Abstract
Recently, a universally unique identifier (UUID) for targeting ad services is supported by a smartphone OS, which can be reset and/or halted by a user. However, when a user resets the UUID, all targeted ad libraries are initialized. It means that the user cannot control ad libraries one at a time. As the user interests managed by the same UUID are easily exchanged between the ad service provider and another ad service provider, the user is anxious about the privacy violation. In addition, as the UUID can be tapped on the unencrypted network, the replay attack using the tapped UUID violates the user’s privacy. In this paper, we propose a privacy enhanced UUID that is generated by each ad service provider. As the UUID is encrypted with the time information by each access, the value of “Enc(Time, UUID)” is changed frequently. Thus, we call it an ephemeral UUID. The ephemeral UUID is shared through the same ad libraries in any applications, but it cannot be shared through the other ad libraries. Our UUID can be reset by the user and cannot be extracted on the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
MIC, Japan: Smartphone Privacy Initiative (2012), http://www.soumu.go.jp/main_sosiki/joho_tsusin/eng/presentation/pdf/Initiative.pdf
Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating User Privacy in Android Ad Libraries. IEEE Mobile Security Technologies (2012)
AdLantis, http://sp.www.adlantis.jp/
i-mobile, http://i-mobile.co.jp/en/index.aspx
Nend, http://nend.net/
Admob by Google, http://www.google.com/ads/admob/
Farahat, A., Sunnyvale, Bailey, M.C.: How effective is targeted advertising? In: 21st International Conference on World Wide Web, pp. 111–120 (2012)
European Commission: A comprehensive approach on personal data protection in the European Union: Right to be Forgotten (2010), http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf
European Commission’s data protection reform (2013), http://ec.europa.eu/commission_2010-2014/reding/pdf/news/20131022-libe-data-protection_en.pdf
Federal Trade Commission (FTC): Endorses ‘Do Not Track’ to facilitate consumer choice about online tracking (2010), http://www.ftc.gov/opa/2010/12/privacyreport.shtm
FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising (2009), http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf
Do Not Track: Implementations, http://donottrack.us/implementations
iOS Developer Library, ASIdentifierManager Class Reference, http://developer.apple.com/library/ios/documentation/AdSupport/Reference/ASIdentifierManager_Ref/ASIdentifierManagerhtml//apple_ref/doc/uid/TP40012654
Android advertising ID, http://developer.android.com/google/play-services/id.html
Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app advertisements. In: ACM Conference on Security and Privacy in Wireless and Mobile Network, pp. 101–112 (2012)
Wireshark, http://www.wireshark.org/
AdTruth, Device Fingerprinting, http://www.adtruth.com/buzz/press/cookie-less-tracking-device-fingerprinting-vs-device-identification-technology
MIC, Japan: Smartphone Privacy Initiative II (2013), http://www.soumu.go.jp/main_sosiki/joho_tsusin/eng/presentation/pdf/Summary_II.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Takemori, K., Matsui, T., Kawabata, H., Kubota, A. (2014). Ephemeral UUID for Protecting User Privacy in Mobile Advertisements. In: Decker, H., Lhotská, L., Link, S., Spies, M., Wagner, R.R. (eds) Database and Expert Systems Applications. DEXA 2014. Lecture Notes in Computer Science, vol 8645. Springer, Cham. https://doi.org/10.1007/978-3-319-10085-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-10085-2_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10084-5
Online ISBN: 978-3-319-10085-2
eBook Packages: Computer ScienceComputer Science (R0)