Abstract
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. In this paper, we argue that obfuscation is an important technique for protecting an individual’s location privacy within a pervasive computing environment. The paper sets out a formal framework within which obfuscated location-based services are defined. This framework provides a computationally efficient mechanism for balancing an individual’s need for high-quality information services against that individual’s need for location privacy. Negotiation is used to ensure that a location-based service provider receives only the information it needs to know in order to provide a service of satisfactory quality. The results of this work have implications for numerous applications of mobile and location-aware systems, as they provide a new theoretical foundation for addressing the privacy concerns that are acknowledged to be retarding the widespread acceptance and use of location-based services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ackerman, M.S., Crannor, L.F., Reagle, J.: Privacy in e-commerce: Examining user scenarios and privacy preferences. In: Proc. 1st ACM conference on Electronic Commerce, pp. 1–8. ACM Press, New York (1999)
Ackerman, M.S., Darrell, T., Weitzner, D.J.: Privacy in context. Human Computer Interaction 16(2, 3, & 4), 167–176 (2001)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation Onion router. In: Proc. 13th USENIX Security Symposium (2004)
Duckham, M., Kulik, L., Worboys, M.F.: Imprecise navigation. Geoinformatica 7(2), 79–94 (2003)
Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Computers, Environment and Urban Systems 25, 89–103 (2001)
Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.-M.: Framework for security and privacy in automotive telematics. In: Proc. 2nd International Workshop on Mobile Commerce, pp. 25–32. ACM Press, New York (2002)
Espinoza, F., Persson, P., Sandin, A., Nyström, H., Cacciatore, E., Bylund, M.: GeoNotes: Social and navigational aspects of location-based information systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 2–17. Springer, Heidelberg (2001)
General Assembly of the United Nations. Universal declaration of human rights. United Nations Resolution 217 A (III) (December 1948)
Görlach, W.W., Terpstra, A., Heinemann, A.: Survey on location privacy in pervasive computing. In: Proc. First Workshop on Security and Privacy at the Conference on Pervasive Computing, SPPC (2004)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. MobiSys 2003, pp. 31–42 (2003)
Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 10–24. Springer, Heidelberg (2004)
Gunter, C.A., May, M.J., Stubblebine, S.G.: A formal privacy systems and its application to location based services. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 256–282. Springer, Heidelberg (2005)
Hightower, J., Boriello, G.: Location systems for ubiquitous computing. IEEE Computer 34(8), 57–66 (2001)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM Press, New York (2004)
Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proc. ACM conference on Computer Supported Cooperative Work, pp. 248–257. ACM Press, New York (1996)
Hutter, D., Stephan, W., Ullmann, M.: Security and privacy in pervasive computing: State of the art and future directions. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 285–289. Springer, Heidelberg (2004)
Kaasinen, E.: User needs for location-aware mobile services. Personal and Ubiquitous Computing (2003)
Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Marmasse, N., Schmandt, C.: Location-aware information delivery with com- Motion. In: Proceedings 2nd International Symposium on Handheld and Ubiquitous Computing (HUC), Bristol, UK, pp. 157–171 (2000)
Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. Pervasive Computing 2(1), 56–64 (2003)
Onsrud, H.J., Johnson, J., Lopez, X.: Protecting personal privacy in using geographic information systems. Photogrammetric Engineering and Remote Sensing 60(9), 1083–1095 (1994)
Peterson, J.: A presence-based GEOPRIV location object format (September 2004), http://www.ietf.org/internet-drafts/draft-ietf-geopriv-pidf-lo-03.txt
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Rodden, T., Friday, A., Muller, H., Dix, A.: A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham, Lancaster University, University of Bristol (2002)
Schilit, B., Hong, J., Gruteser, M.: Wireless location privacy protection. IEEE Computer 36(12), 135–137 (2003)
Sedgewick, R.: Algorithms in Java, Part 5: Graph Algorithms, 3rd edn. Addison Wesley, Reading (2003)
Snekkenes, E.: Concepts for personal location privacy policies. In: Proc. 3rd ACM conference on Electronic Commerce, pp. 48–57. ACM Press, New York (2001)
Worboys, M.F.: Event-oriented aproaches to geographic phenomena. International Journal of Geographic Information Science (2005) (in press)
Worboys, M.F., Clementini, E.: Integration of imperfect spatial information. Journal of Visual Languages and Computing 12, 61–80 (2001)
Worboys, M.F., Duckham, M.: GIS: A Computing Perspective, 2nd edn. CRC Press, Boca Raton (2004)
Worboys, M.F., Duckham, M., Kulik, L.: Commonsense notions of proximity and direction in an environmental space. Spatial cognition and computation (2004) (accepted)
Worboys, M.F.: Nearness relations in environmental space. International Journal of Geographical Information Science 15(7), 633–651 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Duckham, M., Kulik, L. (2005). A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.W., Want, R., Schmidt, A. (eds) Pervasive Computing. Pervasive 2005. Lecture Notes in Computer Science, vol 3468. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11428572_10
Download citation
DOI: https://doi.org/10.1007/11428572_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26008-0
Online ISBN: 978-3-540-32034-0
eBook Packages: Computer ScienceComputer Science (R0)