Skip to main content
Log in

Trust and privacy in location-based services

Schutz der Privatsphäre bei ortsbasierten Diensten

  • Originalarbeiten
  • Published:
e & i Elektrotechnik und Informationstechnik Aims and scope Submit manuscript

Zusammenfassung

Ortsbasierte Systeme und Dienste gewinnen durch Expansion unterschiedlicher mobiler Endgeräte sowie Mobilfunktechnologien, Technologien wie GPS und der Verfügbarkeit von Internettechnologien zunehmend an Bedeutung. Umso mehr nimmt auch der Bedarf des Schutzes der Privatsphäre der Benutzer zu. Das vorgestellte Verfahren nutzt kryptographische Methoden, um kommerzielle ortsbasierte Dienste, die den Schutz der Privatheit der Nutzer garantieren müssen, zu ermöglichen.

Summary

The continuous expansion of diverse mobile devices with various kinds of integrated sensors, namely GPS receivers, different mobile communications technologies and the ubiquitous availability of and access to the Internet fosters the development of location-based services (LBS). Yet again trust, security and protection of the user's privacy are important for the success of such services. The proposed solution is based on cryptographic techniques, which allow the development and deployment of commercial LBS with privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  • Agrawal, R., Evfimiesvski, A., Srikant, R. (2004): Information Sharing Across Private Databases. In: Proc. of the ACM Int. Conf. on Management of Data, SIGMOD03

  • Bellare, M., Canetti, R, Krawczky H. (1996): Message authentication using hash functions – the HMAC construction. In: RSA Labratories' CryptoBytes. Vol 2

  • Beresford, A. R., Stajano, F. (2003): Location privacy in pervasive computing. In: IEEE Pervasive Computing 2: 45–55

    Google Scholar 

  • Diffie, W., Hellman, M. E. (1976): New directions in cryptography. In: IEEE Trans. Inform. Theory IT-22, 22 (6): 664–654

    MathSciNet  Google Scholar 

  • Dingledine, R., Mathewson, N., Syverson, P. (2004): Tor: the second-generation onion router. In: Proc. of the 13th USENIX Security Symp

  • Directive 2002/58/EC (2002): Directive 2002/58/EC of the European Parliament and of the Council concering the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). In: Official Journal of the European Communities L 201/37

  • Directive 2006/24/EC (2006): Directive 2006/24/EC of the European Parliament and on the Retention of Data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. In: Official Journal of the European Communities

  • Duckham, M., Kulik, L. (2005): A formal model of obfuscation and negotiation for location privacy. In: Pervasive Computing. 3rd Int. Conf., PERVASIVE 2005. Lecture Notes in Computer Science, Springer: 152–170

  • Emekci, F., Agrawal, D., El Abbadi, A., Gulbeden, A. (2006): Privacy preserving query processing using third parties. In: Proc. of the 22nd Int. Conf. on Data Engineering

  • Fischer-Hübner, S. (2001): IT-Security and Privacy. LNCS 1958. Berlin, Heidelberg: Springer

    Book  Google Scholar 

  • Gruteser, M., Grunwald, D. (2003): Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Int. Conf. on Mobile Systems, Applications and Services. ACM Press

  • Hong, J. I., Landay, J. A. (2004): An architecture for privacy-sensitive ubiquitous computing. In: Proc. of the 2nd Int. Conf. on Mobile Systems, Applications and Services: 177–189, ACM Press

  • ISO 19133:2005 (2005): Geographic information Location-based services Tracking and Navigation

  • Jorns, O. (2009): Privacy in Location-Based Services. PhD Thesis, University of Vienna

  • Jorns, O., Bessler, S., Pailer, R. (2004): An efficient mechanism to ensure location privacy in telecom service applications. In: International Conference on Network Control and Engineering, Palma de Mallorca, Spain, November, 2004

  • Jorns, O., Jung, O., Gross, J., Bessler, S. (2005): A privacy enhancement mechanism for location based service architectures using transaction pseudonyms. In: Trust, Privacy, and Security in Digital Business, TrustBus'05, Copenhagen, Denmark

  • Jorns, O., Quichmayr, G., Jung, O. (2007): A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services. In: Australasian Information Security Workshop (Privacy Enhancing Technologies) AISW-PET2007 at the Australasian Computer Science Conference in Ballerat, Victoria, Australia

  • Küpper, A. (2005): Location-based Services Fundamentals and Operation. John Wiley and Sons

  • Krumm, J. (2007): A survey of computational location privacy. In: 5th Int. Workshop on Privacy in UbiComp (UbiPriv'07): 403–409. Wien, New York, Heidelberg: Springer

    Google Scholar 

  • Land Hessen Federal Republic of Germany (1970): Data Protection Act of 7. October 1970

  • Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A. (1997): Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. Boca Raton, FL: CRC Press

  • Mokbel, M. F. (2006): Towards privacy-aware location-based database servers. In: 2nd Int. Workshop on Privacy Data Management (PDM 2006)

  • Schmidt, A., Beigl, M., Gellersen, H.-W. (1999): There is more to context than location. Computers and Graphics 23 (6): 893–901

    Article  Google Scholar 

  • Warren, A. (2002): Right to privacy? The protection of personal data in UK public organisations. In: New Library World: 446–456

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to O. Jorns.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jorns, O., Quirchmayr, G. Trust and privacy in location-based services. Elektrotech. Inftech. 127, 151–155 (2010). https://doi.org/10.1007/s00502-010-0735-0

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00502-010-0735-0

Schlüsselwörter

Keywords

Navigation