[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1864349.1864381acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Exploring end user preferences for location obfuscation, location-based services, and the value of location

Published: 26 September 2010 Publication History

Abstract

Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can reveal private information including home addresses and schedules. We asked 32 participants from 12 households to collect 2 months of GPS data, and showed it to them in visualizations. We explored if they understood how their individual privacy concerns mapped onto 5 location obfuscation schemes (which they largely did), which obfuscation schemes they were most comfortable with (Mixing, Deleting data near home, and Randomizing), how they monetarily valued their location data, and if they consented to share their data publicly. 21/32 gave consent to publish their data, though most households' members shared at different levels, which indicates a lack of awareness of privacy interrelationships. Grounded in real decisions about real data, our findings highlight the potential for end-user involvement in obfuscation of their own location data.

References

[1]
}}Anthony, D., Henderson, .T and Kotz D., Privacy in Location-Aware Computing Environments, IEEE Pervasive Computing, vol. 6, 2007, pp. 64--72.
[2]
}}Agapie, E. et al. Seeing Our Signals: Combining location traces and web-based models for personal discovery. Proc. Hotmobile 2008.
[3]
}}Barkhuus, L. and Dey, A. K. Location-Based Services for Mobile Telephony: a study of users' privacy concerns. Proc. Interact 2003, 207--212.
[4]
}}Beresford, A. and Stajano, F. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46--55, 2003.
[5]
}}Chen, M., et al. Practical Metropolitan-scale Positioning for GSM Phones. Proc. UbiComp 2006, Springer-Verlag.
[6]
}}Colbert, M. A Diary Study of Rendezvousing: Implications for Position-aware Communications for Mobile Groups. Proc. GROUP 2001. ACM Press 15--23, 2001.
[7]
}}Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J. & Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc CHI 2005, ACM Press, 81--90.
[8]
}}Cvrcek, D. et al., A Study on the Value of Location Privacy. Proc. Workshop on Privacy in the Electronic Society. 2006, ACM 109--118.
[9]
}}Danezis, G., Lewis, S. and Anderson, R. How Much is Location Privacy Worth? Proc. 4th Workshop on the Economics of Information Security. Harvard University, 2005.
[10]
}}Dourish, P. and Anderson, K. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction 21(3), 2009, 319--342.
[11]
}}1Duckham, M. and Kulik, L. Location privacy and location-aware computing, In Dynamic & Mobile GIS: Investigating Change in Space and Time, CRC Press, 2006, 34--51.
[12]
}}Eagle, N., Pentland, A. and Lazer, D. Inferring Social Network Structure using Mobile Phone Data. Proc. National Academy of Sciences 106(36), 2009, 15274--15278.
[13]
}}Golle, P. and Partridge, K. On the Anonymity of Home/Work Location Pairs. Proc. Pervasive 2009, 390--397.
[14]
}}Gruteser, M. and Grunwald, D., Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. Proc. MobiSys 2003, ACM Press, 31--42.
[15]
}}Gruteser, M. and Hoh, B. On the Anonymity of Periodic Location Samples. Proc. 2nd International Conference on Security in Pervasive Computing. 2005, 179--192.
[16]
}}Hoh, B., et al., Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking. Proc. ACM CCS 2007.
[17]
}}Horvitz, E., Apacible, J., Sarin, R. and Liao, L. Prediction, Expectation, and Surprise: Methods, Designs, and Study of a Deployed Traffic Forecasting Service, Proc. UAI-2005.
[18]
}}Iachello, G., et al., Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service, Proc. UbiComp 2005, Springer-Verlag, 213--231.
[19]
}}Kostakos, V. Using Bluetooth to capture passenger trips on public transport buses. arXiv:0806.0874, 2008.
[20]
}}Krumm, J. Inference Attacks on Location Tracks. Proc. Pervasive 2007, Springer-Verlag, 127--143.
[21]
}}Krumm, J. A survey of computational location privacy. Personal and Ubiquitous Computing (2009) 13:6, pp. 391--399.
[22]
}}Krumm, J. And Horvitz, E. Predestination: Inferring Destinations from Partial Trajectories. Proc. UbiComp 2006, Springer-Verlag.
[23]
}}Langheinrich, M. Privacy in Ubiquitous Computing. In: Ubiqutious Computing Fundamentals, Edited by John Krumm, 96--156.
[24]
}}Liao, L., Patterson, D., Fox, D. and Kautz, H. Learning and Inferring Transportation Routines. Artificial Intelligence, 2007.
[25]
}}Mulder, Y., Danezis, G., Batina, L., Preneel. B., Identification via location-profiling in GSM networks. Proc. Workshop on Privacy in the Electronic Society 2008. 23--32.
[26]
}}Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. Proc. CHI 2003, ACM Press, 129--136.
[27]
}}Scott, J., Krumm, J., Meyers, B., Brush, A. J., and Kapoor, A. Home Heating Using GPS-Based Arrival Prediction. Microsoft Research Technical Report MSR-TR-2010-19, Feb 2010.
[28]
}}Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R., & Kang, J. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing. Proc. TPRC. September 2009.
[29]
}}Shklovski, I., Vertesi, J., Troshynski, E. & Dourish, P. (2009) The commodification of location: Dynamics of power in location-based systems. Proc. UbiComp 2009, ACM Press. 11--20.
[30]
}}Tsai, J., Kelley, P., Cranor, L., and Sadeh, N. Location-Sharing Technologies: Privacy Risks and Controls. Proc. TPRC 2009.
[31]
}}Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., and Sadeh, N. 2009. Who's viewed you?: the impact of feedback in a mobile location-sharing application. Proc. CHI '09. ACM Press, 2003--2012.

Cited By

View all
  • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
  • (2024)Employing discrete global grid systems for reproducible data obfuscationScientific Data10.1038/s41597-024-03354-511:1Online publication date: 17-May-2024
  • (2024)MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile DevicesCryptology and Network Security10.1007/978-981-97-8016-7_1(3-24)Online publication date: 29-Sep-2024
  • Show More Cited By

Index Terms

  1. Exploring end user preferences for location obfuscation, location-based services, and the value of location

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
    September 2010
    366 pages
    ISBN:9781605588438
    DOI:10.1145/1864349
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    • University of Florida: University of Florida

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 September 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anonymization
    2. computational location privacy
    3. location
    4. obfuscation
    5. privacy

    Qualifiers

    • Research-article

    Conference

    Ubicomp '10
    Ubicomp '10: The 2010 ACM Conference on Ubiquitous Computing
    September 26 - 29, 2010
    Copenhagen, Denmark

    Acceptance Rates

    UbiComp '10 Paper Acceptance Rate 39 of 202 submissions, 19%;
    Overall Acceptance Rate 764 of 2,912 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
    • (2024)Employing discrete global grid systems for reproducible data obfuscationScientific Data10.1038/s41597-024-03354-511:1Online publication date: 17-May-2024
    • (2024)MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile DevicesCryptology and Network Security10.1007/978-981-97-8016-7_1(3-24)Online publication date: 29-Sep-2024
    • (2023)LalaineProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620299(1091-1108)Online publication date: 9-Aug-2023
    • (2023)User Acceptance Criteria for Privacy Preserving Machine Learning TechniquesProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605004(1-8)Online publication date: 29-Aug-2023
    • (2022)An Extended Ultimatum Game for Multi-Party Access Control in Social NetworksACM Transactions on the Web10.1145/355535116:3(1-23)Online publication date: 28-Sep-2022
    • (2022)#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;Proceedings of the ACM on Human-Computer Interaction10.1145/35467396:MHCI(1-27)Online publication date: 20-Sep-2022
    • (2021)TheophanyProceedings of the 29th ACM International Conference on Multimedia10.1145/3474085.3475507(2056-2064)Online publication date: 17-Oct-2021
    • (2021)Who Should Get My Private Data in Which Case? Evidence in the WildProceedings of Mensch und Computer 202110.1145/3473856.3473879(281-293)Online publication date: 5-Sep-2021
    • (2021)Empowering mobile crowdsourcing apps with user privacy controlJournal of Parallel and Distributed Computing10.1016/j.jpdc.2020.07.011147(1-15)Online publication date: Jan-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media