Abstract
Location based services (LBS) are distributed multi-party infrastructures with the opportunity to generate profitable m-business applications. Also, LBS pose a great risk for their users’ privacy, as they have access to private information about a person’s whereabouts in a particular context. As location data is the essential input for LBS, protection of privacy in LBS is not a problem of providing anonymity by supressing data release, but a problem of identity management and control over information handling. In this paper we show a solution that ensures a LBS user’s control over location information with managed identities. At the same time, our solution enables profitable business models, e.g. for mobile telephony operators. Additionally, we provide fine-grained consent management for the LBS user.
This work was supported by the IST PRIME project; however, it represents the view of the authors only.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Turowski, K., Pousttchi, K.: Mobile Commerce: Grundlagen und Techniken. Springer, Berlin (2004)
Camponovo, G., Pigneur, Y.: Business model analysis applied to mobile business. In: ICEIS 2003 (2003)
PRIME WP 14.0:PRIME Public Deliverable D14.0a Framework V0. Technical report (2004) , http://www.prime-project.eu.int
Myllymaki, J., Edlund, S.: Location Aggregation from Multiple Sources. In: Society, I.C., ed.: Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), Singapore (2002)
Rose, F.: The economics, concept and design of information intermediaries - A theoretic approach. In: Information Age Economy. Physica-Verlag, Heidelberg (1999)
Barkhuus, L., Dey, A.: Location Based Services for Mobile Telephony: a study of users’ privacy concerns (2003)
Sheehan, K.: Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society 18, 21–32 (2002)
Sheehan, K.B., Grubbs Hoy, M.: Dimensions of Privacy Concern among Online Consumers. Journal of Public Policy and Marketing 19, 62–73 (2000)
Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace. Technical report (2000)
Marx, G.: What’s in a name? - Some reflections on the Sociology of Anonymity. The Information Society 15 (1999)
Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: IFIP TC 6 International Workshop on Personal Wireless Communications, Aachen, Verlag der Augustinus Buchhandlung, pp. 105–116 (1995)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)
Camenish, J., van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System - Research Report RZ 3419. Technical report, Zürich (2002)
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31–42 (2003)
Ashley, P., Hada, S., Günter, K., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) - IBM Research Report. Technical report (2003), http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index.html
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification - W3C Recommendation. Technical report (2002)
Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA, pp. 48–57 (2001)
Jaisingh, J., Metha, S., Chaturvedi, A.: Privacy and Information Markets: An experimental study. In: PACIS,Volume Proceedings of the PACIS 2004, Shanghai (2004)
Acquisti, A.: Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. In: Camp, J.L., Lewis, S. (eds.) Economics of Information Security. Kluwer, Dordrecht (2004)
Oinonen, K.: TR101 - LIF Privacy Guidelines. (2002)
Müller, M.: Standards for Geographic Location and Privacy: IETF’s Geopriv. Datenschutz und Datensicherheit (DuD) 28, 297–303 (2004)
GSM Association: Location Based Services - Permanent Reference Document SE.23. Technical report (2003)
Marbrouk, M., et. al.: OpenGIS Location Services (OpenLS): Core Services (2004)
Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes Platform. Technical report, Lulea, Sweden (2002)
Huber, M., Dietl, T., Kammerl, J., Dornbusch, P.: Collecting and providing location information: The location trader. In: MoMuc, München, TU München (2003)
Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 205–219 (2001), http://drim.inf.tu-dresden.de/
Jendricke, U., tom Markotten, D.G.: Usability meets security - the identity-manager as your personal security assistant for the internet. In: Proceedings of 16th Annual Computer Security Applications Conference, New Orleans, USA (2000)
Kesdogan, D., Reichl, P., Junghärtchen, K.: Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 295–312. Springer, Heidelberg (1998)
Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 216–230. Springer, Heidelberg (2004)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kölsch, T., Fritsch, L., Kohlweiss, M., Kesdogan, D. (2005). Privacy for Profitable Location Based Services. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-32004-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25521-5
Online ISBN: 978-3-540-32004-3
eBook Packages: Computer ScienceComputer Science (R0)