skip to main content
10.1145/2659651.2659680acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices

Authors Info & Claims
Published:09 September 2014Publication History

ABSTRACT

Smartphones and tablet computers continue to replace traditional mobile phones and are used by over one billion people worldwide. A number of novel security and privacy challenges result from the possibility to extend the functionality of smartphones with third-party applications. These third-party applications require that users provide personal information to third-party applications in exchange for additional features. This paper focuses on one specifically sensitive information requested by third-party applications, namely: location information. We discuss current methods to protect the privacy of location information and evaluate two approaches in depth. First, we introduce an extension to improve the usability of current interception methods on an operating system level. Second, we evaluate the applicability of proxy-level interception on basis of real-world Android applications. Our findings significantly extend the state-of-the-art regarding the protection of location information on mobile devices and further highlight open research challenges.

References

  1. Agarwal, Yuvraj and Hall, Malcolm. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing. MobiSys, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Andersen, Mads Schaarup and Kjærgaard, Mikkel Baun. Towards a New Classification of Location Privacy Methods in Pervasive Computing. In Mobile and Ubiquitous Systems: Computing, Networking, and Services, pages 150--161. Springer, 2012.Google ScholarGoogle Scholar
  3. Anderson, Ian and Maitland, Julie and Sherwood, Scott and Barkhuus, Louise and Chalmers, Matthew and Hall, Malcolm and Brown, Barry and Muller, Henk. Shakra: tracking and sharing daily activity levels with unaugmented mobile phones. Mobile Networks and Applications, 12(2--3):185--199, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ardagna, Claudio Agostino and Cremonini, Marco and Damiani, Ernesto and di Vimercati, S De Capitani and Samarati, Pierangela. Location privacy protection through obfuscation-based techniques. In Data and Applications Security XXI, pages 47--60. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bamba, Bhuvan and Liu, Ling and Pesti, Peter and Wang, Ting. Supporting anonymous location queries in mobile environments with privacygrid. In Proceedings of the 17th international conference on World Wide Web, pages 237--246. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Barkhuus, Louise and Dey, Anind K. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. In INTERACT, volume 3, pages 702--712. Citeseer, 2003.Google ScholarGoogle Scholar
  7. Bellavista, Paolo and Corradi, Antonio and Giannelli, Carlo. Efficiently managing location information with privacy requirements in wi-fi networks: a middleware approach. In 2nd International Symposium on Wireless Communication Systems, pages 91--95. IEEE, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  8. Benisch, Michael and Kelley, Patrick Gage and Sadeh, Norman and Cranor, Lorrie Faith. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing, 15(7):679--694, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Beresford, Alastair R and Rice, Andrew and Skehin, Nicholas and Sohan, Ripduman. MockDroid: trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Beresford, Alastair R and Stajano, Frank. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Brush, AJ and Krumm, John and Scott, James. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 95--104. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Damiani, Maria L and Bertino, Elisa and Silvestri, Claudio. Protecting location privacy through semantics-aware obfuscation techniques. In Trust Management II. Springer, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  13. Farrahi, Katayoun and Gatica-Perez, Daniel. Daily routine classification from mobile phone data. In Machine Learning for Multimodal Interaction, pages 173--184. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Fisher, Drew and Dorner, Leah and Wagner, David. Location Privacy: User Behavior in the Field. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pages 51--56. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gartner. Worldwide smartphone sales in November 2013. http://www.gartner.com/newsroom/id/2623415, 2013. {Online; accessed 30-November-2013}.Google ScholarGoogle Scholar
  16. Henne, Benjamin. Android Location Privacy - A location obfuscation framework for Android. http://bhenne.github.io/android-location-privacy/. {Online; accessed 30-November-2013}.Google ScholarGoogle Scholar
  17. Henne, Benjamin and Kater, Christian and Smith, Matthew and Brenner, Michael. Selective cloaking: Need-to-know for location-based apps. In Eleventh Annual International Conference on Privacy, Security and Trust (PST), pages 19--26. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hong, Jason I and Landay, James A. An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 177--189. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM conference on Computer and communications security, pages 639--652. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Junglas, Iris A and Spitzmuller, Christiane. A research model for studying privacy concerns pertaining to location-based services. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, pages 180b--180b. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Kaasinen, Eija. User needs for location-aware mobile services. Personal and ubiquitous computing, 7(1):70--79, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kessinger, Kristen and Gellman, Marv. Geolocation Use and Concerns Survey. Tech. rep. ISACA, 2012.Google ScholarGoogle Scholar
  23. Krumm, John. Inference attacks on location tracks. In Pervasive Computing, pages 127--143. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Krumm, John. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391--399, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lindqvist, Janne and Cranshaw, Justin and Wiese, Jason and Hong, Jason and Zimmerman, John. I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2409--2418. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Minch, Robert P. Privacy issues in location-aware mobile devices. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Mokbel, Mohamed F and Chow, Chi-Yin and Aref, Walid G. The new Casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pages 763--774. VLDB Endowment, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Stach, Christoph and Mitschang, Bernhard. Privacy Management for Mobile Platforms--A Review of Concepts and Approaches. In 14th International Conference on Mobile Data Management (MDM), volume 1, pages 305--313. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sweeney, Latanya. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Wernke, Marius and Skvortsov, Pavel and Dürr, Frank and Rothermel, Kurt. A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, pages 1--13, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
          September 2014
          518 pages
          ISBN:9781450330336
          DOI:10.1145/2659651

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 September 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          SIN '14 Paper Acceptance Rate32of109submissions,29%Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader