Abstract
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern. Ideally, location sharing providers and middleware should not be able to access users’ location data without their consent. In this paper, we propose a new location sharing protocol called Longitude that eases privacy concerns by making it possible to share a user’s location data blindly and allowing the user to control who can access her location, when and to what degree of precision. The underlying cryptographic algorithms are designed for GPS-enabled mobile phones. We describe and evaluate our implementation for the Nexus One Android mobile phone.
This work was supported by UK EPSRC research grant EP/F023294/1 - PRiMMA: Privacy Rights Management for Mobile Applications.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Google Latitude, http://www.google.com/latitude
Yahoo fire eagle, http://fireeagle.yahoo.net/
Loopt, http://www.loopt.com/
Raphael, J.: Three Reasons Why I Won’t Be Using Google Latitude (2009), http://www.pcworld.com/article/158953
Turoczy, R.: Google latitude: Ready to tell your friends (and google) where you are? (2009), http://www.readwriteweb.com/archives/google_latitude_location_aware.php
Gralla, P.: Privacy group asks ftc to investigate google (2009), http://www.pcworld.com/businesscenter/article/161497/privacy_group_asks_ftc_to_investigate_google.html
Tang, K.P., Lin, J., Hong, J.I., Siewiorek, D.P., Sadeh, N.: Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing. In: UbiComp (2010)
Tsai, J.Y., Kelley, P.G., Cranor, L.F., Sadeh, N.: Location-sharing technologies: Privacy risks and controls (2010), http://cups.cs.cmu.edu/LBSprivacy/files/TsaiKelleyCranorSadeh_2009.pdf
Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46–55 (2003)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)
Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372–390. Springer, Heidelberg (2007)
Zhong, G., Hengartner, U.: A distributed k-anonymity protocol for location privacy. In: IEEE International Conference on Pervasive Computing and Communications PerCom 2009, pp. 1–10 (9-13, 2009)
Locaccino, http://www.locaccino.org
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Freudiger, J., Neu, R., Hubaux, J.P.: Private sharing of user location over online social networks. In: 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs 2010 (2010)
Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C.: Anonymous user tracking for location-based community services. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 116–133. Springer, Heidelberg (2006)
Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62–76. Springer, Heidelberg (2007)
Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: Mobile Data Management, pp. 75–84 (2010)
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: DBSec., pp. 127–143 (2008)
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Android platform, http://www.android.com/
Chatterjee, S., Sarkar, P., Barua, R.: Efficient computation of tate pairing in projective coordinate over general characteristic fields. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 168–181. Springer, Heidelberg (2005)
Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293–304. Springer, Heidelberg (2005)
NIST: NIST FIPS-197: Specification for the Advanced Encryption Standard
NIST: NIST SP 800-38A: Recommendation for Block Cipher Modes of Operation
Fournel, N., Minier, M., Ubéda, S.: Survey and benchmark of stream ciphers for wireless sensor networks. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 202–214. Springer, Heidelberg (2007)
Even, S., Goldreich, O., Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Guo, F., Mu, Y., Chen, Z.: Identity-based online/Offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247–261. Springer, Heidelberg (2008)
Zhang, L., Tiwana, B., Qian, Z., Wang, Z., Dick, R., Mao, Z.M., Yang, L.: Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In: Proceedings of CODES+ISSS (2010)
IEEE: IEEE P1363: Standard specifications for public key cryptography
Scott, M., Barreto, P.S.L.M.: Compressed pairings. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 140–156. Springer, Heidelberg (2004)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
Popa, R.A., Zeldovich, N., Balakrishnan, H.: Cryptdb: A practical encrypted relational dbms. Technical Report MIT-CSAIL-TR-2011-005, MIT (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 International Federation for Information Processing
About this paper
Cite this paper
Dong, C., Dulay, N. (2011). Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds) Trust Management V. IFIPTM 2011. IFIP Advances in Information and Communication Technology, vol 358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22200-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-22200-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22199-6
Online ISBN: 978-3-642-22200-9
eBook Packages: Computer ScienceComputer Science (R0)