Implicit Authorization for Social Location Disclosure

Being increasingly equipped with highly-accurate positioning technologies, today’s mobile phones enable their owners to transmit their current position over the cellular network and share it with others. So-called location-based community services make use of this possibility, for example for locating friends, co-workers or family members. Of course, these services give target persons control about the way location data may be accessed by others. So far, this is done by the target explicitly granting or denying permissions through authorization policies or ad-hoc authorization. Unfortunately, apart from bringing along high management effort, the concept of explicit authorization in such a privacy-sensitive application entails the disadvantage of social difficulties. In this paper we introduce the concept of implicit authorization, which has reciprocity as its central element: Another person is granted access to a certain target’s location information implicitly by the target accessing the information of that other person as well. The technique aims to reduce social pressure on the target person when deciding whether a certain person may locate her or not. Also, the target person is relieved from management overhead. Several realizations of implicit authorization are proposed. They differ in the service pattern (reactive/proactive) they are useful for and the way a once given access grant is revoked.

[1]  Gregory D. Abowd,et al.  Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.

[2]  Allison Woodruff,et al.  Making space for stories: ambiguity in the design of personal communication systems , 2005, CHI.

[3]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[4]  Mika Raento,et al.  Privacy management for social awareness applications , 2005 .

[5]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[6]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[7]  Jeffrey T. Hancock,et al.  Advancing ambiguity , 2006, CHI.

[8]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[9]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[10]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[11]  Gregory D. Abowd,et al.  Social Disclosure of Place: From Location Technology to Communication Practices , 2005, Pervasive.

[12]  Georg Treu,et al.  Implicit Authorization for Accessing Location Data in a Social Context , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[13]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[14]  Axel Küpper Location-based Services: Fundamentals and Operation , 2005 .

[15]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[16]  Axel Küpper,et al.  TraX: a device-centric middleware framework for location-based services , 2006, IEEE Communications Magazine.

[17]  Gregory D. Abowd,et al.  Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.

[18]  Clare-Marie Karat,et al.  Evaluating interfaces for privacy policy rule authoring , 2006, CHI.