Designs of privacy protection in location-aware mobile social networking applications

The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and some necessary privacy-related functionality in current applications are analyzed and summarized. And with respect to the risks and weak protection methods, we propose the designs of privacy protection in LaMOC which is a location-aware mobile cooperation system developed by us. The designs include both the policy-based mechanisms and computational approaches to protect users' location privacy. Policy-based mechanisms enable users to fully control their locations disclosure while computational approaches can protect users' real locations from malicious attackers. The designs provide a reasonable level of privacy protection in location-aware mobile SNAs to some extent.

[1]  Guanling Chen,et al.  Analyzing Privacy Designs of Mobile Social Networking Applications , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[2]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[3]  George M. Gray,et al.  Risk: A Practical Guide for Deciding What's Really Safe and What's Really Dangerous in the World Around You , 2002 .

[4]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[5]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[6]  Roger Wattenhofer,et al.  VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[7]  Junzhong Gu,et al.  Event Based Semantic Location Model in Cooperative Mobile Computing , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.

[8]  Yang Jing,et al.  An Ontology-Based Approach for Mobile Personalized Recommendation , 2009 .

[9]  George Danezis,et al.  How Much Is Location Privacy Worth? , 2005, WEIS.

[10]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[11]  Lorrie Faith Cranor,et al.  Understanding and Capturing People’s Privacy Policies in a People Finder Application , 2008 .

[12]  Liang He,et al.  Location Aware Mobile Cooperation-Design and System , 2009 .

[13]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[14]  Yao-Jen Chang,et al.  A General Architecture of Mobile Social Network Services , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[15]  Li Shan Attacking Algorithms Against Continuous Queries in LBS and Anonymity Measurement , 2009 .

[16]  Marijke Coetzee,et al.  BlueTrust in a Real World , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[17]  Xu Wei,et al.  BM-CVI: A Backup Method Based on a Cross-Version Integration Mechanism , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[18]  Liang He,et al.  LaMOC - A Location Aware Mobile Cooperative System , 2009, FGIT-SIP.

[19]  Junzhong Gu,et al.  Privacy-Preserving Skyline Queries in LBS , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.

[20]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[21]  John Kelley,et al.  WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.