Skip to main content

Privacy and Security in Spatiotemporal Data and Trajectories

  • Chapter
Mobility, Data Mining and Privacy

The European directive 2002/58/EC requires providers of public communication networks and electronic communication services to adopt techniques to ensure data security and privacy. This directive states, among others, that “the provider of a publicly available electronic communication service must take appropriate technical and organizational measures to safeguard the security of its services having regard to the state of the art,” and also that “when location data relating to users can be processed, such data can only be processed when they are made anonymous or with the consent of the user.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Databases (VLDB’02), pp. 143–154, 2002.

    Google Scholar 

  2. V. Atluri and S.A. Chun. An authorization model for geospatial data. IEEE Transactions Dependable Security Computing, 1(4):238–254, 2004.

    Article  Google Scholar 

  3. V. Atluri and P. Mazzoleni. Uniform indexing for geospatial data and authorizations. In Proceedings of the 16th Conference on Database Security (DBSEC’02), pp. 207–218, 2002.

    Google Scholar 

  4. A. Belussi, E. Bertino, B. Catania, M.L. Damiani, and A. Nucita. An authorization model for geographical maps. In Proceedings of the 12th International Workshop on Geographic Information Systems (GIS’04), pp. 82–91, 2004.

    Google Scholar 

  5. A.R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46–55, 2003.

    Article  Google Scholar 

  6. A.R. Beresford and F. Stajano. Mix zones: user privacy in location-aware services. In Proceedings of the Second Conference on Pervasive Computing and Communications Workshops (PERCOM’04), pp. 127–131, 2004.

    Google Scholar 

  7. E. Bertino, B. Catania, M.L. Damiani, and P. Perlasca. GEO-RBAC: a spatially aware RBAC. In Proceedings of the 10th Symposium on Access Control Models and Technologies (SACMAT’05), pp. 29–37, 2005.

    Google Scholar 

  8. E. Bertino, M.L. Damiani, and D. Momini. An access control system for a web map management service. In Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE 2004), pp. 33–39, 2004.

    Google Scholar 

  9. C. Bettini, X.S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Proceedings of the Second VLDB Workshop on Secure Data Management (SDM’05), pp. 185–199, 2005.

    Google Scholar 

  10. M. Bishop. Introduction to Computer Security. Addison-Weslay, Reading, MA, 2005.

    Google Scholar 

  11. D. Boneh and M.K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference (CRYPTO’01), pp. 213–229, 2001.

    Google Scholar 

  12. D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65–75, 1988.

    Article  MATH  MathSciNet  Google Scholar 

  13. M. Covington, W. Long, S. Srinivasan, A.K. Dev, M. Ahamad, and G.D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the 6th Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10–20, 2001.

    Google Scholar 

  14. L. Cranor, M. Langheinrich, and M. Marchiori. A P3P preference exchange language 1.0 (APPEL 1.0), April 2002.

    Google Scholar 

  15. L. Cranor, M. Langheinrich, and M. Marchiori. The platform for privacy preferences 1.0 (P3P1.0), April 2002.

    Google Scholar 

  16. M. Damiani and E. Bertino. Access control and privacy in location-aware services for mobile organizations. In Proceedings of the Seventh International Conference on Mobile Data Management (MDM’06), pp. 11–21, 2006.

    Google Scholar 

  17. M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of the Third International Conference on Pervasive Computing (Pervasive’05), pp. 152–170, 2005.

    Google Scholar 

  18. C. Ellison, B. Frank, B. Lamson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Cerificates Theory. RFC 2693, September 1999.

    Google Scholar 

  19. S. Fu and C.-Z. Xu. A coordinated spatio-temporal access control model for mobile computing in coalition environments. In Proceedings of the 9th International Parallel and Distributed Processing Symposium(IPDPS’05), 2005.

    Google Scholar 

  20. B.G. Gedik and L. Liu. A customizable K-anonymity model for protecting location privacy. Technical Report GIT-CERCS-04-15, Georgia Institute of Technology, April 2004.

