ABSTRACT
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as the entity of interest, often using a fidelity tradeoff to manage the costs and benefits of revealing a person's location. However, these approaches cannot be applied in some applications, as a reduction in precision can render location information useless. This is true of a category of applications that use location data collected from multiple people to infer such information as whether there is a traffic jam on a bridge, whether there are seats available in a nearby coffee shop, when the next bus will arrive, or if a particular conference room is currently empty. We present hitchhiking, a new approach that treats locations as the primary entity of interest. Hitchhiking removes the fidelity tradeoff by preserving the anonymity of reports without reducing the precision of location disclosures. We can therefore support the full functionality of an interesting class of location-based applications without introducing the privacy concerns that would otherwise arise.
- Bahl, P., Balachandran, A., Miu, A., Voelker, G.M., Russell, W. and Wang, Y.-M. (2002) PAWNS: Satisfying the Need for Ubiquitous Connectivity and Location Services. IEEE Personal Communications Magazine (PCS), 9 (1).]]Google Scholar
- Beresford, A.R. and Stajano, F. (2003) Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1). 46--55.]] Google ScholarDigital Library
- Cheverst, K., Davies, N., Mitchell, K. and Friday, A. (2000) Experiences of Developing and Deploying a Context-Aware Tourist Guide: The GUIDE Project. Proceedings of the ACM Conference on Mobile Computing and Networking (MOBICOM 2000), 20--31.]] Google ScholarDigital Library
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J. and Powledge, P. (2005) Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2005), 81--90.]] Google ScholarDigital Library
- Cranor, L., Langheinrich, M., Marchiori, M. and Reagle, J. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. http://www.w3.org/TR/P3P]]Google Scholar
- Dey, A.K. and Abowd, G. (2000) CybreMinder: A Context-Aware System for Supporting Reminders. Proceedings of the International Symposium on Handheld and Ubiquitous Computing, 172--186.]] Google ScholarDigital Library
- Griswold, W.G., Shanahan, P., Brown, S.W., Boyer, R.S., Ratto, M., Shapiro, R.B. and Truong, T.M. (2004) ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing. IEEE Computer, 37(10). 71--81.]] Google ScholarDigital Library
- Gruteser, M. and Grunwald, D. (2003) Anonymous Use of Location-Based Services Through Spatial and Temporal Cloaking. Proceedings of the ACM Conference on Mobile Systems, Applications, and Services (MobiSys 2003), 31--42.]] Google ScholarDigital Library
- Gruteser, M. and Grunwald, D. (2003) Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis. Proceedings of the ACM International Workshop on Wireless Mobile Applications and Services on WLAN (WMASH 2003), 46--55.]] Google ScholarDigital Library
- Hightower, J. and Borriello, G. (2001) Location Systems for Ubiquitous Computing. IEEE Computer, 34(8). 57--66.]] Google ScholarDigital Library
- Hong, J.I. and Landay, J. (2004) An Architecture for Privacy-Sensitive Ubiquitous Computing. Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys 2004), 177--189.]] Google ScholarDigital Library
- Hong, J.I., Ng, J.D., Lederer, S. and Landay, J. (2004) Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. Proceedings of the ACM Conference on Designing Interactive Systems (DIS 2004), 91--100.]] Google ScholarDigital Library
- Iachello, G., Smith, I., Consolvo, S., Chen, M. and Abowd, G. (2005) Developing Privacy Guidelines for Social Location Disclosure Applications and Services. Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2005).]] Google ScholarDigital Library
- Kearney, C. Ex-AOL Employee Sentenced to 15 Months in Spam Case. Washington Post, August 17, 2005.]]Google Scholar
- Krumm, J., Cermak, G. and Horvitz, E. (2003) RightSPOT: A Novel Sense of Location for Smart Personal Object. Proceedings of the International Conference on Ubiquitous Computing (UbiComp 2003), 36--43.]]Google ScholarCross Ref
- LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P., Borriello, G. and Schilit, B.N. (2005) Place Lab: Device Positioning Using Radio Beacons in the Wild. Proceedings of the International Conference on Pervasive Computing (Pervasive 2005), 116--133.]] Google ScholarDigital Library
- Langheinrich, M. (2002) A Privacy Awareness System for Ubiquitous Computing Environments. Proceedings of the International Conference on Ubiquitous Computing (UbiComp 2002), 237--245.]] Google ScholarDigital Library
- Lessig, L. (1999) Code and Other Laws of Cyberspace. Basic Books, New York, NY.]] Google ScholarDigital Library
- Maclean, S.D. and Dailey, D.J. (2001) MyBus: Helping Bus Riders Make Informed Decisions. IEEE Intelligent Systems, 16 (1).]] Google ScholarDigital Library
- Palen, L. and Dourish, P. (2003) Unpacking ""Privacy"" for a Networked World. Proceedings of the Conference on Human Factors in Computing Systems (CHI 2003), 129--136.]] Google ScholarDigital Library
- Patterson, D.J., Liao, L., Fox, D. and Kautz, H. (2003) Inferring High-Level Behavior from Low-Level Sensors. Proceedings of the International Conference on Ubiquitous Computing (UbiComp 2003), 73--89.]]Google ScholarCross Ref
- Reed, M., Syverson, P. and Goldschlag, D. (1998) Anonymous Connections and Onion Routing. Proceedings of the IEEE Symposium on Security and Privacy (SP 1997), 44--54.]] Google ScholarDigital Library
- Schilit, B.N., LaMarca, A., Borriello, G., Griswold, W.G., McDonald, D., Lazowska, E., Balachandran, A., Hong, J.I. and Iverson, V. (2003) Challenge: Ubiquitous Location-Aware Computing and the Place Lab Initiative. Proceedings of the ACM International Workshop on Wireless Mobile Applications and Services on WLAN (WMASH 2003), 29--35.]] Google ScholarDigital Library
- Smith, I., Consolvo, S., Hightower, J., Iachello, G., LaMarca, A., Scott, J., Sohn, T. and Abowd, G. (2005) Social Disclosure of Place: From Location Technology to Communications Practices. Proceedings of the International Conference on Pervasive Computing (Pervasive 2005), 134--151.]] Google ScholarDigital Library
- Voelker, G.M. and Bershad, B.N. (1994) Mobisaic: An Information System for a Mobile Wireless Computing Environment. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1994), 185--190.]]Google ScholarCross Ref
- Zipdash - Mobile Map and Traffic App. http://www.zipdash.com]]Google Scholar
Index Terms
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
Recommendations
Location privacy protection with a semi-honest anonymizer in information centric networking
ICN '18: Proceedings of the 5th ACM Conference on Information-Centric NetworkingLocation-based services, which provide services based on locations of consumers' interests, are becoming essential for our daily lives. Since the location of a consumer's interest contains private information, several studies propose location privacy ...
Anonymity preserving framework for location-based information services
MEDES '10: Proceedings of the International Conference on Management of Emergent Digital EcoSystemsRecently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user ...
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism
SPRINGL '11: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBSCollaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic in real-time. However, ...
Comments