Middleware for location privacy: an overview

As context-aware mobile applications become increasingly common, privacy issues hit headlines again. Users are faced with a trade-off. On one hand, releasing information about their location allows them to take advantage of new location-based services. On the other hand, releasing such information raises privacy issues about the potential inadequate or even malicious use of location information. Location-based tourist information is a typical service that needs to overcome this tension in order to succeed. Thus, programming such services is challenging in two aspects. First, there is the inherent burden of programming distributed context-aware software. Second, there is the challenge of programming such software in a way that guarantees user privacy. Providing adequate middleware can alleviate the programming burden. In this paper, we provide an analysis of various existing privacy-enabling middleware that can be used to provide programming support for it.

[1]  Peter Langendörfer,et al.  Towards User Defined Privacy in Location- Aware Platforms , 2002, International Conference on Internet Computing.

[2]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[3]  Matthias Baldauf,et al.  A survey on context-aware systems , 2007, Int. J. Ad Hoc Ubiquitous Comput..

[4]  Adrian David Cheok,et al.  Pervasive games: bringing computer entertainment back to the real world , 2005, CIE.

[5]  Harry Chen,et al.  An ontology for context-aware pervasive computing environments , 2003, The Knowledge Engineering Review.

[6]  J. Al-Muhtadi,et al.  Mobile Gaia: a middleware for ad-hoc pervasive computing , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.

[7]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[8]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[9]  Yufei Tao,et al.  Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.

[10]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[11]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[12]  R. Crawshaw,et al.  2. Universal Declaration of Human Rights , 2008 .

[13]  Upkar Varshney,et al.  M-Commerce Services: Promises and Challenges , 2004, Commun. Assoc. Inf. Syst..

[14]  Marvin Theimer,et al.  Providing location information in a ubiquitous computing environment (panel session) , 1994, SOSP '93.

[15]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[16]  Staffan Björk,et al.  Pirates! Using the Physical World as a Game Board , 2001, INTERACT.

[17]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[18]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[19]  W. Hasselbring,et al.  Proceedings of the IASTED International Conference on Software Engineering : as part of the 25th IASTED International Multi-Conference on Applied Informatics : February 13-15, 2007, Innsbruck, Austria , 2007 .

[20]  Marco Bessi A survey about context-aware middleware , 2009 .

[21]  Marvin Theimer,et al.  Scalable, secure, mobile computing with location information , 1993, CACM.

[22]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[23]  Mingxuan Yuan,et al.  Dynamic privacy management: a plug-in service for the middleware in pervasive computing , 2005, Mobile HCI.

[24]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[25]  Gregory D. Abowd,et al.  CyberDesk: a framework for providing self-integrating ubiquitous software services , 1997, UIST '97.

[26]  Mohamed F. Mokbel,et al.  Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[27]  Chi-Yin Chow,et al.  Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks , 2008, SIGMOD Conference.

[28]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[29]  Mark S. Ackerman,et al.  Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.

[30]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[31]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[32]  Gregory D. Abowd,et al.  Cyberguide: A mobile context‐aware tour guide , 1997, Wirel. Networks.

[33]  Yi Zheng,et al.  Towards a Privacy Policy Enforcement Middleware with Location Intelligence , 2007, 2007 Eleventh International IEEE EDOC Conference Workshop.

[34]  Fabien L. Gandon,et al.  Context-awareness, privacy and mobile access: a web semantic and multiagent approach , 2004, UbiMob.

[35]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[36]  Eric Puybaret,et al.  Universal Declaration of Human Rights , 2006 .

[37]  Jukka Riekki,et al.  Context-aware middleware for mobile multimedia applications , 2004, MUM '04.

[38]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[39]  Paul Coulton,et al.  Extending cyberspace: location based games using cellular phones , 2006, CIE.

[40]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[41]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[42]  Hui Zang,et al.  Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.

[43]  Tristan Henderson,et al.  Virtual Walls: Protecting Digital Privacy in Pervasive Environments , 2007, Pervasive.

[44]  Gregory D. Abowd,et al.  CyberDesk: a framework for providing self-integrating context-aware services , 1998, Knowl. Based Syst..

[45]  Peter J. Brown,et al.  The Stick-e Document: a Framework for Creating Context-aware Applications , 1996 .

[46]  Lorrie Faith Cranor,et al.  Web Privacy with P3p , 2002 .

[47]  Susanne Boll,et al.  Paper chase revisited: a real world game meets hypermedia , 2003, HYPERTEXT '03.

[48]  Steve Benford,et al.  Where on-line meets on the streets: experiences with mobile mixed reality games , 2003, CHI '03.

[49]  James Fogarty,et al.  Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.

[50]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[51]  Benoît Garbinato,et al.  Middleware Support for Context-Aware Applications , 2009, Middleware for Network Eccentric and Mobile Applications.