Skip to main content

Supporting Location Information Privacy in Mobile Devices

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7753))

Abstract

Social networking has evolved as a basic amenity in today’s interconnected world. Users of social media tools do not always keep up with privacy policies and its adverse effects. It is very common that even experienced users are often caught unaware of actions that happen behind the interface screens of their interconnection devices. Many-a-time mobile application developers take advantage of such user complacency and leak location information from the device (and hence information about the user) to other applications. Though there has been considerable alerts raised on the issue of location information leakage, there are situations wherein applications sneak through these ‘walls’ and connect with devices / applications to extract / query desired information from the firmware. In this work, we provide a in-depth review of literature on this emerging area of social interest, and propose a four-layer context-based authentication framework (4-CBAF) to address location privacy concerns. The 4-CBAF framework provides a facility for users to share pertinent information only if the user specifically authorizes such information sharing. The 4-CBAF is intelligent enough to reduce the number of human interventions that a user should attend to. The effectiveness of the proposed 4-CBAF is also demonstrated for check-in application for Facebook using smart devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, Y., Liu, D.: Location-Aware Services and its Infrastructure Support. In: Enabling Technologies for Wireless E-Business, pp. 312–334. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Weiser, M.: Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM 6(7), 75–84 (1993)

    Article  Google Scholar 

  3. Harter, A., Hopper, A.: A distributed location system for the active office. IEEE Network 8(1), 62–70 (1994)

    Article  Google Scholar 

  4. Chang, W., Wu, J., Tan, C.C.: Enhancing Mobile Social Network Privacy. In: IEEE Global Telecommunications Conference (GLOBECOM 2011), December 5-9, pp. 1–5 (2011)

    Google Scholar 

  5. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing Security and Privacy in Traffic-Monitoring Systems. IEEE Pervasive Computing 5(4), 38–46 (2006)

    Article  Google Scholar 

  6. Xie, H., Kulik, L., Tanin, E.: Privacy-Aware Traffic Monitoring. IEEE Transactions on Intelligent Transportation Systems 11(1), 61–70 (2010)

    Article  Google Scholar 

  7. Shokri, R., Theodorakopoulos, G., Le Boudec, J., Hubaux, J.: Quantifying Location Privacy. In: IEEE Security and Privacy (SP), May 22-25, pp. 247–262 (2011)

    Google Scholar 

  8. Shokri, R., Freudiger, J., Hubaux, J.-P.: A unified framework for location privacy. In: 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs (2010)

    Google Scholar 

  9. Decker, M.: Location Privacy-An Overview. In: 7th International Conference on Mobile Business, ICMB 2008, pp.221–230, July 7-8 (2008)

    Google Scholar 

  10. Nayak, D., Ramaswamy, S.: A Multi-level Contextualization Framework for Authentication in Mobile Payment Applications. In: 11th International Conference on Wireless Networks (ICWN 2012), USA, July 16-19 (2012)

    Google Scholar 

  11. Minch, R.P.: Privacy Issues in Location –Aware mobile devices. In: 37th Hawaii International Conference on System Sciences, Big Island, HI, USA. IEEE Computer Society (2004) ISBN 0-7695-2056-1

    Google Scholar 

  12. Wang, J.I., Loui, M.C.: Privacy and Ethical issues in location–Based Tracking systems. In: Proc. of the 2009 IEEE International Symposium on Technology and Society, Wasington DC, USA (2009)

    Google Scholar 

  13. Bowen III, C.L., Martin, T.L.: A survey of Location privacy and an Approach for SolitaryUsers. In: 40th Hawaii Intnl. Conf. on System Sciences, Big Island, Hawaii (2007) ISBN 0-7695-2755-8

    Google Scholar 

  14. Zhu, C., Wat, K.K., et al.: Privacy and Social Effects in Location Sharing Services. In: Proceeding of 2012 IEEE First International Conference on Services Economics, Hawaii,USA, June 24-29 (2012)

    Google Scholar 

  15. GeekTools, "GTWhois," Centergate Research Group, LLC (2003)

    Google Scholar 

  16. VisualRoute, "VisualRoute 2006 Personal Edition," Visualware, Inc. (2006)

    Google Scholar 

  17. The Communications Act of 1934, 47 U.S.C(151-614), Public Law 416 (1934)

    Google Scholar 

  18. The Location Privacy Protection Act of 2001 (2001)

    Google Scholar 

  19. The Wireless Privacy Protection Act of 2003 (2003)

    Google Scholar 

  20. The Wireless Privacy Protection Act of 2005 (2005)

    Google Scholar 

  21. The Wireless 411 Privacy Act (2005)

    Google Scholar 

  22. European Union Directive on Privacy and Electronic Communications (2002)

    Google Scholar 

  23. Dowdell, E.M.: You are here! Mapping the boundaries of the Fourth Amendment with GPS technology. Rutgers Computer and Technology Law Journal 32(1), 109–139 (2005)

    Google Scholar 

  24. Lockton, V., Rosenberg, R.S.: RFID: the next serious threat to privacy. Ethics and Info. Tech. 7(4), 221–231 (2005)

    Article  Google Scholar 

  25. Michael, M.G., Fusco, S.J., Michael, K.: A research note on ethics in the emerging age of uberveillance (überveillance). Computer Communications 31(6), 1192–1199 (2008)

    Article  MATH  Google Scholar 

  26. Perusco, L., Michael, K.: Control, trust, privacy, and security: evaluating location-based services. IEEE Technologyand Society Magazine 26(1), 4–16 (2007)

    Article  Google Scholar 

  27. Peslak, A.R.: An ethical exploration of privacy and radio frequency identification. Jour. of Business Ethics 59(4), 327–345 (2005)

    Article  Google Scholar 

  28. Wasieleski, D.M., Gal-Or, M.: An enquiry into the ethical efficacy of the use of radio frequency identification technology. Ethics and Information Technology 10(1), 27–40 (2008)

    Article  Google Scholar 

  29. Lin, D., Loui, M.C.: Taking the byte out of cookies: privacy, consent, and the Web. Computers and Society 28(2), 39–51 (1998)

    Google Scholar 

  30. Lin, D., Loui, M.C.: Taking the byte out of cookies: privacy, consent, and the Web. Computers and Society 28(2), 39–51 (1998)

    Google Scholar 

  31. Hengather, U., Steenkiste, P.: Avoiding privacy violation caused by context –sensitive services. In: Forth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 2006), March 13-17, p. 233 (2006)

    Google Scholar 

  32. Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)

    Article  Google Scholar 

  33. Xu, H., Gupta, S., et al.: Effectiveness of privacy Assurances Approaches In Location-Based Services:A Study of India and United States. In: Proceeding of Eighth International Conference on Mobile Business (2009)

    Google Scholar 

  34. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., Colautti, C.: Internet users’ privacy concerns and beliefs about governmentsurveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management 14(4), 57–93 (2006)

    Article  Google Scholar 

  35. Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., Colautti, C.: Privacy Calculus Model in E-commerce - a Study of Italy and the United States. European Journal of Information Systems 15(4), 389–402 (2006)

    Article  Google Scholar 

  36. Kumaraguru, P., Cranor, L.: Privacy in India: Attitudes and Awareness. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 243–258. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  37. Milberg, S.J.B., Smith, J.S.H.J., Kallman, A.E.: Values, Personal Information Privacy Concerns, and Regulatory Approaches. Comm. of the ACM 38(12), 65–74 (1995)

    Article  Google Scholar 

  38. Nowak, G.J., Phelps, J.: Understanding Privacy Concerns: An Assessment of Consumers’s Information-Related Knowledge and Beliefs. Journal of Direct Marketing 6(4), 28–39 (1992)

    Article  Google Scholar 

  39. Wang, P.: Information-Systems Solutions for Transborder Data Flow Problems for Multinational Companies. International Journal of Information Management 13(1), 29–40 (1993)

    Article  Google Scholar 

  40. Margulis, S.T.: On the Status and Contribution of Westin’s and Altman’s Theories of Privacy. Jour. of Social Issues 59(2), 411–429 (2003)

    Article  Google Scholar 

  41. Bertino, E., Kirkpatrick, M.: Location-Aware Authentication and Access Control-Concepts and Issues. In: International Conference on Advanced Information Networking and Aplications(AINA), May 26-29. University of Bradford, Bradford, UK (2009)

    Google Scholar 

  42. Michael, K., McNamee, A., Michael, M.G.: The Emerging Ethics of Humancentric GPS Tracking and Monitoring. In: Proc. of the International Conference on Mobile Business (ICMB 2006), Copenhagen, Denmark, June 26-27. IEEE Computer Society (2006) ISBN 0-7695-2595-4

    Google Scholar 

  43. Dobson, J.E., Fisher, P.F.: Geoslavery. IEEE Technology and Society Magazine 22(1), 47–52 (2003)

    Article  Google Scholar 

  44. Garfinkel, S.L., et al.: RFID Privacy: An Overview of Problem and Proposed Solutions. IEEE Securityand Privacy Mag. 3(3), 38–43 (2005)

    Google Scholar 

  45. Michael, K., Michael, M.G.: Microchipping People: the Rise of the Electrophorus. Quadrant, 22–33 (March 2005)

    Google Scholar 

  46. Perusco, L., Michael, K.: Humancentric Applications of Precise Location-Based Services. In: IEEE Conference on e-Business Engineering, pp. 409–418. IEEE Computer Society, Beijing (2005)

    Chapter  Google Scholar 

  47. Kaupins, G., Minch, R.: Legal and Ethical Implications of Employee Location Monitoring. In: 38th Hawaii Intnl. Conf. on System Sciences (2005), http://csdl2.computer.org/comp/proceedings/hicss/2005/2268/05/22680133a.pdf

  48. Perakslis, C., Wolk, R.: Social Acceptance of RFID as a Biometric Security Method. In: Proceedings of the IEEE Symposium on Technology and Society, pp. 79–87 (2005)

    Google Scholar 

  49. Stajano, F.: Viewpoint: RFID Is X-ray Vision. Communications of the ACM 48(9), 31–33 (2005)

    Article  Google Scholar 

  50. Google Earth, http://earth.google.com/

  51. NASA World Wind, http://worldwind.arc.nasa.gov/

  52. Microsoft Virtual Earth, http://www.microsoft.com/virtualearth/

  53. Skyline Globe, http://www.skylinesoft.com/

  54. Fleet, G.J., Williamson, M.: Research data in Google Earth: how do we protect privacy and meet ethical obligations? In: Proceeding World Congress on Privacy, Delta Brunswick, Saint John, New Brunswick, Canada, August 25-27 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nayak, D., Swamy, M.V., Ramaswamy, S. (2013). Supporting Location Information Privacy in Mobile Devices. In: Hota, C., Srimani, P.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2013. Lecture Notes in Computer Science, vol 7753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36071-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36071-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36070-1

  • Online ISBN: 978-3-642-36071-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics