skip to main content
research-article

Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research

Published:19 July 2013Publication History
Skip Abstract Section

Abstract

With the emergence of the mobile app ecosystem, user location data has escaped the grip of the tightly regulated telecommunication industry and is now being collected at unprecedented scale and accuracy by mobile advertising, platform, and app providers. This position paper is based on discussions of the authors at the Dagstuhl seminar on Mobility Data Mining and Privacy. It seeks to highlight this shift by providing a tutorial on location data flows and associated privacy risks in this mobile app ecosystem. Moreover, it reflects on the implications of this shift to the mobile privacy research community.

References

  1. Mobile apps for kids: Current privacy disclosures are disappointing. Technical report, Federal Trade Commission, 2012. http://www.ftc.gov/os/2012/02/120216mobile apps kids.pdf.Google ScholarGoogle Scholar
  2. G. Andrienko and N. Andrienko. Privacy issues in geospatial visual analytics. In Georg Gartner, Felix Ortag,William Cartwright, Georg Gartner, Liqiu Meng, and Michael P. Peterson, editors, Advances in Location-Based Services, Lecture Notes in Geoinformation and Cartography, pages 239--246. Springer Berlin Heidelberg, 2012.Google ScholarGoogle Scholar
  3. G. L. Andrienko, N. V. Andrienko, C. Hurter, S. Rinzivillo, and S. Wrobel. From movement tracks through events to places: Extracting and characterizing significant places from mobility data. In IEEE VAST, pages 161--170. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  4. G. L. Andrienko, N. V. Andrienko, M. Mladenov, M. Mock, and C. Pölitz. Identifying place histories from activity traces with an eye to parameter impact. IEEE Trans. Vis. Comput. Graph., 18(5):675--688, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Andrienko, G. Andrienko, H. Stange, T. Liebig, and D. Hecker. Visual analytics for understanding spatial situations from episodic movement data. KI - Künstliche Intelligenz, pages 241--251, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, and S. Reale. Map-based location and tracking in multipath outdoor mobile networks. Wireless Communications, IEEE Transactions on, 10(3):814--824, march 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Arthur. iphone keeps record of everywhere you go. The Guardian, 2011. http://www.guardian.co.uk/technology/2011/apr/20/iphone-trackingprompts-privacy-fears.Google ScholarGoogle Scholar
  8. L. Bengtsson, X. Lu, A. Thorson, R. Garfield, and J. von Schreeb. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: A postearthquake geospatial study in haiti. PLoS Med, 8(8):e1001083, 08 2011.Google ScholarGoogle ScholarCross RefCross Ref
  9. N. Bilton. 3G Apple iOS devices are storing users location data. The New York Times, Published: April 20, 2011, 2011.Google ScholarGoogle Scholar
  10. N. Bilton. Holding companies accountable for privacy breaches. The New York Times, Published: April 27, 2011, 2011.Google ScholarGoogle Scholar
  11. Christopher W. Clifton, Bart Kuijpers, Katharina Morik, and Yucel Saygin. Mobility Data Mining and Privacy (Dagstuhl Seminar 12331). Dagstuhl Reports, 2(8):16--53, 2012.Google ScholarGoogle Scholar
  12. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. European Parlament and European Council. Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, (L281), 1995.Google ScholarGoogle Scholar
  14. Council European Parliament. Directive 2006/24/ec of the european parliament and of the council of 15 march 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending directive 2002/58/ec. Official Journal of the European Union, L 105:54--63, 2006.Google ScholarGoogle Scholar
  15. Gartner, Inc. Gartner says worldwide mobile advertising revenue forecast to reach $3.3 billion in 2011, 2011. http://www.gartner.com/it/page.jsp?id=1726614.Google ScholarGoogle Scholar
  16. Philippe Golle and Kurt Partridge. On the anonymity of home/work location pairs. In Hideyuki Tokuda, Michael Beigl, Adrian Friday, A. Brush, and Yoshito Tobe, editors, Pervasive Computing, volume 5538 of Lecture Notes in Computer Science, pages 390--397. Springer Berlin / Heidelberg, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 101--112, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Greenberg. Phone 'rootkit' maker carrier iq may have violated wiretap law in millions of cases. Forbes, 2011. http://www.forbes.com/sites/andygreenberg/2011/11/30/phone-rootkitcarrier-iq-may-have-violatedwiretap-law-in-millions-of-cases/. Retrieved 2012/10/18.Google ScholarGoogle Scholar
  19. M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pages 31--42, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Haddadi, P. Hui, T. Henderson, and I. Brown. Targeted advertising on the handset: Privacy and security challenges. In Hans Jrg Mller, Florian Alt, and Daniel Michelis, editors, Pervasive Advertising, Human-Computer Interaction Series, pages 119--137. Springer, 2011.Google ScholarGoogle Scholar
  21. M. Helft. Apple and Google use phone data to map the world. The New York Times, Published: April 25, 2011, 2011.Google ScholarGoogle Scholar
  22. K. Hill. Forbes, 2012. http://www.forbes.com/sites/kashmirhill/2012/02/07/theaustrian-thorn-in-facebooks-side/. Retrieved 2012/10/18.Google ScholarGoogle Scholar
  23. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACMconference on Computer and communications security, CCS '11, pages 639--652, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Jun, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on, pages 1--9, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Kravets. An intentional mistake: The anatomy of googles wi-fi sniffing debacle. Wired, 2011. http://www.wired.com/thr eatlevel/2012/05/google-wifi-fccinvestigation/. Retrieved 2012/10/18.Google ScholarGoogle Scholar
  26. J. Krumm. Ubiquitous advertising: The killer application for the 21st century. Pervasive Computing, IEEE, 10(1):66--73, jan.-march 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Landtag. Druchsache 5/6787. Sächsischer Landtag 5. Wahlperiode, 2011.Google ScholarGoogle Scholar
  28. E. Lichtblau. Police are using phone tracking as a routine tool. The New York Times, Published: March 31, 2012, 2012.Google ScholarGoogle Scholar
  29. C. Ling, M. Loschonsky, and L. M. Reindl. Characterization of delay spread for mobile radio communications under collapsed buildings. In IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pages 329--334, Sept. 2010.Google ScholarGoogle ScholarCross RefCross Ref
  30. C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. V. Rao. Privacy vulnerability of published anonymous mobility traces. In Proceedings of the sixteenth annual international conference on Mobile computing and networking, MobiCom '10, pages 185--196, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. McCullagh. Microsoft collects locations of Windows phone users. CNet News, Published: April 25, 2011, 2011.Google ScholarGoogle Scholar
  32. E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pages 323--336, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Ministerium für Inneres und Kommunales NRW. Funkzellenauswertung (FZA) und Versenden "Stiller SMS" zur Kriminalitätsbekämpfung. MMD 15/3300, 2011.Google ScholarGoogle Scholar
  34. P. Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, Vol. 57, p. 1701, 2010, 2009.Google ScholarGoogle Scholar
  35. ZEIT Online. Landgericht erklärt funkzellenabfrage auf demo für rechtswidrig. Die Zeit, 2013. http://www.zeit.de/digital/datenschutz/2013-04/funkzellenabfragedresden-landgericht.Google ScholarGoogle Scholar
  36. K. Rechert, K. Meier, B. Greschbach, D.Wehrle, and D. von Suchodoletz. Assessing location privacy in mobile communication networks. In H. Li X. Lai, J. Zhou, editor, ISC 11, LNCS 7001, pages 309--324. Springer, Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. E. Smith. iphone applications & privacy issues: An analysis of application transmission of iphone unique device identifiers (udids). Technical report, PSKL, 2010. http://www.pskl.us/wp/wpcontent/ uploads/2010/09/iPhone-Applications-Privacy-Issues.pdf.Google ScholarGoogle Scholar
  38. G. Sun, J. Chen, W. Guo, and K. J. R. Liu. Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs. Signal Processing Magazine, IEEE, 22(4):12--23, July 2005.Google ScholarGoogle ScholarCross RefCross Ref
  39. S. Thurm and I. Yukari Kane. Your apps are watching you. The Wall Street Journal, 2010. http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html.Google ScholarGoogle Scholar
  40. W. H. Ware. Records, computers, and the rights of citizens. Secretary's Advisory Committee on Automated Personal Data Systems, Department of Health, Education and Welfare, Washington, D.C., 1973.Google ScholarGoogle Scholar
  41. H. Zang and J. Bolot. Anonymization of location data does not work: a large-scale measurement study. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pages 145--156, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. D. Zimmermann, J. Baumann, A. Layh, F. Landstorfer, R. Hoppe, and G. Wolfle. Database correlation for positioning of mobile terminals in cellular networks using wave propagation models. In Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, volume 7, pages 4682--4686 Vol. 7, 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGMOBILE Mobile Computing and Communications Review
      ACM SIGMOBILE Mobile Computing and Communications Review  Volume 17, Issue 2
      April 2013
      26 pages
      ISSN:1559-1662
      EISSN:1931-1222
      DOI:10.1145/2505395
      Issue’s Table of Contents

      Copyright © 2013 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 July 2013

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader