Skip to main content

A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

Information technology and modern challenges in civil protection create many questions concerning infrastructure security and reliability. In particular, mobile communications and the spread of mobile phones among citizens offer new opportunities of fine-grained disaster management using location based services (LBS). At the same time, location based services are regarded as very privacy-invading, and are regulated in many countries by law. In our article, we analyze the requirements of a LBS based disaster management scenario and propose a solution on how to build a privacy-friendly, multilaterally secure disaster management infrastructure based on robust, mobile phone infrastructures with high reachability of citizens and the possibility to manage disaster specialists.

This work was supported by the IST PRIME project; however, it represents the view of the authors only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. AGBF-NRW: Planungsgrundlage zur Warnung der Bevölkerung bei Gefahrenlage (2003), http://www.agbf-nrw.net/ak/zuk/warnung-bei-gefahr.pdf

  2. Barkhuus, L., Dey, A.: Location Based Services for Mobile Telephony: a study of users’ privacy concerns (2003)

    Google Scholar 

  3. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  4. Borking, J.: Der Identity Protector. Datenschutz und Datensicherheit (DuD) 20, 654–658 (1996)

    Google Scholar 

  5. Buchta, A.(ed.): Legel Requirements - part 1 of Deliverable 1.1a of IST PRIME EU project (2004) http://www.prime-project.eu.org/public/prime_products/deliverables/pub_del_D01.1.a.part1_ec_wp01.1_V2_final.pdf

  6. European Comission:Directive 2002/58/EC of the European Parliament and of the council, July 12 (2002), http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/l_201/l_20120020731en00370047.pdf

  7. Gerpott, T.J., Walter, A.: Operative und Finanzielle Bewertung von TETRA-, Tetrapol und GSM - BOS Plattformen für das digitale BOS-Mobilfunknetz (2004), http://www.dialogconsult.com/DCNL/PDF/DCNL020b.PDF

  8. Grimm, M.: Sichere transaktionsbasierte Behördenalarmierungssysteme auf GSM-Basis,Lehrstuhl für M-COmmerce und Mehrseitige Sicherheit,Johann Wolfgang Goethe-Universität,Frankfurt am Main (2004)

    Google Scholar 

  9. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: First International Conference on Mobile Systems, Applications, and Services, MobiSys 2003 (2003)

    Google Scholar 

  10. Held, V.: Technologische Möglichkeiten einer möglichst frühzeitigen Warnung der Bevölkerung, in Schriftenreihe der Schutzkommission beim Bundesminister des Inneren; Vol. 45 (Neue Folge), (ed.) by Bundesminister des Inneren (Bonn 2001)

    Google Scholar 

  11. ISO: ISO 15408 The Common Criteria for Information Security Evaluation (1999)

    Google Scholar 

  12. Muntermann, J., Rossnagel, H., Rannenberg, K.: Potentiale und Sicherheitsan- forderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen, in E-Science und GRID, Ad-hoc-Netze und Medienintegration; Proceedings der 18. DFN-Arbeitstagung über Kommunikationsnetze; Vol. 55, von Knop, J., Haverkamp, W., Jessen, E.(eds):(Gesellschaft für Informatik (GI), Bonn, pp.361-376 (2004)

    Google Scholar 

  13. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location Based Applications. IEEE Pervasive Computing 2, 56–64 (2003)

    Article  Google Scholar 

  14. Rannenberg, K.: Multilateral Security - A concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradims Workshop, pp. 151–162. ACM Press, Cork (2000)

    Google Scholar 

  15. Rossnagel, H.: Mobile Qualified Electronic Signatures and Certification on Demand. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 274–286. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Snekkenes, E.: Concepts for personal location privacy policies. In: 3rd ACM Concerence on Electronic Commerce, Tampa, Florida, USA (2001)

    Google Scholar 

  17. The United Nations:Universal Declaration of Human Rights, December 10 (1948), http://www.unhchr.ch/udhr/lang/eng.htm

  18. Yoshimura, F.: Disaster Risk Management Through Hazards Analysis. In: International Seminar on Disaster Preparedness and Mitigation, New Dehli (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fritsch, L., Scherner, T. (2005). A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_129

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_129

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics