Abstract
This chapter introduces the basic concepts and the current research status of location privacy issues in mobile applications. It spans four aspects of study: the definition of location privacy, attacks and adversaries, people’s view about the location privacy, and the current status of location-based applications. Through this comprehensive introduction, all the interrelated aspects of location privacy are integrated into a unified framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
U.S. location-based service users, https://www.statista.com/statistics/436071/location-based-service-users-usa/. Accessed 19 Dec 2016
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.-L. Tan, Private queries in location based services: anonymizers are not necessary, in Proceedings of the ACM SIGMOD (2008), pp. 121–132
M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in Proceedings of the ACM MobiSys (2003), pp. 31–42
H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services, in Proceedings of the IEEE ICPS (2005), pp. 88–97
C.A. Ardagna, M. Cremonini, S.D.C. di Vimercati, P. Samarati, An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable and Secur. Comput. 8(1), 13–27 (2011)
B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, Enhancing privacy through caching in location-based services, in Proceedings of the IEEE INFOCOM (2015)
K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, A. Williams, A data privacy taxonomy, in British National Conference on Databases (Springer, Berlin, 2009), pp. 42–54
M. Wernke, P. Skvortsov, F. Dürr, K. Rothermel, A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 18(1), 163–175 (2014)
C.-Y. Chow, M.F. Mokbel, Privacy of spatial trajectories, in Computing with Spatial Trajectories (Springer, Berlin, 2011), pp. 109–141
Wechat (2019), https://www.wechat.com. Accessed 19 Dec 2016
H. Li, H. Zhu, S. Du, X. Liang, X. Shen, Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secur. Comput. 1, 1–1 (2016)
A.J. Blumberg, P. Eckersley, On locational privacy, and how to avoid losing it forever. Electron. Frontier Found. 10(11) (2009)
Why location privacy is important (2030), http://www.itworld.com/article/2752981/mobile/why-location-privacy-is-important.html. Accessed 30 Nov 2016
J. Krumm, Inference attacks on location tracks, in Proceedings of the IEEE Percom (2007), pp. 127–143
Y. Gu, Y. Yao, W. Liu, J. Song, We know where you are: Home location identification in location-based social networks, in Proceedings of the ICCCN (IEEE, 2016), pp. 1–9
J. Mahmud, J. Nichols, C. Drews, Home location identification of twitter users. ACM Trans. Intell. Syst. Technol. 5(3), 47 (2014)
How burglars use facebook to target vacationing homeowners (2013), http://www.ibtimes.com/how-burglars-use-facebook-target-vacationing-homeowners-1341325. Accessed 30 Nov 2016
J. Bellatti, A. Brunner, J. Lewis, P. Annadata, W. Eltarjaman, R. Dewri, R. Thurimella, Driving habits data: location privacy implications and solutions. IEEE Secur. Priv. 15(1), 12–20 (2017)
Tracing a stalker (2013), http://www.nbcnews.com/id/19253352/#.WDexmYVOLD4. Accessed 30 Nov 2016
Authorities: GPS system used to stalk woman (2013), http://usatoday30.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm. Accessed 30 Nov 2016
Steven brown used GPS devices and private detectives to stalk his estranged partner (2030), http://www.dailyecho.co.uk/news/14920127.Stalker_used_GPS_devices_and_private_detectives_to_stalk_his_estranged_partner/. Accessed 30 Nov 2016
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, J.-P. Hubaux, Quantifying location privacy, in Proceedings of the IEEE Symposium on Security and Privacy (2011), pp. 247–262
K. Minami, N. Borisov, Protecting location privacy against inference attacks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (2010), pp. 123–126
S. Gambs, M.-O. Killijian, M.N. del Prado Cortez, De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8), 1597–1614 (2014)
T. Murakami, H. Watanabe, Localization attacks using matrix and tensor factorization. IEEE Trans. Inf. Forensics Secur. 11(8), 1647–1660 (2016)
T. Weyand, I. Kostrikov, J. Philbin, Planet-photo geolocation with convolutional neural networks, in European Conference on Computer Vision (Springer, Berlin, 2016), pp. 37–55
M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, K. Ren, All your location are belong to us: breaking mobile social networks for automated user location tracking, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014, pp. 43–52
M. Colbert, A diary study of rendezvousing: implications for position-aware computing and communications for the general public, in Proceedings of the ACM SIGGROUP Conference on Supporting Group Work (2001), pp. 15–23
E. Kaasinen, User needs for location-aware mobile services. Pers. Ubiquitous Comput. 7(1), 70–79 (2003)
G. Danezis, S. Lewis, R.J. Anderson, How much is location privacy worth? in WEIS (Citeseer), vol. 5 (2005)
H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L.F. Cranor, Y. Agarwal, Your location has been shared 5,398 times!: a field study on mobile app privacy nudging, in Proceedings of the ACM Conference on Human Factors in Computing Systems (2015), pp. 787–796
K. Fawaz, K.G. Shin, Location privacy protection for smartphone users, in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2014), pp. 239–250
Mobile location apps review (2030), http://www.webmapsolutions.com/mobile-location-apps/. Accessed 30 Nov 2016
C.R. Vicente, D. Freni, C. Bettini, C.S. Jensen, Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20–27 (2011)
Foursqure (2021), https://foursquare.com/. Accessed 21 Dec 2016
Glympse (2021), https://www.glympse.com/. Accessed 21 Dec 2016
twitter (2021), https://twitter.com/. Accessed 21 Dec 2016
Yelp (2019), https://www.tripadvisor.com.au/. Accessed 19 Dec 2016
Tripadvisor (2002), https://www.yelp.com.au/. Accessed 02 Jan 2017
Fitbit (2019), https://www.fitbit.com. Accessed 19 Dec 2016
Pokemon go (2019), http://www.pokemongo.com/. Accessed 19 Dec 2016
B. Liu, W. Zhou, T. Zhu, L. Gao, Y. Xiang, Location privacy and its applications: a systematic study, in IEEE Access, vol. 6 (2018), pp. 17606–17624
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Liu, B., Zhou, W., Zhu, T., Xiang, Y., Wang, K. (2018). Introduction. In: Location Privacy in Mobile Applications. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1705-7_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-1705-7_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1704-0
Online ISBN: 978-981-13-1705-7
eBook Packages: Computer ScienceComputer Science (R0)