Skip to main content

Location Privacy in Mobile Computing Environments

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

Abstract

In general, privacy can be viewed as the right to be left alone when desired (solitude), the right to remain anonymous (anonymity), and the right to confidentiality (secrecy of information). More specifically, location privacy is “the ability to prevent other parties from learning one’s current or past locations”. In this paper, we focus on two primitives that make up location privacy: identity information and location information. Identity information has to do with the static attributes and characteristics that uniquely identify a person. Information about an individual’s identity can also be inferred based upon their location at various times (in other words, their activities can give away identity information). The other type of information upon which we will focus, location information, deals specifically with the whereabouts of an individual or group. We will also describe location-aware applications and services and their relationship with location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Onstar, http://www.onstar.com/us_english/jsp/explore/onstar_basics/technology.jsp

  2. Guo, J., Baugh, J.P.: Security and Privacy in Vehicle Safety Communication Applications. SAE International (2005)

    Google Scholar 

  3. EZPass, http://www.ezpass.com

  4. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. ACM Transactions on Information Systems 10(1), 91–102 (1992)

    Article  Google Scholar 

  5. Getting, I.A.: The Global Positioning System. IEEE Spectrum 30(12), 36–47 (1993)

    Article  Google Scholar 

  6. Ward, A., Jones, A., Hopper, A.: A New Location Technique for the Active Office. IEEE Pers. Communication 4(5), 42–47 (1997)

    Article  Google Scholar 

  7. Priyantha, N.B., et al.: The Cricket Compass for Context-Aware Mobile Applications

    Google Scholar 

  8. Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket Location-Support System. In: 6th ACM National Conference on Mobile Computing and Networking (ACM MOBICOM), Boston, MA (August 2000)

    Google Scholar 

  9. Smith, A., et al.: Tracking Moving Devices with the Cricket Location System. In: ACM MobiSys (2004)

    Google Scholar 

  10. Layton, J., Brain, M., Tyson, J.: How Cell Phones Work, http://www.howstuffworks.com

  11. Schneier On Security, http://www.schneier.com/blog/archives/2005/07/automatic_surve.html

  12. http://www.thenewspaper.com/news/06/696.asp

  13. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. In: Pervasive Computing, January-March 2003, p. 46. IEEE CS and IEEE Communications Society (2003)

    Google Scholar 

  14. Beresford, A.: Location Privacy in Ubiquitous Computing, Published in University of Cambridge Technical Report, UCAM-CL-TR-612 (January 2005)

    Google Scholar 

  15. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)

    Google Scholar 

  16. Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access Configuration. In: DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, Naval Research Laboratory, Hilton Head, SC, vol. 1, pp. 34–40. IEEE CS Press, Los Alamitos (2000)

    Chapter  Google Scholar 

  17. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  18. Chaum, D., van Heijst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  19. Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, Springer, Heidelberg (1994)

    Google Scholar 

  20. Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)

    Google Scholar 

  21. Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)

    Google Scholar 

  22. Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret: Theory and Applications of Ring Signatures (2004)

    Google Scholar 

  23. United States Privacy Act, 5 U.S.C. § 552a (1974), http://www.usdoj.gov/04foia/privstat.htm

  24. United States Electronic Communications Privacy Act (1986), http://straylight.law.cornell.edu/uscode/html/uscode18/usc_sup_01_18_10_I_20_119.html

  25. United States Wireless Communications and Public Safety Act (1999), http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.438.IH

  26. Wireless Location Privacy: Law and Policy in the U.S., EU and Japan, http://www.isoc.org/briefings/015/

  27. Campbell, R., et al.: Towards Security and Privacy for Pervasive Computing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baugh, J.P., Guo, J. (2006). Location Privacy in Mobile Computing Environments. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_95

Download citation

  • DOI: https://doi.org/10.1007/11833529_95

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics