Abstract
With the emergence of the mobile app ecosystem, user location data has escaped the grip of the tightly regulated telecommunication industry and is now being collected at unprecedented scale and accuracy by mobile advertising, platform, and app providers. This position paper is based on discussions of the authors at the Dagstuhl seminar on Mobility Data Mining and Privacy. It seeks to highlight this shift by providing a tutorial on location data flows and associated privacy risks in this mobile app ecosystem. Moreover, it reflects on the implications of this shift to the mobile privacy research community.
- Mobile apps for kids: Current privacy disclosures are disappointing. Technical report, Federal Trade Commission, 2012. http://www.ftc.gov/os/2012/02/120216mobile apps kids.pdf.Google Scholar
- G. Andrienko and N. Andrienko. Privacy issues in geospatial visual analytics. In Georg Gartner, Felix Ortag,William Cartwright, Georg Gartner, Liqiu Meng, and Michael P. Peterson, editors, Advances in Location-Based Services, Lecture Notes in Geoinformation and Cartography, pages 239--246. Springer Berlin Heidelberg, 2012.Google Scholar
- G. L. Andrienko, N. V. Andrienko, C. Hurter, S. Rinzivillo, and S. Wrobel. From movement tracks through events to places: Extracting and characterizing significant places from mobility data. In IEEE VAST, pages 161--170. IEEE, 2011.Google ScholarCross Ref
- G. L. Andrienko, N. V. Andrienko, M. Mladenov, M. Mock, and C. Pölitz. Identifying place histories from activity traces with an eye to parameter impact. IEEE Trans. Vis. Comput. Graph., 18(5):675--688, 2012. Google ScholarDigital Library
- N. Andrienko, G. Andrienko, H. Stange, T. Liebig, and D. Hecker. Visual analytics for understanding spatial situations from episodic movement data. KI - Künstliche Intelligenz, pages 241--251, 2012.Google ScholarCross Ref
- M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, and S. Reale. Map-based location and tracking in multipath outdoor mobile networks. Wireless Communications, IEEE Transactions on, 10(3):814--824, march 2011. Google ScholarDigital Library
- C. Arthur. iphone keeps record of everywhere you go. The Guardian, 2011. http://www.guardian.co.uk/technology/2011/apr/20/iphone-trackingprompts-privacy-fears.Google Scholar
- L. Bengtsson, X. Lu, A. Thorson, R. Garfield, and J. von Schreeb. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: A postearthquake geospatial study in haiti. PLoS Med, 8(8):e1001083, 08 2011.Google ScholarCross Ref
- N. Bilton. 3G Apple iOS devices are storing users location data. The New York Times, Published: April 20, 2011, 2011.Google Scholar
- N. Bilton. Holding companies accountable for privacy breaches. The New York Times, Published: April 27, 2011, 2011.Google Scholar
- Christopher W. Clifton, Bart Kuijpers, Katharina Morik, and Yucel Saygin. Mobility Data Mining and Privacy (Dagstuhl Seminar 12331). Dagstuhl Reports, 2(8):16--53, 2012.Google Scholar
- W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarDigital Library
- European Parlament and European Council. Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, (L281), 1995.Google Scholar
- Council European Parliament. Directive 2006/24/ec of the european parliament and of the council of 15 march 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending directive 2002/58/ec. Official Journal of the European Union, L 105:54--63, 2006.Google Scholar
- Gartner, Inc. Gartner says worldwide mobile advertising revenue forecast to reach $3.3 billion in 2011, 2011. http://www.gartner.com/it/page.jsp?id=1726614.Google Scholar
- Philippe Golle and Kurt Partridge. On the anonymity of home/work location pairs. In Hideyuki Tokuda, Michael Beigl, Adrian Friday, A. Brush, and Yoshito Tobe, editors, Pervasive Computing, volume 5538 of Lecture Notes in Computer Science, pages 390--397. Springer Berlin / Heidelberg, 2009. Google ScholarDigital Library
- M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pages 101--112, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- A. Greenberg. Phone 'rootkit' maker carrier iq may have violated wiretap law in millions of cases. Forbes, 2011. http://www.forbes.com/sites/andygreenberg/2011/11/30/phone-rootkitcarrier-iq-may-have-violatedwiretap-law-in-millions-of-cases/. Retrieved 2012/10/18.Google Scholar
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pages 31--42, New York, NY, USA, 2003. ACM. Google ScholarDigital Library
- H. Haddadi, P. Hui, T. Henderson, and I. Brown. Targeted advertising on the handset: Privacy and security challenges. In Hans Jrg Mller, Florian Alt, and Daniel Michelis, editors, Pervasive Advertising, Human-Computer Interaction Series, pages 119--137. Springer, 2011.Google Scholar
- M. Helft. Apple and Google use phone data to map the world. The New York Times, Published: April 25, 2011, 2011.Google Scholar
- K. Hill. Forbes, 2012. http://www.forbes.com/sites/kashmirhill/2012/02/07/theaustrian-thorn-in-facebooks-side/. Retrieved 2012/10/18.Google Scholar
- P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACMconference on Computer and communications security, CCS '11, pages 639--652, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- H. Jun, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang. Accomplice: Location inference using accelerometers on smartphones. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on, pages 1--9, 2012. Google ScholarDigital Library
- D. Kravets. An intentional mistake: The anatomy of googles wi-fi sniffing debacle. Wired, 2011. http://www.wired.com/thr eatlevel/2012/05/google-wifi-fccinvestigation/. Retrieved 2012/10/18.Google Scholar
- J. Krumm. Ubiquitous advertising: The killer application for the 21st century. Pervasive Computing, IEEE, 10(1):66--73, jan.-march 2011. Google ScholarDigital Library
- S. Landtag. Druchsache 5/6787. Sächsischer Landtag 5. Wahlperiode, 2011.Google Scholar
- E. Lichtblau. Police are using phone tracking as a routine tool. The New York Times, Published: March 31, 2012, 2012.Google Scholar
- C. Ling, M. Loschonsky, and L. M. Reindl. Characterization of delay spread for mobile radio communications under collapsed buildings. In IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pages 329--334, Sept. 2010.Google ScholarCross Ref
- C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. V. Rao. Privacy vulnerability of published anonymous mobility traces. In Proceedings of the sixteenth annual international conference on Mobile computing and networking, MobiCom '10, pages 185--196, New York, NY, USA, 2010. ACM. Google ScholarDigital Library
- D. McCullagh. Microsoft collects locations of Windows phone users. CNet News, Published: April 25, 2011, 2011.Google Scholar
- E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury. Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pages 323--336, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- Ministerium für Inneres und Kommunales NRW. Funkzellenauswertung (FZA) und Versenden "Stiller SMS" zur Kriminalitätsbekämpfung. MMD 15/3300, 2011.Google Scholar
- P. Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, Vol. 57, p. 1701, 2010, 2009.Google Scholar
- ZEIT Online. Landgericht erklärt funkzellenabfrage auf demo für rechtswidrig. Die Zeit, 2013. http://www.zeit.de/digital/datenschutz/2013-04/funkzellenabfragedresden-landgericht.Google Scholar
- K. Rechert, K. Meier, B. Greschbach, D.Wehrle, and D. von Suchodoletz. Assessing location privacy in mobile communication networks. In H. Li X. Lai, J. Zhou, editor, ISC 11, LNCS 7001, pages 309--324. Springer, Heidelberg, 2011. Google ScholarDigital Library
- E. Smith. iphone applications & privacy issues: An analysis of application transmission of iphone unique device identifiers (udids). Technical report, PSKL, 2010. http://www.pskl.us/wp/wpcontent/ uploads/2010/09/iPhone-Applications-Privacy-Issues.pdf.Google Scholar
- G. Sun, J. Chen, W. Guo, and K. J. R. Liu. Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs. Signal Processing Magazine, IEEE, 22(4):12--23, July 2005.Google ScholarCross Ref
- S. Thurm and I. Yukari Kane. Your apps are watching you. The Wall Street Journal, 2010. http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html.Google Scholar
- W. H. Ware. Records, computers, and the rights of citizens. Secretary's Advisory Committee on Automated Personal Data Systems, Department of Health, Education and Welfare, Washington, D.C., 1973.Google Scholar
- H. Zang and J. Bolot. Anonymization of location data does not work: a large-scale measurement study. In Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pages 145--156, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- D. Zimmermann, J. Baumann, A. Layh, F. Landstorfer, R. Hoppe, and G. Wolfle. Database correlation for positioning of mobile terminals in cellular networks using wave propagation models. In Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, volume 7, pages 4682--4686 Vol. 7, 2004.Google ScholarCross Ref
Index Terms
- Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research
Recommendations
Conference Report
WOSC AND IIGSS JOINT CONFERENCE, PITTSBURGHThe Twelfth Congress of the World Organisation of Systems and Cybernetics, and the Fourth Workshop of the International Institute of General Systems Studies were held as a joint event in Pittsburgh, ...
Congress Report
15th TRIENNIAL WORLD CONGRESS OF THE INTERNATIONAL FEDERATION OF AUTOMATIC CONTROL (IFAC), BARCELONA, SPAIN, 21st–26th JULY, 2002The World Congress under the Spanish presidency (Prof. P. Albertos) brought together about 2000 researchers and ...
GeoPrivacy 2015 workshop report: the second ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (Seattle, WA, USA - November 3, 2015)
Developments in mobile and surveying technologies over the past decade have enabled the collection of individual-level and aggregated geographic information at unprecedented scale. These data are valuable sources for answering scientific questions about ...
Comments