    Google Scholar 

  21. B. Gedik and L. Liu. Location privacy in mobile systems: a personalized anonymization model. In Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS’05), pp. 620–629, 2005

    Google Scholar 

  22. C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’02), pp. 548–566, 2002.

    Google Scholar 

  23. Global spatial data infrastructure association (gsdi). http://www.gsdi.org/.

  24. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys’03), 2003.

    Google Scholar 

  25. M. Gruteser and X. Liu. Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy Magazine, 2(2):28–34, 2004.

    Article  Google Scholar 

  26. F. Hansen and V. Oleshchuk. Spatial role-based access control model for wireless networks. In Proceedings of the Vehicular Technology Conference (VTC’03), pp. 2093–2097, 2003.

    Google Scholar 

  27. C. Hauser and M. Kabatnik. Towards privacy support in a global location service. In Proceedings of the IFIP Workshop on IP and ATM Traffic Management, pp. 81–89, 2001.

    Google Scholar 

  28. U. Hengartner and P. Steenkiste. Protecting access to people location information. In Proceedings of the First International Conference of Security in Pervasive Computing (SPC’03), pp. 25–38, 2003.

    Google Scholar 

  29. U. Hengartner and P. Steenkiste. Implementing access control to people location information. In Proceedings of the 9th Symposium on Access Control Models and Technologies (SACMAT’04), pp. 11–20, 2004.

    Google Scholar 

  30. U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm’05), pp. 384–393, 2005.

    Google Scholar 

  31. B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In Proceedings of the IFIP Workshop on IP and ATM Traffic Management, pp. 194, 205, 2005.

    Google Scholar 

  32. H. Kido. Location anonymization for protecting user privacy in location-based services. Master’s thesis, Graduate School of Information Science and Technology, Osaka University, February 2006.

    Google Scholar 

  33. H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In Proceedings of the Third International Conference on Pervasive Computing (Pervasive’05), pp. 88–97, 2005.

    Google Scholar 

  34. H. Kido, Y. Yanagisawa, and T. Satoh. Protection of location privacy using dummies for location-based services. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05), pp. 118–122, 2005.

    Google Scholar 

  35. D. Konidala, C.Y. Yeun, and K. Kim. A secure and privacy enhanced protocol for location-based services in ubiquitous society. In Proceedings of GLOBECOMM’04, pp. 931–936, 2004.

    Google Scholar 

  36. M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proceedings of the 4th International Conference on Ubiquitous Computing (UbiComp’02), pp. 237–245, 2002.

    Google Scholar 

  37. A. Matheus. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. In Proceedings of the 10th Symposium on Access Control Models and Technologies (SACMAT’05), pp. 21–28, 2005.

    Google Scholar 

  38. G. Myles, A. Frifay, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56–64, 2003.

    Article  Google Scholar 

  39. National spatial data infrastructure (nsdi). http://www.fgdc.gov/nsdi/nsdi.html.

  40. A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity – a proposal for terminology. In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, pp. 1–9, 2000.

    Google Scholar 

  41. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppresion. In Proceedings of the Symposium on Research in Security and Privacy, pp. 384–393, 1998.

    Google Scholar 

  42. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.

    Google Scholar 

  43. J.A. Simpson and E.S.C. Weiner. Oxford English Dictionary, 2nd edn. Clarendon Press, Oxford, 1989.

    Google Scholar 

  44. E. Snekkenes. Concepts for personal location privacy policies. In Proceedings of the 3rd Conference on Electronic Commerce (EC-’01), pp. 48–57, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Verykios, V.S., Damiani, M.L., Gkoulalas-Divanis, A. (2008). Privacy and Security in Spatiotemporal Data and Trajectories. In: Giannotti, F., Pedreschi, D. (eds) Mobility, Data Mining and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75177-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75177-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75176-2

  • Online ISBN: 978-3-540-75177-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics