Skip to main content

Mind Your \((R, \varPhi )\)s: Location-Based Privacy Controls for Consumer Drones

  • Conference paper
  • First Online:
Security Protocols XXIII (Security Protocols 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Included in the following conference series:

  • 847 Accesses

Abstract

This position paper explores the threat to individual privacy due to the widespread use of consumer drones. Present day consumer drones are equipped with sensors such as cameras and microphones, and their types and numbers can be well expected to increase in future. Drone operators have absolute control on where the drones fly and what the on-board sensors record with no options for bystanders to protect their privacy. This position paper proposes a policy language that allows homeowners, businesses, governments, and privacy-conscious individuals to specify location access-control for drones, and discusses how these policy-based controls might be realized in practice. This position paper also explores the potential future problem of managing consumer drone traffic that is likely to emerge with increasing use of consumer drones for various tasks. It proposes a privacy preserving traffic management protocol for directing drones towards their respective destinations without requiring drones to reveal their destinations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://letsencrypt.org/.

References

  1. NOTAM number: FDC 0/8326. http://tfr.faa.gov/save_pages/detail_0_8326.html. Accessed 4 January 2015

  2. DJI Phantom 2 (2014). http://www.dji.com/product/phantom-2/feature. Accessed 3 January 2015

  3. Near-collisions between drones, airliners surge, new FAA reports show (2014). http://www.washingtonpost.com/world/national-security/near-collisions-between-drones-airliners-surge-new-faa-reports-show/2014/11/26/9a8c1716-758c-11e4-bd1b-03009bd3e984_story.html. Accessed 3 January 2015

  4. HEXO+ (2014). http://hexoplus.com. Accessed 3 January 2015

  5. IRIS+ (2014). https://store.3drobotics.com/products/iris. Accessed 3 January 2015

  6. No FLY zones (2014). http://www.dji.com/fly-safe/category-mc. Accessed 3 January 2015

  7. Parrot bebop drone (2014). http://www.parrot.com/usa/products/bebop-drone. Accessed 3 January 2015

  8. Blumenthal, J., Reichenbach, F., Timmermann, D.: Minimal transmission power vs. signal strength as distance estimation for localization in wireless sensor networks. In: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, SECON 2006, vol. 3, pp. 761–766, September 2006

    Google Scholar 

  9. Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low-cost outdoor localization for very small devices. IEEE Pers. Commun. 7(5), 28–34 (2000). ISSN 1070–9916

    Article  Google Scholar 

  10. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 15–26, New York (2011)

    Google Scholar 

  11. Carter, H., Lever, C., Traynor, P.: Whitewash: outsourcing garbled circuit generation for mobile devices (2014)

    Google Scholar 

  12. Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1–6, Berkeley (2010)

    Google Scholar 

  13. Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 61–69, New York (2004)

    Google Scholar 

  14. Han, D., Andersen, D.G., Kaminsky, M., Papagiannaki, K., Seshan, S.: Access point localization using local signal strength gradient. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 99–108. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 639–652. ACM, New York (2011)

    Google Scholar 

  16. Jana, S., Molnar, D., Moshchuk, A., Dunn, A., Livshits, B., Wang, H.J., Ofek, E.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pp. 415–430, Washington, DC (2013)

    Google Scholar 

  17. Matheus, A., Herrmann, J.: Geospatial extensible access control markup language (GeoXACML). Open Geospatial Consortium Inc., OGC (2008)

    Google Scholar 

  18. Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information. Computer and Communications Security, ASIACCS 2010, pp. 328–332, New York (2010)

    Google Scholar 

  19. Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An access control language for a general provenance model. In: Jonker, W., Petković, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 68–88. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Ribeiro, C., Ribeiro, C., Zúquete, A., Ferreira, P., Guedes, P.: SPL: an access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium, pp. 89–107 (1999)

    Google Scholar 

  21. Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H., Cowan, C.: User-driven access control: rethinking permission granting in modern operating systems. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 224–238, May 2012

    Google Scholar 

  22. Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1169–1181. ACM, New York (2014)

    Google Scholar 

  23. Shirley, J., Evans, D.: The user is not the enemy: fighting malware by tracking user intentions. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW 2008, pp. 33–45, New York (2008)

    Google Scholar 

  24. Stiegler, M., Karp, A.H., Yee, K.-P., Close, T., Miller, M.S.: Polaris: virus-safe computing for windows XP. Commun. ACM 49(9), 83–88 (2006)

    Article  Google Scholar 

  25. Xu, R., Saïdi, H., Anderson, R.: Aurasium: practical policy enforcement for android applications. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, pp. 27–27, Berkeley (2012)

    Google Scholar 

  26. Zhang, B., Al-Shaer, E., Jagadeesan, R., Riely, J., Pitcher, C.: Specifications of a high-level conflict-free firewall policy language for multi-domain networks. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, pp. 185–194, New York (2007)

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Science Foundation through grants CNS-1064986, CNS-1149832, CNS-1223825 and CNS-1445967. The views expressed are those of the authors and do not reflect the official policy or position of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Micah Sherr .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Vaidya, T., Sherr, M. (2015). Mind Your \((R, \varPhi )\)s: Location-Based Privacy Controls for Consumer Drones. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics