Skip to main content

On Usable Location Privacy for Android with Crowd-Recommendations

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8564))

Abstract

The boom of smart devices with location capabilities has also led to a boom of apps that use location data for many different purposes. While there are of course apps that require users’ precise locations, such as navigation apps, many apps would work equally well with less precision. Currently, apps that request location information are granted access to location data with maximum precision or not at all. In this work we present a location obfuscation approach for Android devices, which focuses on the usability aspects. Based on results of focus group discussions (n,=,19) we designed and implemented a solution that can be used by even unskilled users. When an app requests for location data the first time, the user configures accuracy of location data that is to be revealed to the app by selecting one of five precision levels. Unskilled users are supported by crowd-based recommendations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beede, R., Warbritton, D., Han, R.: Myshield: Protecting mobile device data via security circles. Tech. Rep. CU-CS-1091-12, Univ. of Colorado Boulder (2012)

    Google Scholar 

  2. Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15(7), 679–694 (2011)

    Article  Google Scholar 

  3. Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: Mockdroid: Trading privacy for application functionality on smartphones. In: Proc. HotMobile 2011, pp. 49–54. ACM (2011)

    Google Scholar 

  4. Brush, A.B., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proc. UbiComp 2010, pp. 95–104. ACM (2010)

    Google Scholar 

  5. Fisher, D., Dorner, L., Wagner, D.: Location Privacy: User Behavior In The Field. In: Proc. SPSM 2012, pp. 51–56. ACM (2012)

    Google Scholar 

  6. Henne, B., Kater, C., Brenner, M., Smith, M.: Selective cloaking: Need-to-know for location-based apps. In: Proc. PST 2013. IEEE (2013)

    Google Scholar 

  7. Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proc. CCS 2011, pp. 639–652. ACM (2011)

    Google Scholar 

  8. Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proc. UbiComp 2012, pp. 501–510. ACM (2012)

    Google Scholar 

  9. Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proc. CHI 2012, pp. 391–394. ACM (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Henne, B., Kater, C., Smith, M. (2014). On Usable Location Privacy for Android with Crowd-Recommendations. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08593-7_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08592-0

  • Online ISBN: 978-3-319-08593-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics