The European directive 2002/58/EC requires providers of public communication networks and electronic communication services to adopt techniques to ensure data security and privacy. This directive states, among others, that “the provider of a publicly available electronic communication service must take appropriate technical and organizational measures to safeguard the security of its services having regard to the state of the art,” and also that “when location data relating to users can be processed, such data can only be processed when they are made anonymous or with the consent of the user.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Databases (VLDB’02), pp. 143–154, 2002.
V. Atluri and S.A. Chun. An authorization model for geospatial data. IEEE Transactions Dependable Security Computing, 1(4):238–254, 2004.
V. Atluri and P. Mazzoleni. Uniform indexing for geospatial data and authorizations. In Proceedings of the 16th Conference on Database Security (DBSEC’02), pp. 207–218, 2002.
A. Belussi, E. Bertino, B. Catania, M.L. Damiani, and A. Nucita. An authorization model for geographical maps. In Proceedings of the 12th International Workshop on Geographic Information Systems (GIS’04), pp. 82–91, 2004.
A.R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
A.R. Beresford and F. Stajano. Mix zones: user privacy in location-aware services. In Proceedings of the Second Conference on Pervasive Computing and Communications Workshops (PERCOM’04), pp. 127–131, 2004.
E. Bertino, B. Catania, M.L. Damiani, and P. Perlasca. GEO-RBAC: a spatially aware RBAC. In Proceedings of the 10th Symposium on Access Control Models and Technologies (SACMAT’05), pp. 29–37, 2005.
E. Bertino, M.L. Damiani, and D. Momini. An access control system for a web map management service. In Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE 2004), pp. 33–39, 2004.
C. Bettini, X.S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Proceedings of the Second VLDB Workshop on Secure Data Management (SDM’05), pp. 185–199, 2005.
M. Bishop. Introduction to Computer Security. Addison-Weslay, Reading, MA, 2005.
D. Boneh and M.K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference (CRYPTO’01), pp. 213–229, 2001.
D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65–75, 1988.
M. Covington, W. Long, S. Srinivasan, A.K. Dev, M. Ahamad, and G.D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the 6th Symposium on Access Control Models and Technologies (SACMAT’01), pp. 10–20, 2001.
L. Cranor, M. Langheinrich, and M. Marchiori. A P3P preference exchange language 1.0 (APPEL 1.0), April 2002.
L. Cranor, M. Langheinrich, and M. Marchiori. The platform for privacy preferences 1.0 (P3P1.0), April 2002.
M. Damiani and E. Bertino. Access control and privacy in location-aware services for mobile organizations. In Proceedings of the Seventh International Conference on Mobile Data Management (MDM’06), pp. 11–21, 2006.
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proceedings of the Third International Conference on Pervasive Computing (Pervasive’05), pp. 152–170, 2005.
C. Ellison, B. Frank, B. Lamson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Cerificates Theory. RFC 2693, September 1999.
S. Fu and C.-Z. Xu. A coordinated spatio-temporal access control model for mobile computing in coalition environments. In Proceedings of the 9th International Parallel and Distributed Processing Symposium(IPDPS’05), 2005.
B.G. Gedik and L. Liu. A customizable K-anonymity model for protecting location privacy. Technical Report GIT-CERCS-04-15, Georgia Institute of Technology, April 2004.
B. Gedik and L. Liu. Location privacy in mobile systems: a personalized anonymization model. In Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS’05), pp. 620–629, 2005
C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’02), pp. 548–566, 2002.
Global spatial data infrastructure association (gsdi). http://www.gsdi.org/.
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys’03), 2003.
M. Gruteser and X. Liu. Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy Magazine, 2(2):28–34, 2004.
F. Hansen and V. Oleshchuk. Spatial role-based access control model for wireless networks. In Proceedings of the Vehicular Technology Conference (VTC’03), pp. 2093–2097, 2003.
C. Hauser and M. Kabatnik. Towards privacy support in a global location service. In Proceedings of the IFIP Workshop on IP and ATM Traffic Management, pp. 81–89, 2001.
U. Hengartner and P. Steenkiste. Protecting access to people location information. In Proceedings of the First International Conference of Security in Pervasive Computing (SPC’03), pp. 25–38, 2003.
U. Hengartner and P. Steenkiste. Implementing access control to people location information. In Proceedings of the 9th Symposium on Access Control Models and Technologies (SACMAT’04), pp. 11–20, 2004.
U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm’05), pp. 384–393, 2005.
B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In Proceedings of the IFIP Workshop on IP and ATM Traffic Management, pp. 194, 205, 2005.
H. Kido. Location anonymization for protecting user privacy in location-based services. Master’s thesis, Graduate School of Information Science and Technology, Osaka University, February 2006.
H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In Proceedings of the Third International Conference on Pervasive Computing (Pervasive’05), pp. 88–97, 2005.
H. Kido, Y. Yanagisawa, and T. Satoh. Protection of location privacy using dummies for location-based services. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05), pp. 118–122, 2005.
D. Konidala, C.Y. Yeun, and K. Kim. A secure and privacy enhanced protocol for location-based services in ubiquitous society. In Proceedings of GLOBECOMM’04, pp. 931–936, 2004.
M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proceedings of the 4th International Conference on Ubiquitous Computing (UbiComp’02), pp. 237–245, 2002.
A. Matheus. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. In Proceedings of the 10th Symposium on Access Control Models and Technologies (SACMAT’05), pp. 21–28, 2005.
G. Myles, A. Frifay, and N. Davies. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1):56–64, 2003.
National spatial data infrastructure (nsdi). http://www.fgdc.gov/nsdi/nsdi.html.
A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity – a proposal for terminology. In Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, pp. 1–9, 2000.
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppresion. In Proceedings of the Symposium on Research in Security and Privacy, pp. 384–393, 1998.
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, 1996.
J.A. Simpson and E.S.C. Weiner. Oxford English Dictionary, 2nd edn. Clarendon Press, Oxford, 1989.
E. Snekkenes. Concepts for personal location privacy policies. In Proceedings of the 3rd Conference on Electronic Commerce (EC-’01), pp. 48–57, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Verykios, V.S., Damiani, M.L., Gkoulalas-Divanis, A. (2008). Privacy and Security in Spatiotemporal Data and Trajectories. In: Giannotti, F., Pedreschi, D. (eds) Mobility, Data Mining and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75177-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-75177-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75176-2
Online ISBN: 978-3-540-75177-9
eBook Packages: Computer ScienceComputer Science (R0)