Location Based Services and Privacy Issues
description
Transcript of Location Based Services and Privacy Issues
![Page 1: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/1.jpg)
Location Based Services and Privacy Issues
Tsovinar ChugaszyanPresentation date 07.02.11
![Page 2: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/2.jpg)
2
LBS Technologies- Main components- Infrastructure- Applications
Privacy in LBS- Threats and concerns- Solutions for privacy-preserving LBS- Analysis and challenges
Outline
![Page 3: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/3.jpg)
3
Main idea: utilize the location information of the user in order to provide different services
One of the most important Value-Added Services in the mobile market
The first commercial LBS service: introduced in 2001 by Japanese mobile operator NTT-DoCoMo,
Location Based Services
![Page 4: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/4.jpg)
4
Main Components
![Page 5: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/5.jpg)
5
Main data flow between the LBS components
![Page 6: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/6.jpg)
6
Categories and examples of applications Information services – requesting the rearest ATM Navigation - how to reach the specified target
location Emergency - person who is in a need of ambulance
and is lost in woods Entertainment – social networking, mobile games Marketing – location-based mobile advertising Tracking – tracking of postal packages
LBS Applications
![Page 7: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/7.jpg)
7
Revealing of sensitive information about an individual or a union. There are already some real life incidents
Social networking platforms: Google Latitude, FourSquere, Gowalla, Facebook raise safety issues of the user's movement tracking records
Misuse of location information may also have commercial purposes
Privacy and Security Issues
![Page 8: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/8.jpg)
8
Aim to protect and preserve the privacy of the user's personal data (e.g. Directive on privacy and electronic communications by The European Parliament and the Council of the European Union)
Main point: the user must be able to control the availability of her location information, i.e. who can access it and for what purposes
Used in conjunction with technical Solutions
Existing solutions for privacy protection: Legal Frameworks
![Page 9: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/9.jpg)
9
The 3 main categories of Privacy-Enhancing Technologies: Cryptographic Encryption techniques-
security mechanisms providing location authentication and authorization.
Pseudonymization techniques- replace the user's actual identity with an artificial one (pseudonym).
Location anonymization techniques-transform the precise location of the user into a cloaked spatial area.
Existing solutions for privacy protection: Technical Solutions
![Page 10: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/10.jpg)
10
Main idea: the exact location information of the user gets transformed into cloaked location areas
Metric: k-anonymity, indicates that the user prefers to be not distinguishable among k users
The most famous model: Trusted Third Party paradigm, which utilizes a middle layer between the mobile device and the database server
Location Anonymization
![Page 11: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/11.jpg)
11
Sample privacy-preserving architechture
![Page 12: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/12.jpg)
12
Processing of queries
Location anonymization algorithm
![Page 13: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/13.jpg)
13
TTP Advantages : suitable for real time applications requires less operating costs.
TTP Drawbacks : trust vs. financial obligations creates risks of compromising the privacy in
case trusted party gets attacked
Analysis
![Page 14: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/14.jpg)
14
The tradeoff between privacy and the quality of service that the LBS can provide.
The strong solution is the one which provides best balance
“….develop customizable privacy protection mechanisms that can help users find a comfortable balance between the extreme of fully disclosed location data and the extreme of completely withheld location data.„(L. Liu)
The Main Challenge
![Page 15: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/15.jpg)
15
Special thanks to our tutors
and
to all reviewers of my work for very helpful remarks
![Page 16: Location Based Services and Privacy Issues](https://reader036.fdocuments.in/reader036/viewer/2022062323/568163ee550346895dd5624f/html5/thumbnails/16.jpg)
16
Thank you for your attention!