Trust and privacy in location-based services

ZusammenfassungOrtsbasierte Systeme und Dienste gewinnen durch Expansion unterschiedlicher mobiler Endgeräte sowie Mobilfunktechnologien, Technologien wie GPS und der Verfügbarkeit von Internettechnologien zunehmend an Bedeutung. Umso mehr nimmt auch der Bedarf des Schutzes der Privatsphäre der Benutzer zu. Das vorgestellte Verfahren nutzt kryptographische Methoden, um kommerzielle ortsbasierte Dienste, die den Schutz der Privatheit der Nutzer garantieren müssen, zu ermöglichen.SummaryThe continuous expansion of diverse mobile devices with various kinds of integrated sensors, namely GPS receivers, different mobile communications technologies and the ubiquitous availability of and access to the Internet fosters the development of location-based services (LBS). Yet again trust, security and protection of the user's privacy are important for the success of such services. The proposed solution is based on cryptographic techniques, which allow the development and deployment of commercial LBS with privacy protection.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  J. Lane,et al.  Federal Republic of Germany1 , 1996 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Albrecht Schmidt,et al.  There is more to context than location , 1999, Comput. Graph..

[5]  Simone Fischer-Hübner,et al.  IT-Security and Privacy , 2001, Lecture Notes in Computer Science.

[6]  Adam P. Warren,et al.  Right to privacy? The protection of personal data in UK public organisations , 2002 .

[7]  Marco Gruteser,et al.  USENIX Association , 1992 .

[8]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[9]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[10]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[11]  Sandford Bessler,et al.  An Efficient Mechanism to Ensure Location Privacy in Telecom Service Applications , 2004, Net-Con.

[12]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[13]  Sandford Bessler,et al.  A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms , 2005, TrustBus.

[14]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[15]  Axel Küpper Location-based Services: Fundamentals and Operation , 2005 .

[16]  Mohamed F. Mokbel,et al.  Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[17]  Divyakant Agrawal,et al.  Privacy Preserving Query Processing Using Third Parties , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[18]  Gerald Quirchmayr,et al.  A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services , 2007, ACSW.

[19]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[20]  O. Jorns Privacy in location-based services , 2009 .