Location Privacy in Pervasive Computing

  title={Location Privacy in Pervasive Computing},
  author={Alastair R. Beresford and Frank Stajano},
  journal={IEEE Pervasive Comput.},
As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms. 

Figures from this paper

Preserving Privacy in Environments with Location-Based Applications

A mechanism that lets users automate control of their location information, thereby minimizing the extent to which the system intrudes on their lives is proposed.

Location Privacy Issues in Pervasive Environments

An overview of a framework for preserving location privacy in pervasive environments is provided and potential research topics along this direction are discussed.

Privacy and location anonymization in location-based services

An outlook in location privacy research and its impact on mobile Internet, pervasive computing, and geo-spatial data management is concluded with the emphasis on understanding location privacy issues, alternative models, and architectures.

Survey on Location Privacy in Pervasive Computing

The goal of ubiquitous computing research is refine devices to the where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be

A Stochastic Preserving Scheme of Location Privacy

This research presents a meta-service architecture that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging the locations of sensor nodes in a distributed sensor network.

Enabling Location Privacy in Pervasive Computing by Fragmenting Location Information of Users

This paper explores the Location Privacy issue in location aware computing and proposes Vertical fragmentation of the stored location information of users as a solution for this issue.

Achieving anonymous location-based services

  • A. McDiarmidJ. Irvine
  • Computer Science
    IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
  • 2004
This work proposes a protocol to allow anonymous use of location-based services, without revealing the user's identity and location to any third party.

Privacy and Security Considerations

The main approaches for providing privacy including multiparty computation, k-anonymity, l-diversity, spatial and temporal cloaking, differential privacy, and private information retrieval are introduced.

Safety-aware Location Privacy in Vehicular Ad-hoc Networks

A Monte Carlo methodology is modified to measure the quality of service of safety applications and two context-based schemes which determine the appropriate situations to change pseudonyms are proposed.

Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications

The Privacy Preserving Obfuscation Environment (Probe) framework supports semantic-location cloaking to protect semantic- location privacy in geosocial networking applications.



Anonymous Addresses and Confidentiality of Location

We describe a scheme which will allow location information from devices like active badges to be collected by an agent controlled by the user, hiding the user's location from the network

Towards an Information Theoretic Metric for Anonymity

An alternative information theoretic measure of anonymity is proposed which takes into account the probabilities of users sending and receiving the messages and is shown how to calculate it for a message in a standard mix-based anonymity system.

Real-time mixes: a bandwidth-efficient anonymity protocol

The detailed protocols for the narrow-band ISDN (integrated services digital network), although the heart of the techniques-anonymous channels-can also be applied to other networks.

A new location technique for the active office

The authors present a novel sensor system, suitable for large-scale deployment in indoor environments, which allows the locations of people and equipment to be accurately determined and describes some of the context-aware applications that might make use of this fine-grained location information.

The Cricket location-support system

The randomized algorithm used by beacons to transmit information, the use of concurrent radio and ultrasonic signals to infer distance, the listener inference algorithms to overcome multipath and interference, and practical beacon configuration and positioning techniques that improve accuracy are described.

Security for Ubiquitous Computing

Ubiquitous computing, over a decade in the making, has finally graduated from whacky buzzword through fashionable research topic to something that is definitely and inevitably happening: changes of the same magnitude and scope as those brought about by the World Wide Web.

The dining cryptographers problem: Unconditional sender and recipient untraceability

  • D. Chaum
  • Computer Science, Mathematics
    Journal of Cryptology
  • 2004
The solution presented here is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys, respectively, and can be adapted to address efficiently a wide variety of practical considerations.

SPIRIT : a Resource Database for Mobile

The architecture of the SPIRIT database is described and an overview of some of its client applications are provided and the hardware resources and the location techniques available as well are described.

Untraceable electronic mail, return addresses, and digital pseudonyms

A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of

Middleware Support for Context-Aware Multimedia Applications

QoSDREAM offers a novel approach to the handling of location data derived from sensors in the physical world which integrates sensor data from a variety of sources into streams of application-relevant events and a component-based architecture for the construction of real-time multimedia and other context-aware applications.