Skip to main content

Privacy for Profitable Location Based Services

  • Conference paper
Security in Pervasive Computing (SPC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3450))

Included in the following conference series:

Abstract

Location based services (LBS) are distributed multi-party infrastructures with the opportunity to generate profitable m-business applications. Also, LBS pose a great risk for their users’ privacy, as they have access to private information about a person’s whereabouts in a particular context. As location data is the essential input for LBS, protection of privacy in LBS is not a problem of providing anonymity by supressing data release, but a problem of identity management and control over information handling. In this paper we show a solution that ensures a LBS user’s control over location information with managed identities. At the same time, our solution enables profitable business models, e.g. for mobile telephony operators. Additionally, we provide fine-grained consent management for the LBS user.

This work was supported by the IST PRIME project; however, it represents the view of the authors only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Turowski, K., Pousttchi, K.: Mobile Commerce: Grundlagen und Techniken. Springer, Berlin (2004)

    Google Scholar 

  2. Camponovo, G., Pigneur, Y.: Business model analysis applied to mobile business. In: ICEIS 2003 (2003)

    Google Scholar 

  3. PRIME WP 14.0:PRIME Public Deliverable D14.0a Framework V0. Technical report (2004) , http://www.prime-project.eu.int

  4. Myllymaki, J., Edlund, S.: Location Aggregation from Multiple Sources. In: Society, I.C., ed.: Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), Singapore (2002)

    Google Scholar 

  5. Rose, F.: The economics, concept and design of information intermediaries - A theoretic approach. In: Information Age Economy. Physica-Verlag, Heidelberg (1999)

    Google Scholar 

  6. Barkhuus, L., Dey, A.: Location Based Services for Mobile Telephony: a study of users’ privacy concerns (2003)

    Google Scholar 

  7. Sheehan, K.: Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society 18, 21–32 (2002)

    Article  Google Scholar 

  8. Sheehan, K.B., Grubbs Hoy, M.: Dimensions of Privacy Concern among Online Consumers. Journal of Public Policy and Marketing 19, 62–73 (2000)

    Article  Google Scholar 

  9. Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace. Technical report (2000)

    Google Scholar 

  10. Marx, G.: What’s in a name? - Some reflections on the Sociology of Anonymity. The Information Society 15 (1999)

    Google Scholar 

  11. Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: IFIP TC 6 International Workshop on Personal Wireless Communications, Aachen, Verlag der Augustinus Buchhandlung, pp. 105–116 (1995)

    Google Scholar 

  12. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)

    Google Scholar 

  13. Camenish, J., van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System - Research Report RZ 3419. Technical report, Zürich (2002)

    Google Scholar 

  14. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  15. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31–42 (2003)

    Google Scholar 

  16. Ashley, P., Hada, S., Günter, K., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) - IBM Research Report. Technical report (2003), http://www.zurich.ibm.com/security/enterprise-privacy/epal/Specification/index.html

  17. Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification - W3C Recommendation. Technical report (2002)

    Google Scholar 

  18. Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA, pp. 48–57 (2001)

    Google Scholar 

  19. Jaisingh, J., Metha, S., Chaturvedi, A.: Privacy and Information Markets: An experimental study. In: PACIS,Volume Proceedings of the PACIS 2004, Shanghai (2004)

    Google Scholar 

  20. Acquisti, A.: Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. In: Camp, J.L., Lewis, S. (eds.) Economics of Information Security. Kluwer, Dordrecht (2004)

    Google Scholar 

  21. Oinonen, K.: TR101 - LIF Privacy Guidelines. (2002)

    Google Scholar 

  22. Müller, M.: Standards for Geographic Location and Privacy: IETF’s Geopriv. Datenschutz und Datensicherheit (DuD) 28, 297–303 (2004)

    Google Scholar 

  23. GSM Association: Location Based Services - Permanent Reference Document SE.23. Technical report (2003)

    Google Scholar 

  24. Marbrouk, M., et. al.: OpenGIS Location Services (OpenLS): Core Services (2004)

    Google Scholar 

  25. Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes Platform. Technical report, Lulea, Sweden (2002)

    Google Scholar 

  26. Huber, M., Dietl, T., Kammerl, J., Dornbusch, P.: Collecting and providing location information: The location trader. In: MoMuc, München, TU München (2003)

    Google Scholar 

  27. Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 205–219 (2001), http://drim.inf.tu-dresden.de/

    Google Scholar 

  28. Jendricke, U., tom Markotten, D.G.: Usability meets security - the identity-manager as your personal security assistant for the internet. In: Proceedings of 16th Annual Computer Security Applications Conference, New Orleans, USA (2000)

    Google Scholar 

  29. Kesdogan, D., Reichl, P., Junghärtchen, K.: Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 295–312. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  30. Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 216–230. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  31. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kölsch, T., Fritsch, L., Kohlweiss, M., Kesdogan, D. (2005). Privacy for Profitable Location Based Services. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32004-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25521-5

  • Online ISBN: 978-3-540-32004-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics