ABSTRACT
A location corroboration of a person is a proof, in the form of a digital record, indicating that this person was at a particular place at a given time. That is, given a user u, a location l and a time t, a location corroboration is a certified evidence that u was at location l at time t. Such corroborations can be used in legal procedures, help solving personal disputes or enable services that rely on knowing with certainty the location of a user at a given time. A corroboration without traces means that the user location is not stored in any public server or in any other public entity, to protect the user privacy. In this paper we present the problem of producing a location corroboration without traces, using a mobile device, and we discuss possible solutions to it.
- J. T. Biehl, A. J. Lee, G. Filby, and M. Cooper. You're where? prove it!: Towards trusted indoor location estimation of mobile devices. In Proc. of the 2015 ACM International Joint Conf. on Pervasive and Ubiquitous Computing, pages 909--919, 2015. Google ScholarDigital Library
- D. Gafurov, K. Helkala, and T. Søndrol. Biometric gait authentication using accelerometer sensor. Journal of computers, 1(7):51--59, 2006. Google ScholarCross Ref
- W. He, X. Liu, and M. Ren. Location cheating: A security challenge to location-based social network services. In Proc. of the 2011 31st International Conf. on Distributed Computing Systems, pages 740--749. IEEE Computer Society, 2011. Google ScholarDigital Library
- R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168--176, 1990. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In Proc. of the 1st ACM Workshop on Online Social Networks, pages 37--42, 2008. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. In Proc. of the 2nd ACM Workshop on Online Social Networks, pages 7--12. ACM, 2009. Google ScholarDigital Library
- J. Krumm. Inference attacks on location tracks. In International Conf. on Pervasive Computing, pages 127--143. Springer, 2007. Google ScholarCross Ref
- M. Lei, X. Hong, and S. V. Vrbsky. Protecting location privacy with dynamic mac address exchanging in wireless networks. In IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pages 49--53. IEEE, 2007.Google ScholarCross Ref
- J. Mahmud, J. Nichols, and C. Drews. Home location identification of twitter users. ACM Trans. Intell. Syst. Technol., 5(3):47:1--47:21, 2014.Google ScholarDigital Library
- M. Miettinen, N. Asokan, F. Koushanfar, T. D. Nguyen, J. Rios, A.-R. Sadeghi, M. Sobhani, and S. Yellapantula. I know where you are: Proofs of presence resilient to malicious provers. In Proc. of the 10th ACM Symposium on Information, Computer and Communications Security, pages 567--577. ACM, 2015. Google ScholarDigital Library
- F. Monrose and A. D. Rubin. Keystroke dynamics as a biometric for authentication. Future Generation computer systems, 16(4):351--359, 2000. Google ScholarDigital Library
- I. Polakis, S. Volanis, E. Athanasopoulos, and E. P. Markatos. The man who was there: Validating check-ins in location-based services. In Proc. of the 29th Annual Computer Security Applications Conference, pages 19--28. ACM, 2013. Google ScholarDigital Library
- R. Rivest. The MD5 message-digest algorithm, 1992.Google Scholar
- R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120--126, 1978. Google ScholarDigital Library
- S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In Proc. of the 10th Workshop on Mobile Computing Systems and Applications, pages 3:1--3:6. ACM, 2009. Google ScholarDigital Library
- J. S. Warner and R. G. Johnston. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration, 25(2):19--27, 2002.Google Scholar
- J. Wayman, A. Jain, D. Maltoni, and D. Maio. An introduction to biometric authentication systems. Springer, 2005. Google ScholarCross Ref
Index Terms
- Location corroborations by mobile devices without traces
Recommendations
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A ...
Preserving location privacy without exact locations in mobile services
Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking ...
Protecting location privacy using location semantics
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs the use of mobile devices increases, a location-based service (LBS) becomes increasingly popular because it provides more convenient context-aware services. However, LBS introduces problematic issues for location privacy due to the nature of the ...
Comments