Abstract
Social networking has evolved as a basic amenity in today’s interconnected world. Users of social media tools do not always keep up with privacy policies and its adverse effects. It is very common that even experienced users are often caught unaware of actions that happen behind the interface screens of their interconnection devices. Many-a-time mobile application developers take advantage of such user complacency and leak location information from the device (and hence information about the user) to other applications. Though there has been considerable alerts raised on the issue of location information leakage, there are situations wherein applications sneak through these ‘walls’ and connect with devices / applications to extract / query desired information from the firmware. In this work, we provide a in-depth review of literature on this emerging area of social interest, and propose a four-layer context-based authentication framework (4-CBAF) to address location privacy concerns. The 4-CBAF framework provides a facility for users to share pertinent information only if the user specifically authorizes such information sharing. The 4-CBAF is intelligent enough to reduce the number of human interventions that a user should attend to. The effectiveness of the proposed 4-CBAF is also demonstrated for check-in application for Facebook using smart devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chen, Y., Liu, D.: Location-Aware Services and its Infrastructure Support. In: Enabling Technologies for Wireless E-Business, pp. 312–334. Springer, Heidelberg (2006)
Weiser, M.: Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM 6(7), 75–84 (1993)
Harter, A., Hopper, A.: A distributed location system for the active office. IEEE Network 8(1), 62–70 (1994)
Chang, W., Wu, J., Tan, C.C.: Enhancing Mobile Social Network Privacy. In: IEEE Global Telecommunications Conference (GLOBECOM 2011), December 5-9, pp. 1–5 (2011)
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing Security and Privacy in Traffic-Monitoring Systems. IEEE Pervasive Computing 5(4), 38–46 (2006)
Xie, H., Kulik, L., Tanin, E.: Privacy-Aware Traffic Monitoring. IEEE Transactions on Intelligent Transportation Systems 11(1), 61–70 (2010)
Shokri, R., Theodorakopoulos, G., Le Boudec, J., Hubaux, J.: Quantifying Location Privacy. In: IEEE Security and Privacy (SP), May 22-25, pp. 247–262 (2011)
Shokri, R., Freudiger, J., Hubaux, J.-P.: A unified framework for location privacy. In: 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs (2010)
Decker, M.: Location Privacy-An Overview. In: 7th International Conference on Mobile Business, ICMB 2008, pp.221–230, July 7-8 (2008)
Nayak, D., Ramaswamy, S.: A Multi-level Contextualization Framework for Authentication in Mobile Payment Applications. In: 11th International Conference on Wireless Networks (ICWN 2012), USA, July 16-19 (2012)
Minch, R.P.: Privacy Issues in Location –Aware mobile devices. In: 37th Hawaii International Conference on System Sciences, Big Island, HI, USA. IEEE Computer Society (2004) ISBN 0-7695-2056-1
Wang, J.I., Loui, M.C.: Privacy and Ethical issues in location–Based Tracking systems. In: Proc. of the 2009 IEEE International Symposium on Technology and Society, Wasington DC, USA (2009)
Bowen III, C.L., Martin, T.L.: A survey of Location privacy and an Approach for SolitaryUsers. In: 40th Hawaii Intnl. Conf. on System Sciences, Big Island, Hawaii (2007) ISBN 0-7695-2755-8
Zhu, C., Wat, K.K., et al.: Privacy and Social Effects in Location Sharing Services. In: Proceeding of 2012 IEEE First International Conference on Services Economics, Hawaii,USA, June 24-29 (2012)
GeekTools, "GTWhois," Centergate Research Group, LLC (2003)
VisualRoute, "VisualRoute 2006 Personal Edition," Visualware, Inc. (2006)
The Communications Act of 1934, 47 U.S.C(151-614), Public Law 416 (1934)
The Location Privacy Protection Act of 2001 (2001)
The Wireless Privacy Protection Act of 2003 (2003)
The Wireless Privacy Protection Act of 2005 (2005)
The Wireless 411 Privacy Act (2005)
European Union Directive on Privacy and Electronic Communications (2002)
Dowdell, E.M.: You are here! Mapping the boundaries of the Fourth Amendment with GPS technology. Rutgers Computer and Technology Law Journal 32(1), 109–139 (2005)
Lockton, V., Rosenberg, R.S.: RFID: the next serious threat to privacy. Ethics and Info. Tech. 7(4), 221–231 (2005)
Michael, M.G., Fusco, S.J., Michael, K.: A research note on ethics in the emerging age of uberveillance (überveillance). Computer Communications 31(6), 1192–1199 (2008)
Perusco, L., Michael, K.: Control, trust, privacy, and security: evaluating location-based services. IEEE Technologyand Society Magazine 26(1), 4–16 (2007)
Peslak, A.R.: An ethical exploration of privacy and radio frequency identification. Jour. of Business Ethics 59(4), 327–345 (2005)
Wasieleski, D.M., Gal-Or, M.: An enquiry into the ethical efficacy of the use of radio frequency identification technology. Ethics and Information Technology 10(1), 27–40 (2008)
Lin, D., Loui, M.C.: Taking the byte out of cookies: privacy, consent, and the Web. Computers and Society 28(2), 39–51 (1998)
Lin, D., Loui, M.C.: Taking the byte out of cookies: privacy, consent, and the Web. Computers and Society 28(2), 39–51 (1998)
Hengather, U., Steenkiste, P.: Avoiding privacy violation caused by context –sensitive services. In: Forth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 2006), March 13-17, p. 233 (2006)
Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing 2(1), 56–64 (2003)
Xu, H., Gupta, S., et al.: Effectiveness of privacy Assurances Approaches In Location-Based Services:A Study of India and United States. In: Proceeding of Eighth International Conference on Mobile Business (2009)
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., Colautti, C.: Internet users’ privacy concerns and beliefs about governmentsurveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management 14(4), 57–93 (2006)
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., Colautti, C.: Privacy Calculus Model in E-commerce - a Study of Italy and the United States. European Journal of Information Systems 15(4), 389–402 (2006)
Kumaraguru, P., Cranor, L.: Privacy in India: Attitudes and Awareness. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 243–258. Springer, Heidelberg (2006)
Milberg, S.J.B., Smith, J.S.H.J., Kallman, A.E.: Values, Personal Information Privacy Concerns, and Regulatory Approaches. Comm. of the ACM 38(12), 65–74 (1995)
Nowak, G.J., Phelps, J.: Understanding Privacy Concerns: An Assessment of Consumers’s Information-Related Knowledge and Beliefs. Journal of Direct Marketing 6(4), 28–39 (1992)
Wang, P.: Information-Systems Solutions for Transborder Data Flow Problems for Multinational Companies. International Journal of Information Management 13(1), 29–40 (1993)
Margulis, S.T.: On the Status and Contribution of Westin’s and Altman’s Theories of Privacy. Jour. of Social Issues 59(2), 411–429 (2003)
Bertino, E., Kirkpatrick, M.: Location-Aware Authentication and Access Control-Concepts and Issues. In: International Conference on Advanced Information Networking and Aplications(AINA), May 26-29. University of Bradford, Bradford, UK (2009)
Michael, K., McNamee, A., Michael, M.G.: The Emerging Ethics of Humancentric GPS Tracking and Monitoring. In: Proc. of the International Conference on Mobile Business (ICMB 2006), Copenhagen, Denmark, June 26-27. IEEE Computer Society (2006) ISBN 0-7695-2595-4
Dobson, J.E., Fisher, P.F.: Geoslavery. IEEE Technology and Society Magazine 22(1), 47–52 (2003)
Garfinkel, S.L., et al.: RFID Privacy: An Overview of Problem and Proposed Solutions. IEEE Securityand Privacy Mag. 3(3), 38–43 (2005)
Michael, K., Michael, M.G.: Microchipping People: the Rise of the Electrophorus. Quadrant, 22–33 (March 2005)
Perusco, L., Michael, K.: Humancentric Applications of Precise Location-Based Services. In: IEEE Conference on e-Business Engineering, pp. 409–418. IEEE Computer Society, Beijing (2005)
Kaupins, G., Minch, R.: Legal and Ethical Implications of Employee Location Monitoring. In: 38th Hawaii Intnl. Conf. on System Sciences (2005), http://csdl2.computer.org/comp/proceedings/hicss/2005/2268/05/22680133a.pdf
Perakslis, C., Wolk, R.: Social Acceptance of RFID as a Biometric Security Method. In: Proceedings of the IEEE Symposium on Technology and Society, pp. 79–87 (2005)
Stajano, F.: Viewpoint: RFID Is X-ray Vision. Communications of the ACM 48(9), 31–33 (2005)
Google Earth, http://earth.google.com/
NASA World Wind, http://worldwind.arc.nasa.gov/
Microsoft Virtual Earth, http://www.microsoft.com/virtualearth/
Skyline Globe, http://www.skylinesoft.com/
Fleet, G.J., Williamson, M.: Research data in Google Earth: how do we protect privacy and meet ethical obligations? In: Proceeding World Congress on Privacy, Delta Brunswick, Saint John, New Brunswick, Canada, August 25-27 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nayak, D., Swamy, M.V., Ramaswamy, S. (2013). Supporting Location Information Privacy in Mobile Devices. In: Hota, C., Srimani, P.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2013. Lecture Notes in Computer Science, vol 7753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36071-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-36071-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36070-1
Online ISBN: 978-3-642-36071-8
eBook Packages: Computer ScienceComputer Science (R0)