2013 IEEE 14th International Conference on Mobile Data Management 2013
DOI: 10.1109/mdm.2013.67
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Challenges in Third-Party Location Services

Abstract: The concern for location privacy in mobile applications is commonly motivated by a scenario in which a mobile device communicates personal location data, i.e. the device holder location, to a third party e.g. LBS provider, in exchange for some information service. We argue that this scenario offers a partial view of the actual risks for privacy, because in reality the information flow can be more complex. For example, more and more often location is computed by a third party, the location provider, e.g. Google… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…These LPPMs have been well surveyed in Liu et al [Liu, Darabi, Banerjee et al (2007); Ahmadi and Bouallegue (2017); Chow and Mokbel (2011); Krumm (2009)]. Upon these works, it is necessary to measure how many privacy these LPPMs really offered to the location, and the location privacy metric were studies in Wernke et al [Wernke, Skvortsov, Dürr et al (2014); Wang, Zhang and Yu (2015); Damiani and Cuijpers (2013); Tippenhauer, Rasmussen, Pöpper et al (2009)]. For the LBS scenario, these researches focused on how to use the location safely.…”
Section: Regulatory Mechanismmentioning
confidence: 99%
“…These LPPMs have been well surveyed in Liu et al [Liu, Darabi, Banerjee et al (2007); Ahmadi and Bouallegue (2017); Chow and Mokbel (2011); Krumm (2009)]. Upon these works, it is necessary to measure how many privacy these LPPMs really offered to the location, and the location privacy metric were studies in Wernke et al [Wernke, Skvortsov, Dürr et al (2014); Wang, Zhang and Yu (2015); Damiani and Cuijpers (2013); Tippenhauer, Rasmussen, Pöpper et al (2009)]. For the LBS scenario, these researches focused on how to use the location safely.…”
Section: Regulatory Mechanismmentioning
confidence: 99%
“…Traverse the privacy ontology tree and find that there is a child node FirstName, SecondName, and LastName for Name, and a child node Country, Province, City, Street, and Community for Address. For a specific example of this step the reader can refer to our previous work in [3]. We do not include a corresponding expression in Figure 9.…”
Section: Case Studymentioning
confidence: 99%
“…In the domain of information systems and software engineering, privacy protection means the capability to prevent an individual's information from being collected, disclosed, and stored by others [3,4]. In 2002, the World Wide Consortium (W3C) developed the Platform for Privacy Preferences (P3P), which provides a standard and machineunderstandable privacy policy which is compared with the user's privacy preferences when the user visits a web site.…”
Section: Introductionmentioning
confidence: 99%
“…Another concern related to collecting user location information is that it could be used for other purposes such as to infer habits or mobility patterns. In [13], for instance, the authors studied some location-privacy concerns related to untrusted LBSs. Furthermore, the same authors proposed a method to minimize the risk associated with the disclosure of mobile node trajectories by selecting which locations are sent to a LBS.…”
Section: Related Workmentioning
confidence: 99%