Abstract
In general, privacy can be viewed as the right to be left alone when desired (solitude), the right to remain anonymous (anonymity), and the right to confidentiality (secrecy of information). More specifically, location privacy is “the ability to prevent other parties from learning one’s current or past locations”. In this paper, we focus on two primitives that make up location privacy: identity information and location information. Identity information has to do with the static attributes and characteristics that uniquely identify a person. Information about an individual’s identity can also be inferred based upon their location at various times (in other words, their activities can give away identity information). The other type of information upon which we will focus, location information, deals specifically with the whereabouts of an individual or group. We will also describe location-aware applications and services and their relationship with location privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Onstar, http://www.onstar.com/us_english/jsp/explore/onstar_basics/technology.jsp
Guo, J., Baugh, J.P.: Security and Privacy in Vehicle Safety Communication Applications. SAE International (2005)
EZPass, http://www.ezpass.com
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. ACM Transactions on Information Systems 10(1), 91–102 (1992)
Getting, I.A.: The Global Positioning System. IEEE Spectrum 30(12), 36–47 (1993)
Ward, A., Jones, A., Hopper, A.: A New Location Technique for the Active Office. IEEE Pers. Communication 4(5), 42–47 (1997)
Priyantha, N.B., et al.: The Cricket Compass for Context-Aware Mobile Applications
Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket Location-Support System. In: 6th ACM National Conference on Mobile Computing and Networking (ACM MOBICOM), Boston, MA (August 2000)
Smith, A., et al.: Tracking Moving Devices with the Cricket Location System. In: ACM MobiSys (2004)
Layton, J., Brain, M., Tyson, J.: How Cell Phones Work, http://www.howstuffworks.com
Schneier On Security, http://www.schneier.com/blog/archives/2005/07/automatic_surve.html
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. In: Pervasive Computing, January-March 2003, p. 46. IEEE CS and IEEE Communications Society (2003)
Beresford, A.: Location Privacy in Ubiquitous Computing, Published in University of Cambridge Technical Report, UCAM-CL-TR-612 (January 2005)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)
Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access Configuration. In: DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, Naval Research Laboratory, Hilton Head, SC, vol. 1, pp. 34–40. IEEE CS Press, Los Alamitos (2000)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
Chaum, D., van Heijst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)
Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)
Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret: Theory and Applications of Ring Signatures (2004)
United States Privacy Act, 5 U.S.C. § 552a (1974), http://www.usdoj.gov/04foia/privstat.htm
United States Electronic Communications Privacy Act (1986), http://straylight.law.cornell.edu/uscode/html/uscode18/usc_sup_01_18_10_I_20_119.html
United States Wireless Communications and Public Safety Act (1999), http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.438.IH
Wireless Location Privacy: Law and Policy in the U.S., EU and Japan, http://www.isoc.org/briefings/015/
Campbell, R., et al.: Towards Security and Privacy for Pervasive Computing
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baugh, J.P., Guo, J. (2006). Location Privacy in Mobile Computing Environments. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_95
Download citation
DOI: https://doi.org/10.1007/11833529_95
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)