Abstract
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.
In this chapter, we first present a survey of existing state-of-the-art protection mechanisms and their challenges when deployed in the context of wired and wireless networks. Moreover, we illustrate recent and ongoing research that attempts to address different aspects of privacy in mobile applications. Furthermore, we present a new proposal to ensure private communication in the context of hybrid mobile networks, which integrate wired, wireless and cellular technologies. We conclude by outlining open problems and possible future research directions.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of user’s privacy concerns. In: Proc. of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), Zurich, Switzerland (September 2003)
D’Roza, T., Bilchev, G.: An overview of location-based services. BT Technology Journal 21(1), 20–27 (2003)
Loopt (December 2008), http://www.loopt.com/about/privacy-security
Zander, C.: Cia Cell Tower Monitors Local Internet Users’ Wireless Transmissions (September 2007), http://www.send2press.com/newswire/2007-09-0911-003.shtml
Chicago Tribune: Rental firm uses GPS in speeding fine, p.9. Associated Press, Chicago (July 2, 2001)
Lee, J.W.: Location-tracing sparks privacy concerns. Korea Times, (November 16, 2004), http://news.naver.com/main/read.nhn?mode=LPOD&mid=etc&oid=040&aid=0000016873
Giannotti, F., Pedreschi, D. (eds.): Mobility, data mining and privacy - Geographic knowledge discovery. Springer, Heidelberg (2008)
Kaufman, C., Perlman, R., Speciner, M.: Network security: Private communication in a public world. Prentice Hall, Englewood Cliffs (2003)
Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, Springer, Heidelberg (2007)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)
Ardagna, C., Stavrou, A., Jajodia, S., Samarati, P., Martin, R.: A multi-path approach for k-anonymity in mobile hybrid networks. In: Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain (October 2008)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Onion Routing, http://www.onion-router.net/
Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)
Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: Proc. of the 12th Annual Computer Security Applications Conference, San Diego, CA (December 1996)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (August 2004)
Perkins, C., Royer, E.: Ad-hoc on demand distance vector routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA (February 1999)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks, vol. 353. Kluwer Academic Publishers, Dordrecht (1996)
Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: A secure distributed anonymous routing protocol for wireless andmobile ad hoc networks. In: Proc. of the 29th Annual IEEE International Conference on Local Computer Networks (LCN 2004), Tampa, FL, USA (October 2004)
Kao, J.C., Marculescu, R.: Real-time anonymous routing for mobile ad hoc networks. In: Proc. of the Wireless Communications and Networking Conference (WCNC 2007), Hong Hong (March 2007)
Kong, J., Hong, X.: ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proc. of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003), Annapolis, MD, USA (June 2003)
Wu, X., Bhargava, B.: AO2P: Ad hoc on-demand position-based private routing protocol. IEEE Transaction on Mobile Computing 4(4) (July-August 2005)
Yang, L., Jakobsson, M., Wetzel, S.: Discount anonymous on demand routing for mobile ad hoc networks. In: Proc. of the Second International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), Baltimore, MD, USA (August-September 2006)
Zhang, Y., Liu, W., Lou, W.: Anonymous communication in mobile ad hoc networks. In: Proc. of the 24th Annual Joint Conference of the IEEE Communication Society (INFOCOM 2005), Miami, FL, USA (March 2005)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Mask: Anonymous on-demand routing in mobile ad hoc networks. IEEE Transaction on Wireless Communications 5(9) (September 2006)
Capkun, S., Hubaux, J.P., Jakobsson, M.: Secure and privacy-preserving communication in hybrid ad hoc networks. Technical Report IC/2004/10, EPFL-IC, CH-1015 Lausanne, Switzerland (January 2004)
Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Proc. of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA (November 2005)
Dotzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)
Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications 25(8), 1569–1589 (2007)
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan (March 2006)
Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)
Mascetti, S., Bettini, C.: A comparison of spatial generalization algorithms for LBS privacy preservation. In: Proc. of the 1st International Workshop on Privacy-Aware Location-based Mobile Services (PALMS 2007), Mannheim, Germany (May 2007)
Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA (May 2003)
Mokbel, M., Chow, C.Y., Aref, W.: The new casper: Query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (September 2006)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)
Ghinita, G., Kalnis, P., Skiadopoulos, S.: Privè: Anonymous location-based queries in distributed mobile systems. In: Proc. of the International World Wide Web Conference (WWW 2007), Banff, Canada (May 2007)
Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372–390. Springer, Heidelberg (2007)
Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proc. of the 6th international conference on Mobile systems, applications, and services (MobiSys 2008), Breckenridge, CO, USA (June 2008)
Zhong, G., Hengartner, U.: A distributed k-anonymity protocol for location privacy. In: Proc. of the Seventh IEEE International Conference on Pervasive Computing and Communication (PerCom 2009), Galveston, TX, USA (March 2009)
Fujiwara, T., Watanabe, T.: An ad hoc networking scheme in hybrid networks for emergency communications. Ad Hoc Networks 3(5), 607–620 (2005)
Sphinx - A Hybrid Network Model for Next Generation Wireless Systems, http://www.ece.gatech.edu/research/GNAN/work/sphinx/sphinx.html
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65–75 (1988)
Stavrou, A., Keromytis, A.: Countering dos attacks with stateless multipath overlays. In: Proc. of the 12th ACM conference on Computer and communications security (CCS 2005), Alexandria, VA, USA (November 2005)
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proc. of the 14th ACM conference on Computer and communications security (CCS 2007), Alexandria, Virginia, USA (October-November 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Ardagna, C.A., Jajodia, S., Samarati, P., Stavrou, A. (2009). Privacy Preservation over Untrusted Mobile Networks. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-03511-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03510-4
Online ISBN: 978-3-642-03511-1
eBook Packages: Computer ScienceComputer Science (R0)