Abstract
Safeguarding location privacy is becoming a critical issue in location-based services and location-aware computing generally. Two drawbacks of many previous models of location privacy are: 1) the models only consider a person’s location privacy protection, but not the invasion of location privacy by external agents; and 2) the models are static and do not consider the spatiotemporal aspects of movement. We argue that, to be complete, any model of location privacy needs to enable the analysis and identification of techniques both to protect and to invade an individual’s location privacy over time. One way to protect an individual’s location privacy is to minimize the information revealed about a person’s location, termed obfuscation. This paper presents an explicitly spatiotemporal model of location privacy that models a third party’s limited knowledge of a mobile individual’s location. We identify two core strategies that a third party can use to refine its knowledge, so potentially invading that mobile individual’s location privacy. A global refinement strategy uses the entire history of knowledge about an agent’s location in a single step. A local refinement strategy iteratively constructs refined knowledge over time. We present a formal model of global and local refinement operators, and show how this formal model can be translated into a computational model in a simulation environment.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (2001)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation Onion router. In: Proc. 13th USENIX Security Symposium (2004)
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005)
Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Drummond, J., Billen, R., Forrest, D., João, E. (eds.) Dynamic and Mobile GIS: Investigating Change in Space and Time, vol. 3, CRC Press, Boca Raton (2006)
Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.-M.: Framework for security and privacy in automotive telematics. In: Proc. 2nd International Workshop on Mobile Commerce, pp. 25–32. ACM Press, New York (2002)
Espinoza, F., Persson, P., Sandin, A., Nyström, H., Cacciatore, E., Bylund, M.: GeoNotes: Social and navigational aspects of location-based information systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 2–17. Springer, Heidelberg (2001)
Görlach, W.W., Terpstra, A., Heinemann, A.: Survey on location privacy in pervasive computing. In: Proc. First Workshop on Security and Privacy at the Conference on Pervasive Computing (SPPC) (2004)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. MobiSys 2003, pp. 31–42 (2003)
Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 10–24. Springer, Heidelberg (2004)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proc. 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189. ACM Press, New York (2004)
Jensen, C.S.: Database aspects of location-based services. In: Schiller, J., Voisard, A. (eds.) Location-based services, ch. 5, pp. 27–39. Morgan Kaufmann, San Francisco (2004)
Kaasinen, E.: User needs for location-aware mobile services. Personal and Ubiquitous Computing 7(1), 70–79 (2003)
Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Muntz, R.R., Barclay, T., Dozier, J., Faloutsos, C., Maceachren, A.M., Martin, J.L., Pancake, C.M., Satyanarayanan, M.: IT Roadmap to a Geospatial Future. The National Academies Press, Washington (2003)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Schilit, B.N., Hong, J.I., Gruteser, M.: Wireless location privacy protection. IEEE Computer 36(12), 135–137 (2003)
Snekkenes, E.: Concepts for personal location privacy policies. In: Proc. 3rd ACM conference on Electronic Commerce, pp. 48–57. ACM Press, New York (2001)
Westin, A.F.: Privacy and freedom. Atheneum, New York (1967)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Duckham, M., Kulik, L., Birtley, A. (2006). A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection. In: Raubal, M., Miller, H.J., Frank, A.U., Goodchild, M.F. (eds) Geographic Information Science. GIScience 2006. Lecture Notes in Computer Science, vol 4197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11863939_4
Download citation
DOI: https://doi.org/10.1007/11863939_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44526-5
Online ISBN: 978-3-540-44528-9
eBook Packages: Computer ScienceComputer Science (R0)