memsic.com (accessed in 02.2012).
- 6.
Delphine Christin and Matthias Hollick, “We Must Move – We Will Move: On Mobile Phones as Sensing Platforms,” in Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), 2011.
- 7.
“iPhone 4S Technical Specifications,” http://www.apple.com (accessed in 02.2012).
- 8.
“Global GSM and 3GSM Mobile Connections,” http://www.gsm.com (accessed in 02.2012).
- 9.
Yi F. Dong et al., “Automatic Collection of Fuel Prices from a Network of Mobile Cameras,” in Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2008.
- 10.
Min Mun et al., “PEIR, the Personal Environmental Impact Report, as a Platform for Participatory Sensing Systems Research,” in Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2009.
- 11.
Shane B. Eisenman et al., “BikeNet: A Mobile Sensing System for Cyclist Experience Mapping,” ACM Transactions on Sensor Networks 6 (2009).
- 12.
Shilton, “Four Billion Little Brothers?”.
- 13.
Mohan, “Nericell”.
- 14.
Rana, “Ear-Phone”.
- 15.
Eiman Kanjo et al., “MobSens: Making Smart Phones Smarter,” IEEE Pervasive Computing 8 (2009).
- 16.
Nicolas Maisonneuve et al., “NoiseTube: Measuring and Mapping Noise Pollution with Mobile Phones,” in Proceedings of the 4th International Symposium on Information Technologies in Environmental Engineering (ITEE), 2009.
- 17.
Delphine Christin et al., A Survey on Privacy in Mobile Participatory Sensing Applications, Journal of Systems & Software 84 (2011).
- 18.
Christin, A Survey on Privacy in Mobile Participatory Sensing Applications.
- 19.
Anthony LaMarca et al., “Place Lab: Device Positioning Using Radio Beacons in the Wild,” Pervasive Computing 3468 (2005).
- 20.
Shilton, “Four Billion Little Brothers?”.
- 21.
Ling Liu, “From Data Privacy to Location Privacy: Models and Algorithms,” in Proceedings of the 33rd International Conference on Very Large Data Bases (VLBD), 2007.
- 22.
John Krumm, “Inference Attacks on Location Tracks,” in Proceedings of the 5th IEEE International Conference on Pervasive Computing (Pervasive), 2007.
- 23.
Rana, “Ear-Phone”.
- 24.
Christin, A Survey on Privacy in Mobile Participatory Sensing Applications.
- 25.
Ibid.
- 26.
Mohan, “Nericell”.
- 27.
Mohammad O. Derawi et al., “Unobtrusive User-authentication on Mobile Phones using Biometric Gait,” in Proceeding of the 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010.
- 28.
Philip Marquardt et al., “(sp)iPhone: Decoding Vibrations from Nearby Keyboards using Mobile Phone Accelerometers,” in Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), 2011.
- 29.
Rana, “Ear-Phone”.
- 30.
Bret Hull et al., “CarTel: A Distributed Mobile Sensor Computing System,” in Proceedings of the 4th ACM International Conference on Embedded Networked Sensor Systems (SenSys), 2006.
- 31.
Krumm, “Inference Attacks on Location Tracks”.
- 32.
Katie Shilton et al., “Participatory Privacy in Urban Sensing,” in Proceedings of the International Workshop on Mobile Devices and Urban Sensing (MODUS), 2008.
- 33.
Tathagata Das et al., “PRISM: Platform for Remote Sensing using Smartphones,” in Proceedings of the 8th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2010.
- 34.
Shilton, “Participatory Privacy in Urban Sensing”.
- 35.
Mun, “PEIR”.
- 36.
Ramón Cáceres et al., “Virtual Individual Servers as Privacy-Preserving Proxies for Mobile Devices,” in Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld), 2009.
- 37.
Rana, “Ear-Phone”.
- 38.
Emiliano Miluzzo et al., “Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application,” in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys), 2008.
- 39.
Raghu K. Ganti et al., “PoolView: Stream Privacy for Grassroots Participatory Sensing,” in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys), 2008.
- 40.
Latanya Sweeney, “K-Anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 10 (2002).
- 41.
Minho Shin et al., “AnonySense: A System for Anonymous Opportunistic Sensing,” Journal of Pervasive and Mobile Computing 7 (2010).
- 42.
Kuan L. Huang, Salil S. Kanhere, and Wen Hu, “Preserving Privacy in Participatory Sensing Systems,” Computer Communications 33 (2010).
- 43.
Josep Domingo-Ferrer and Josep M. Mateo-Sanz, “Practical Data-Oriented Microaggregation for Statistical Disclosure Control,” IEEE Transactions on Knowledge and Data Engineering 14 (2002).
- 44.
Christin, A Survey on Privacy in Mobile Participatory Sensing Applications.
- 45.
Ibid.
- 46.
Marc Langheinrich, “Personal Privacy in Ubiquitous Computing – Tools and System Support” (Ph.D. diss., ETH Zurich, 2005).
- 47.
Delphine Christin et al., “Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications,” in Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011.
- 48.
Das, “PRISM”.
- 49.
Anne Adams and Martina A. Sasse, “Users Are Not the Enemy”. Communications of the ACM 42 (1999).
- 50.
Alma Whitten and J. D. Tygar, “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0,” in Proceedings of the USENIX Security Symposium (SSYM), 1999.
- 51.
Lothar Fritsch, “Profiling and Locations-Based Services”, in Profiling the European Citizen – Cross-Disciplinary Perspective, ed. Mireille Hildebrandt and Serge Gutwirth (Dordrecht: Springer Netherlands), 2008.
- 52.
Jan Zibuschka et al., “Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning,” in Proceedings of the 22nd IFIP TC-11 International Information Security Conference, 2007.
- 53.
Ming-Chi Lee, “Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit,” Electronic Commerce Research and Applications 8 (2009).
References
Adams, Anne, and Martina A. Sasse. 1999. Users are not the enemy. Communications of the ACM 42: 40–46.
Cáceres, Ramón, Landon Cox, Harold Lim, Amre Shakimov, and Alexander Varshavsky. 2009. Virtual individual servers as privacy-preserving proxies for mobile devices. In Proceedings of the 1st ACM workshop on networking, systems, and applications for mobile handhelds (MobiHeld), 37–42, Barcelona, Spain.
Christin, Delphine, and Matthias Hollick. 2011. We must move – We will move: On mobile phones as sensing platforms. In Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), 25–28, Paderborn, Germany.
Christin, Delphine, Andreas Reinhardt, Salil S. Kanhere, and Matthias Hollick. 2011a. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84: 1928–1946.
Christin, Delphine, Julien Guillemet, Andreas Reinhardt, Matthias Hollick, and Salil S. Kanhere. 2011b. Privacy-preserving collaborative path hiding for participatory sensing applications. In Proceedings of the 8th IEEE international conference on mobile ad-hoc and sensor systems (MASS), 341–350, Valencia, Spain.
Das, Tathagata, Prashant Mohan, Venkat Padmanabhan, Ramachandran Ramjee, and Asankhaya Sharma. 2010. PRISM: Platform for remote sensing using smartphones. In Proceedings of the 8th ACM international conference on mobile systems, applications, and services (MobiSys), 63–76, San Francisco, California, USA.
Derawi, Mohammad O., Claudia Nickel, Patrick Bours, and Christoph Busch. 2010. Unobtrusive user-authentication on mobile phones using biometric gait. In Proceeding of the 6th IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), 306–311, Darmstadt, Germany.
Domingo-Ferrer, Josep, and Josep M. Mateo-Sanz. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering 14: 189–201.
Dong, Yi F., Salil S. Kanhere, Chun T. Chou, and Nirupama Bulusu. 2008. Automatic collection of fuel prices from a network of mobile cameras. In Proceedings of the 4th IEEE international conference on distributed computing in sensor systems (DCOSS), 140–156, Santorini Island, Greece.
Eisenman, Shane B., Emiliano Miluzzo, Nicholas D. Lane, Ronald A. Peterson, Gahng-Seop Ahn, and Andrew T. Campbell. 2009. BikeNet: A mobile sensing system for cyclist experience mapping. ACM Transactions on Sensor Networks 6: 1–39.
Fritsch, Lothar. 2008. Profiling and location-based services. In Profiling the European citizen – Cross-disciplinary perspectives, ed. Mireille Hildebrandt and Serge Gutwirth, 147–160. Dordrecht: Springer.
Ganti, Raghu K., Nam Pham, Yu-En Tsai, and Tarek F. Abdelzaher. 2008. PoolView: Stream privacy for grassroots participatory sensing. In Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys), 281–294, Raleigh, NC, USA.
Huang, Kuan L., Salil S. Kanhere, and Hu Wen. 2010. Preserving privacy in participatory sensing systems. Computer Communications 33: 1266–1280.
Hull, Bret, Vladimir Bychkovsky, Yang Zhang, Kevin Chen, Michel Goraczko, Allen Miu, Eugene Shih, Hari Balakrishnan, and Samuel Madden. 2006. CarTel: A distributed mobile sensor computing system. In Proceedings of the 4th ACM international conference on embedded networked sensor systems (SenSys), 125–138, Boulder, Colorado, USA.
Kanjo, Eiman, Jean Bacon, Peter Landschoff, and David Roberts. 2009. MobSens: Making smart phones smarter. IEEE Pervasive Computing 8: 50–57.
Krumm, John. 2007. Inference attacks on location tracks. In Proceedings of the 5th IEEE international conference on pervasive computing (Pervasive), 127–143, Toronto, Canada.
LaMarca, Anthony, Yatin Chawathe, Sunny Consolvo, Jeffrey Hightower, Ian Smith, James Scott, Tim Sohn, James Howard, Jeff Hughes, Fred Potter, Jason Tabert, Pauline Powledge, Gaetano Borriello, and Bill Schilit. 2005. Place lab: Device positioning using radio beacons in the wild. Pervasive Computing 3468: 116–133.
Langheinrich, Marc. 2005. Personal privacy in ubiquitous computing – Tools and system support. PhD dissertation, ETH Zurich, Zurich.
Lee, Ming-Chi. 2009. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications 8: 130–141.
Liu, Ling. 2007. From data privacy to location privacy: Models and algorithms. In Proceedings of the 33rd international conference on very large data bases (VLBD), 1429–1430, Vienna, Austria.
Maisonneuve, Nicolas, Matthias Stevens, Maria E. Niessen, and Luc Steels. 2009. NoiseTube: Measuring and mapping noise pollution with mobile phones. In Proceedings of the 4th international symposium on information technologies in environmental engineering (ITEE), 215–228, Thessaloniki, Greece.
Marquardt, Philip, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM conference on computer and communications security (CCS), 551–562, Chicago, Illinois, USA.
Miluzzo, Emiliano, Nicholas D. Lane, Kristóf Fodor, Ronald Peterson, Hong Lu, Mirco Musolesi, Shane B. Eisenman, Xiao Zheng, and Andrew T. Campbell. 2008. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM con embedded network sensor systems (SenSys), 337–350, Raleigh, NC, Carolina.
Mohan, Prashanth, Venkata N. Padmanabhan, and Ramachandran Ramjee. 2008. Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys), 323–336, Raleigh, NC, Carolina.
Mun, Min, Sasank Reddy, Katie Shilton, Nathan Yau, and Jeff Burke. 2009. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th ACM international conference on mobile systems, applications, and services (MobiSys), 55–68, Kraków, Poland.
Rana, Rajib K., Chun T. Chou, Salil S. Kanhere, Nirupama Bulusu, and Wen Hu. 2010. Ear-Phone: An end-to-end participatory urban noise mapping system. In Proceedings of the 9th ACM/IEEE international conference on information processing in sensor networks (IPSN), 105–116, Stockholm, Sweden.
Shilton, Katie. 2009. Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM 52: 48–53.
Shilton, Katie, Jeff Burke, Deborah Estrin, Mark Hansen, and Mani B. Srivastava. 2008. Participatory privacy in urban sensing. In Proceedings of the international workshop on mobile devices and urban sensing (MODUS), 1–7, St. Louis, Missouri, USA.
Shin, Minho, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, and Nikos Triandopoulos. 2010. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing 7: 16–30.
Sweeney, Latanya. 2002. K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 10: 557–570.
Whitten, Alma, and J. D. Tygar. 1999. Why Johnny can’t Encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX security symposium (SSYM), 14–29, Washington, DC, USA.
Zibuschka, Jan, Lothar Fritsch, Mike Radmacher, Tobias Scherner, and Kai Rannenberg. 2007. Enabling privacy of real-life LBS: A platform for flexible mobile service provisioning. In Proceedings of the 22nd IFIP TC-11 international information security conference (SEC), 325–336, Sandton, South Africa.
Global GSM and 3GSM Mobile Connections. http://www.gsm.com. Accessed Feb 2012.
iPhone 4S Technical Specifications. http://www.apple.com. Accessed Feb 2012.
Sun SPOT Main Board Technical Datasheet. http://www.sunspotworld.com. Accessed Feb 2012.
TelosB Datasheet. http://www.memsic.com. Accessed Feb 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Christin, D., Hollick, M. (2013). Roadmap for Privacy Protection in Mobile Sensing Applications. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds) European Data Protection: Coming of Age. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5170-5_9
Download citation
DOI: https://doi.org/10.1007/978-94-007-5170-5_9
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5184-2
Online ISBN: 978-94-007-5170-5
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)