Skip to main content

A Formal Model of Obfuscation and Negotiation for Location Privacy

  • Conference paper
Pervasive Computing (Pervasive 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3468))

Included in the following conference series:

Abstract

Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. In this paper, we argue that obfuscation is an important technique for protecting an individual’s location privacy within a pervasive computing environment. The paper sets out a formal framework within which obfuscated location-based services are defined. This framework provides a computationally efficient mechanism for balancing an individual’s need for high-quality information services against that individual’s need for location privacy. Negotiation is used to ensure that a location-based service provider receives only the information it needs to know in order to provide a service of satisfactory quality. The results of this work have implications for numerous applications of mobile and location-aware systems, as they provide a new theoretical foundation for addressing the privacy concerns that are acknowledged to be retarding the widespread acceptance and use of location-based services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, M.S., Crannor, L.F., Reagle, J.: Privacy in e-commerce: Examining user scenarios and privacy preferences. In: Proc. 1st ACM conference on Electronic Commerce, pp. 1–8. ACM Press, New York (1999)

    Chapter  Google Scholar 

  2. Ackerman, M.S., Darrell, T., Weitzner, D.J.: Privacy in context. Human Computer Interaction 16(2, 3, & 4), 167–176 (2001)

    Article  Google Scholar 

  3. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  4. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation Onion router. In: Proc. 13th USENIX Security Symposium (2004)

    Google Scholar 

  5. Duckham, M., Kulik, L., Worboys, M.F.: Imprecise navigation. Geoinformatica 7(2), 79–94 (2003)

    Article  Google Scholar 

  6. Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Computers, Environment and Urban Systems 25, 89–103 (2001)

    Article  Google Scholar 

  7. Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.-M.: Framework for security and privacy in automotive telematics. In: Proc. 2nd International Workshop on Mobile Commerce, pp. 25–32. ACM Press, New York (2002)

    Chapter  Google Scholar 

  8. Espinoza, F., Persson, P., Sandin, A., Nyström, H., Cacciatore, E., Bylund, M.: GeoNotes: Social and navigational aspects of location-based information systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 2–17. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. General Assembly of the United Nations. Universal declaration of human rights. United Nations Resolution 217 A (III) (December 1948)

    Google Scholar 

  10. Görlach, W.W., Terpstra, A., Heinemann, A.: Survey on location privacy in pervasive computing. In: Proc. First Workshop on Security and Privacy at the Conference on Pervasive Computing, SPPC (2004)

    Google Scholar 

  11. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. MobiSys 2003, pp. 31–42 (2003)

    Google Scholar 

  12. Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 10–24. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Gunter, C.A., May, M.J., Stubblebine, S.G.: A formal privacy systems and its application to location based services. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 256–282. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Hightower, J., Boriello, G.: Location systems for ubiquitous computing. IEEE Computer 34(8), 57–66 (2001)

    Google Scholar 

  15. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM Press, New York (2004)

    Chapter  Google Scholar 

  16. Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proc. ACM conference on Computer Supported Cooperative Work, pp. 248–257. ACM Press, New York (1996)

    Chapter  Google Scholar 

  17. Hutter, D., Stephan, W., Ullmann, M.: Security and privacy in pervasive computing: State of the art and future directions. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 285–289. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Kaasinen, E.: User needs for location-aware mobile services. Personal and Ubiquitous Computing (2003)

    Google Scholar 

  19. Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  21. Marmasse, N., Schmandt, C.: Location-aware information delivery with com- Motion. In: Proceedings 2nd International Symposium on Handheld and Ubiquitous Computing (HUC), Bristol, UK, pp. 157–171 (2000)

    Google Scholar 

  22. Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  23. Onsrud, H.J., Johnson, J., Lopez, X.: Protecting personal privacy in using geographic information systems. Photogrammetric Engineering and Remote Sensing 60(9), 1083–1095 (1994)

    Google Scholar 

  24. Peterson, J.: A presence-based GEOPRIV location object format (September 2004), http://www.ietf.org/internet-drafts/draft-ietf-geopriv-pidf-lo-03.txt

  25. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Google Scholar 

  26. Rodden, T., Friday, A., Muller, H., Dix, A.: A lightweight approach to managing privacy in location-based services. Technical Report Equator-02-058, University of Nottingham, Lancaster University, University of Bristol (2002)

    Google Scholar 

  27. Schilit, B., Hong, J., Gruteser, M.: Wireless location privacy protection. IEEE Computer 36(12), 135–137 (2003)

    Google Scholar 

  28. Sedgewick, R.: Algorithms in Java, Part 5: Graph Algorithms, 3rd edn. Addison Wesley, Reading (2003)

    Google Scholar 

  29. Snekkenes, E.: Concepts for personal location privacy policies. In: Proc. 3rd ACM conference on Electronic Commerce, pp. 48–57. ACM Press, New York (2001)

    Chapter  Google Scholar 

  30. Worboys, M.F.: Event-oriented aproaches to geographic phenomena. International Journal of Geographic Information Science (2005) (in press)

    Google Scholar 

  31. Worboys, M.F., Clementini, E.: Integration of imperfect spatial information. Journal of Visual Languages and Computing 12, 61–80 (2001)

    Article  Google Scholar 

  32. Worboys, M.F., Duckham, M.: GIS: A Computing Perspective, 2nd edn. CRC Press, Boca Raton (2004)

    Google Scholar 

  33. Worboys, M.F., Duckham, M., Kulik, L.: Commonsense notions of proximity and direction in an environmental space. Spatial cognition and computation (2004) (accepted)

    Google Scholar 

  34. Worboys, M.F.: Nearness relations in environmental space. International Journal of Geographical Information Science 15(7), 633–651 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Duckham, M., Kulik, L. (2005). A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.W., Want, R., Schmidt, A. (eds) Pervasive Computing. Pervasive 2005. Lecture Notes in Computer Science, vol 3468. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11428572_10

Download citation

  • DOI: https://doi.org/10.1007/11428572_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26008-0

  • Online ISBN: 978-3-540-32034-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics