Context-Based Privacy Protection for Location-Based Mobile Services using Pseudonyms

This paper discusses the combination of a nifty pseudonym generation mechanism that is used to veil the real world identity of users with semantic user context descriptions and policy reasoning to express decisions of users and thus protects their sensitive location information. The expected development of a new class of mobile applications is further fostered by the underlying service architecture that makes use of the privacy protection means and allows the implementation of the highly postulated pay-as-you-go model. Means for privacy protection are not only an ultimate requirement for the development of successful location-based services and applications. It further means an incentive for network service operators to enrich location-based services by making available their localization capabilities to at the same time to open new sources of revenue.

[1]  Alastair R. Beresford,et al.  Location privacy in ubiquitous computing , 2005 .

[2]  Marco Gruteser,et al.  USENIX Association , 1992 .

[3]  Lalana Kagal,et al.  Self-describing delegation networks for the Web , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[4]  Lalana Kagal,et al.  Policy-based Access Control for Task Computing Using Rei , 2005 .

[5]  Joachim Zeiss,et al.  Using Semantic Policies to Reason over User Availability , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[6]  Gerald Quirchmayr,et al.  Transaction pseudonyms in mobile environments , 2007, Journal in Computer Virology.

[7]  Lalana Kagal,et al.  A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.

[8]  Lalana Kagal,et al.  Using Semantic Web Technologies for Policy Management on the Web , 2006, AAAI.

[9]  S. Bessler,et al.  Policy driven formation of federations between personal networks , 2007, 2007 16th IST Mobile and Wireless Communications Summit.

[10]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[11]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[12]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[13]  Tom Rodden,et al.  A lightweight approach to managing privacy in location-based services , 2002 .