Zusammenfassung
Ortsbasierte Systeme und Dienste gewinnen durch Expansion unterschiedlicher mobiler Endgeräte sowie Mobilfunktechnologien, Technologien wie GPS und der Verfügbarkeit von Internettechnologien zunehmend an Bedeutung. Umso mehr nimmt auch der Bedarf des Schutzes der Privatsphäre der Benutzer zu. Das vorgestellte Verfahren nutzt kryptographische Methoden, um kommerzielle ortsbasierte Dienste, die den Schutz der Privatheit der Nutzer garantieren müssen, zu ermöglichen.
Summary
The continuous expansion of diverse mobile devices with various kinds of integrated sensors, namely GPS receivers, different mobile communications technologies and the ubiquitous availability of and access to the Internet fosters the development of location-based services (LBS). Yet again trust, security and protection of the user's privacy are important for the success of such services. The proposed solution is based on cryptographic techniques, which allow the development and deployment of commercial LBS with privacy protection.
References
Agrawal, R., Evfimiesvski, A., Srikant, R. (2004): Information Sharing Across Private Databases. In: Proc. of the ACM Int. Conf. on Management of Data, SIGMOD03
Bellare, M., Canetti, R, Krawczky H. (1996): Message authentication using hash functions – the HMAC construction. In: RSA Labratories' CryptoBytes. Vol 2
Beresford, A. R., Stajano, F. (2003): Location privacy in pervasive computing. In: IEEE Pervasive Computing 2: 45–55
Diffie, W., Hellman, M. E. (1976): New directions in cryptography. In: IEEE Trans. Inform. Theory IT-22, 22 (6): 664–654
Dingledine, R., Mathewson, N., Syverson, P. (2004): Tor: the second-generation onion router. In: Proc. of the 13th USENIX Security Symp
Directive 2002/58/EC (2002): Directive 2002/58/EC of the European Parliament and of the Council concering the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). In: Official Journal of the European Communities L 201/37
Directive 2006/24/EC (2006): Directive 2006/24/EC of the European Parliament and on the Retention of Data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. In: Official Journal of the European Communities
Duckham, M., Kulik, L. (2005): A formal model of obfuscation and negotiation for location privacy. In: Pervasive Computing. 3rd Int. Conf., PERVASIVE 2005. Lecture Notes in Computer Science, Springer: 152–170
Emekci, F., Agrawal, D., El Abbadi, A., Gulbeden, A. (2006): Privacy preserving query processing using third parties. In: Proc. of the 22nd Int. Conf. on Data Engineering
Fischer-Hübner, S. (2001): IT-Security and Privacy. LNCS 1958. Berlin, Heidelberg: Springer
Gruteser, M., Grunwald, D. (2003): Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Int. Conf. on Mobile Systems, Applications and Services. ACM Press
Hong, J. I., Landay, J. A. (2004): An architecture for privacy-sensitive ubiquitous computing. In: Proc. of the 2nd Int. Conf. on Mobile Systems, Applications and Services: 177–189, ACM Press
ISO 19133:2005 (2005): Geographic information Location-based services Tracking and Navigation
Jorns, O. (2009): Privacy in Location-Based Services. PhD Thesis, University of Vienna
Jorns, O., Bessler, S., Pailer, R. (2004): An efficient mechanism to ensure location privacy in telecom service applications. In: International Conference on Network Control and Engineering, Palma de Mallorca, Spain, November, 2004
Jorns, O., Jung, O., Gross, J., Bessler, S. (2005): A privacy enhancement mechanism for location based service architectures using transaction pseudonyms. In: Trust, Privacy, and Security in Digital Business, TrustBus'05, Copenhagen, Denmark
Jorns, O., Quichmayr, G., Jung, O. (2007): A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services. In: Australasian Information Security Workshop (Privacy Enhancing Technologies) AISW-PET2007 at the Australasian Computer Science Conference in Ballerat, Victoria, Australia
Küpper, A. (2005): Location-based Services Fundamentals and Operation. John Wiley and Sons
Krumm, J. (2007): A survey of computational location privacy. In: 5th Int. Workshop on Privacy in UbiComp (UbiPriv'07): 403–409. Wien, New York, Heidelberg: Springer
Land Hessen Federal Republic of Germany (1970): Data Protection Act of 7. October 1970
Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A. (1997): Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. Boca Raton, FL: CRC Press
Mokbel, M. F. (2006): Towards privacy-aware location-based database servers. In: 2nd Int. Workshop on Privacy Data Management (PDM 2006)
Schmidt, A., Beigl, M., Gellersen, H.-W. (1999): There is more to context than location. Computers and Graphics 23 (6): 893–901
Warren, A. (2002): Right to privacy? The protection of personal data in UK public organisations. In: New Library World: 446–456
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jorns, O., Quirchmayr, G. Trust and privacy in location-based services. Elektrotech. Inftech. 127, 151–155 (2010). https://doi.org/10.1007/s00502-010-0735-0
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s00502-010-0735-0