Location privacy models in mobile applications: conceptual view and research directions

Location privacy in mobile, location-aware applications is a prominent research topic spanning across different disciplines and with strong societal implications and expectations. The tumultuous growth of the mobile applications market over the past few years has however hindered the development of a systematic organization and classification of location privacy concepts. In this paper we focus on one of the key concepts, i.e. location privacy metric. We survey existing approaches to the measurement of location privacy and propose a classification framework. The notion of location privacy metric, however, cannot be fully understood without describing the context in which these metrics are used. To that extent we elaborate on the notions of application model and privacy model. The ultimate goal is to contribute to the specification of a conceptual framework for location privacy.

[1]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[2]  Christian S. Jensen,et al.  Location-Related Privacy in Geo-Social Networks , 2011, IEEE Internet Computing.

[3]  Roberto Tamassia,et al.  Haze: privacy-preserving real-time traffic statistics , 2013, SIGSPATIAL/GIS.

[4]  Ernesto Damiani,et al.  Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.

[5]  Stefano Spaccapietra,et al.  Semantic trajectories modeling and analysis , 2013, CSUR.

[6]  Sushil Jajodia,et al.  Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies , 2010, The VLDB Journal.

[7]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[8]  Dirk von Suchodoletz,et al.  Reclaiming Location Privacy in Mobile Telephony Networks—Effects and Consequences for Providers and Subscribers , 2013, IEEE Systems Journal.

[9]  Lorrie Faith Cranor,et al.  Analyzing use of privacy policy attributes in a location sharing application , 2009, SOUPS.

[10]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[11]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[12]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[13]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[14]  Marco Gruteser,et al.  USENIX Association , 1992 .

[15]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[16]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[17]  Daniel J. Solove,et al.  Privacy Self-Management and the Consent Dilemma , 2012 .

[18]  Kyriakos Mouratidis,et al.  Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.

[19]  Karl Aberer,et al.  User-side adaptive protection of location privacy in participatory sensing , 2013, GeoInformatica.

[20]  Maria Luisa Damiani Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends , 2013, European Data Protection.

[21]  Catuscia Palamidessi,et al.  Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.

[22]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[23]  Carmela Troncoso,et al.  Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.

[24]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[25]  Elisa Bertino,et al.  Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications , 2011, IEEE Pervasive Computing.

[26]  Minho Shin,et al.  Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.

[27]  Christian S. Jensen,et al.  Effective Privacy-Preserving Online Route Planning , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.

[28]  Hua Lu,et al.  Location Privacy Techniques in Client-Server Architectures , 2009, Privacy in Location-Based Applications.

[29]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.

[30]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[31]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[32]  Elisa Bertino,et al.  The PROBE Framework for the Personalized Cloaking of Private Locations , 2010, Trans. Data Priv..

[33]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[34]  Klaus Rechert,et al.  Report from Dagstuhl: the liberation of mobile location data and its implications for privacy research , 2013, MOCO.

[35]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[36]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[37]  Maria Luisa Damiani,et al.  Handling user-defined private contexts for location privacy in LBS , 2012, SIGSPATIAL/GIS.

[38]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[39]  Maria Luisa Damiani,et al.  Third party geolocation services in LBS: privacy requirements and research issues , 2011, Trans. Data Priv..

[40]  Maria Luisa Damiani,et al.  Privacy-Preserving Sharing of Sensitive Semantic Locations under Road-Network Constraints , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.

[41]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[42]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[43]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[44]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[45]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[46]  Jong Kim,et al.  Protecting location privacy using location semantics , 2011, KDD.

[47]  Matthias Hollick,et al.  European Data Protection: Coming of Age , 2013 .

[48]  Elisa Bertino,et al.  Protecting Location Privacy through Semantics-aware Obfuscation Techniques , 2008, IFIPTM.

[49]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[50]  Panos Kalnis,et al.  Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.

[51]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[52]  Gabriel Ghinita,et al.  Privacy for Location-based Services , 2013, Privacy for Location-based Services.

[53]  Elisa Bertino,et al.  Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.

[54]  Tetsuji Satoh,et al.  Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[55]  Maria Luisa Damiani,et al.  Privacy-aware geolocation interfaces for volunteered geography: a case study , 2012, GEOCROWD '12.

[56]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[57]  Guanling Chen,et al.  Sharing location in online social networks , 2010, IEEE Network.