Browse > Article

Design and Implementation of a Location Privacy System supporting Privacy Self Controls  

Lee, Eung-Jae (한국인터넷진흥원 인터넷기반진흥단)
Ju, Yong-Wan (한국인터넷진흥원 인터넷기반진흥단)
Nam, Kwang-Woo (군산대학교 컴퓨터정보공학과)
Abstract
As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.
Keywords
Location-Based Services; Personal Location Information; Location Privacy; Location Privacy Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Kang, "Protecting Location Privacy in Large- Scale Wireless Sensor Networks," Proc. IEEE Int. Conf. on Communications(ICC2009), pp.1-6, 2009.
2 Z. Xiao, X. Meng, and J. Xu, "Quality Aware Privacy Protection for Location-based Services," Database Systems for Advanced Applications, vol.4443, pp.434-446, 2007.
3 S. Patil and J. Lai, "Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05), ACM Press, pp.101-110, 2005.
4 B. Gedik and L. Liu, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," ICDCS, pp.620-629, 2005.
5 IETF Georaphic Location/Privacy Charter, Geopriv Requirements, IETF RFC Document 3693, 2004.
6 H. Tschofenig, H. Schulzrinne, A. Newton, and J. Peterson, "The IETF Geopriv and Presence Architecture Focusing on Location Privacy," W3C Workshop on Languages for Privacy Policy Negotiation and Sematics-Driven Enforcement, October 2006.
7 K. Tang, J. Fogarty, P. Keyani, and J. Hong, "An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications," Proc. SIGCHI Conf. Human Factors in Computing Systems(CHI 06), ACM Press, pp.93-102, 2006.
8 J. Kwak, K. W. Lee, S. J. Kim, and D. H. Won, "RFID System based Missing Child Location Tracking System with Fairness," 5th RFID/USN Research Paper Awards, 2005.
9 M. Gruteser and X. Liu, "Protecting Privacy in Continuous Location-Tracking Applications," IEEE Security and Privacy, vol.2, no.2, 2004.   DOI
10 D.V. Oheimb and J. Cuellar, "Designing and Verifying Core Protocols for Location Privacy," Proc. 9th Information Security Conf., pp.502-516, 2006.
11 M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," MobiSys, pp.31-42, 2003.
12 T. Xu and Y. Cai, "Location Anonymity in Continuous Location-based Services," ACMGIS, pp.221- 238, 2007.
13 Open Mobile Alliance, Mobile Location Service V1.1 : Privacy Checking Protocol, Open Mobile Alliance Enabler Standard, 2006.
14 A. Gupta, M. Saini, and A. Mathuria, "Security Analysis of The Louis Protocol for Location Privacy," Proc. 1st Int. Conf. on COMmunicaiton Systems and NETworks, pp.200-207, 2009.
15 Q. He, D. Wu, and P. Khosla, "A Mechanism for Personal Control over Mobile Location Privacy," BroadWISE2004, 2004.
16 M.F. Mokbel, C.Y. Chow, and W.G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy," VLDB, pp.763-774, 2006.
17 R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving User Location Privacy in Mobile Data Management Infrastructures," Privacy Enhancing Technology Workshop, vol.4258, pp.393-412, 2006.
18 J. H. Kim, A. R. Lee, Y. K. Kim, J. H. Um, and J. W. Chang, "Cloaking Method supporting Kanonymity and L-diversity for Privacy Protection in Location-Based Services," Journal of Korea Spatial Information Society, vol.10, no.4, pp.1-10, 2008.
19 N. H. Lee, J. H. Park, and B. I. Ahn, "LBS Standard Reference System supporting Locationbased Application Services," Proceedings of Korea Spatial Information System Society Conference, pp.33-38, 2004.
20 D. Anthony, D. Kotz, and T. Henderson, "Privacy in Location-Aware Computing Environment," Pervacive Computing, pp.64-72, October 2007.
21 Q. Jones et al., "Putting Systems into Place: A Qualitative Study of Design Requirements for Location-Aware Community Systems," Proc. ACM Conf. Computer Supported Cooperative Work (CSCW 04), ACM Press, pp.202-211, 2004.
22 J. Warrior, E. McHenry, and K. McGee, "They Know Where You Are," IEEE Spectrum, vol.40 no.7, pp.20-25, 2003.
23 S. H. Lee, K. W. Min, J. C. Kim, J. W. Kim, and J. H. Park, "LBS Technology Trends," Electronics and Communication Trends Analysis, vol.20, no.3, pp.33-42, 2005.
24 SERI, Rasing LBS, CEO Information, vol.615, 2007.
25 J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol.34, no.8, pp.57-66, IEEE Computer Society Press, Aug. 2001.   DOI   ScienceOn
26 J. S. Lee and S. K. Kim, "Technology Trends and World-wide Industry Market Analysis of Location- Based Services(LBS)," IITA, vol.5, no.2, 2003.