Skip to main content

Towards a Privacy Risk Assessment Methodology for Location-Based Systems

  • Conference paper
  • First Online:
Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous 2013)

Abstract

Mobiquitous systems are gaining more and more weight in our daily lives. They are becoming a reality from our home and work to our leisure. The use of Location-Based Services (LBS) in these systems is increasingly demanded by users. Yet, while on one hand they enable people to be more “connected”, on the other hand, they may expose people to serious privacy issues. The design and deployment of Privacy-Enhancing Technologies (PETs) for LBS has been widely addressed in the last years. However, strikingly, there is still a lack of methodologies to assess the risk that using LBS may have on users’ privacy (even when PETs are considered). This paper presents the first steps towards a privacy risk assessment methodology to (i) identify (ii) analyse, and (iii) evaluate the potential privacy issues affecting mobiquitous systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1–5 (2013)

    Article  Google Scholar 

  2. Dobson, J., Fisher, P.: Geoslavery. IEEE Technol. Soc. Mag. 22(1), 47–52 (2003)

    Article  Google Scholar 

  3. European Commission. Proposal for a regulation of the european parliament and of the council on the protection of individuals (2012)

    Google Scholar 

  4. Gambs, S., Killijian, M.-O., del Prado Cortez, M.N.: Show me how you move and I will tell you who you are. Trans. Data Priv. 4(2), 103–126 (2011)

    MathSciNet  Google Scholar 

  5. Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, pp. 91–100. ACM (2004)

    Google Scholar 

  6. ISO27005. Information technology - security techniques - information security risk management. International Standard Organisation (2008)

    Google Scholar 

  7. Melchers, R.E.: On the ALARP approach to risk management. Reliab. Eng. Syst. Saf. 71(2), 201–208 (2001)

    Article  Google Scholar 

  8. Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB ’06, VLDB Endowment, pp. 763–774 (2006)

    Google Scholar 

  9. NIST800-30. Information security, guide for conducting risk assessments. U.S. Department of Commerce, NIST) (2011)

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by the ANR French project AMORES (ANR-11-INSE-010) and the Intel Doctoral Student Honour Programme 2012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jesús Friginal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Friginal, J., Guiochet, J., Killijian, MO. (2014). Towards a Privacy Risk Assessment Methodology for Location-Based Systems. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11569-6_65

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11568-9

  • Online ISBN: 978-3-319-11569-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics