LOCATION PRIVACY
Marc Langheinrich
University of Lugano (USI), Switzerland
LOCATION PRIVACY Marc Langheinrich University of Lugano (USI), - - PowerPoint PPT Presentation
LOCATION PRIVACY Marc Langheinrich University of Lugano (USI), Switzerland Zurich (2.5h) Milano (1h) Genoa (2.5h) Securing a Mobile Phone Securing a Mobile Phone Securing a Mobile Phone Securing a Mobile Phone Can We Have it Both Ways?
University of Lugano (USI), Switzerland
Zurich (2.5h) Milano (1h) Genoa (2.5h)
Facets of Privacy
Original Slide from Lorrie Cranor: „ 8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology”, Fall 2008, CMU
Yale Law School
James Waldo et al., Engaging Privacy and Information Technology in a Digital Age. National Academies Press, 2008
Image source: http://historyofprivacy.net/RPIntro3-2009.htm
George Eastman 1854-1932
Image Source: Wikipedia; Encyclopedia Britannica (Student Edition)
TomTom iPhone
Rakon GPS Infineon XPOSYS GPS Trackstick 2 Hitachi Clarion Nokia N97
Image source: http://historyofprivacy.net/RPIntro3-2009.htm
Facets of Privacy
Facets of Privacy
Irwin Altman University of Utah
See, e.g., L. Palen, P. Dourish: “Unpacking "privacy" for a networked world.” Proceedings of CHI 2003. pp.129-136.
Facets of Privacy
Secrecy Solitude Control Intimacy Dignity Freedom Anonymity Safety
Useful Definition?! Think Altman!
Alastair Beresford Cambridge Univ. Frank Stajano Cambridge Univ. Gary Gale Yahoo! UK
Image Sources: http://www.jimmyjanesays.com/sketchblog/paperdollmask_large.jpg http://www.queensjournal.ca/story/2008-03-14/supplement/keeping-tabs-personal-data/
www.nytimes.com/1992/09/12/technology/orwellian-dream-come-true-a-badge-that-pinpoints-you.html
Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment. In Proc. of the 14th ACM Symp. on Operating Systems Principles (SOSP ’93), pp. 270–283. ACM Press, 1993.
Bob‘s User Agent Location Updates Location Query Service Query Interface 7829 7829 (pseudonym) Where‘s Bob? Bob Bob?
Danezis, George, Lewis, Stephen, Anderson, Ross: How Much is Location Privacy Worth. Fourth Workshop on the Economics of Information Security, Harvard University (2005)
Jason Hong: An Architecture for Privacy-Sensitive Ubiquitous Computing. PhD Thesis, Univ. of Califronia Berkeley, 2005. Available at www.cs.cmu.edu/~jasonh/publications/jihdiss.pdf
Jason Hong
CMU
– Defines how services should use location – Includes privacy controls (Rule Holder) – Location is published to Location Server – Location is used by Location Recipient
– Location Objects (GML) – Preference Rules
http://tools.ietf.org/wg/geopriv/
Dawson, Martin; James Winterbottom, Martin Thomson (2006-11-13). IP Location. McGraw-Hill. ISBN 0-07-226377-6.
Device Target Location Generator Location Server Rule Holder Rule Maker Location Recipients Location Recipients Location Recipients
Dawson, Martin; James Winterbottom, Martin Thomson (2006-11-13). IP Location. McGraw-Hill. ISBN 0-07-226377-6.
Target Location Generator Location Server Rule Holder Rule Maker Location Recipients Device Bob Bob‘s GPS-Enable Phone Bob is at 43.5723 S, 153.21760 E Restaurant Finder
Lederer, Hong, Dey, Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing, Vol. 8, no. 6, Nov. 2004, pp. 440-454
Hong, J. I. and Landay, J. A. 2004. An architecture for privacy- sensitive ubiquitous computing. In Proc. 2nd intl Conf. on Mobile Systems, Applications, and Services (MobiSys '04). ACM, pp. 177-189
Img src: [Bereseford, Stajano 2003]
Alastair Beresford Cambridge Univ. Frank Stajano Cambridge Univ.
DOB Sex Zipcode Disease 1/21/76 Female 53715 Heart Disease 4/13/86 Male 53715 Hepatitis 2/28/76 Female 53703 Brochitis 1/21/76 Female 53703 Broken Arm 4/13/86 Male 53706 Swine Flu 2/28/76 Male 53706 Common Flu Name DOB Sex Zipcode Alice 1/21/76 Female 53715 Bob 1/10/81 Male 55410 Charlie 10/1/44 Male 90210 Dave 2/21/84 Male 02174 Ellen 4/19/72 Female 02237
Hospital Patient Data Vote Registration Data
Samarati P and Sweeney L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Tech Report SRI-CSL-98-04, 1998
Pierangela Samarati
Latanya Sweeney CMU
The triple (DOB, gender, zip code) suffices to uniquely identify at least 87% of US citizens in publicly available databases (1990 U.S. Census summary data).
DOB Sex Zipcode Disease 1/21/76 Female 537* Heart Disease 4/13/86 Male 537* Hepatitis 2/28/76 Female 537* Brochitis 1/21/76 Female 537* Broken Arm 4/13/86 Male 537* Swine Flu 2/28/76 Male 537* Common Flu Name DOB Sex Zipcode Alice 1/21/76 Female 53715 Bob 1/10/81 Male 55410 Charlie 10/1/44 Male 90210 Dave 2/21/84 Male 02174 Ellen 4/19/72 Female 02237
Hospital Patient Data Vote Registration Data
Marco Gruteser Rutgers Univ. Dirk Grunwald
Anonymizer Service (AS) LBS LBS LBS
Gruteser, M. and Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc.of MobiSys 2003. ACM, pp 31-42
Industrial Area on Weekend Promenade on Weekend Weekend Train
– Protects against attackers, but degrades service use – (Krumm, 2007) showed that LOTS of obfuscation is needed – Typically combined with rules to selectively adjust accuracy
Image Source: Krumm, J., Inference Attacks on Location Tracks, in Fifth International Conference
Krumm, J., Realistic Driving Tracks for Location Privacy. In 7th International Conference on Pervasive Computing (Pervasive 2009), Nara, Japan, Springer.
Img src: www.flickr.com/photos/nomeacuerdo/431060441/
See, e.g., Gary Marx: Rocky Bottoms and Some Information Age Techno-Fallacies. Intl. Political Sociology, Vol. 1, No. 1. March 2007, pp. 83-110.
Irwin Altman University of Utah Melvin C. Kranzberg Georgia Tech (1917-1995) Gary T. Marx MIT
http://www.nap.edu/openbook.php?isbn=0309075688
– Roy Want – Jakob Bardram and Adrian Friday – Marc Langheinrich – A.J. Bernheim Brush – Alex S. Taylor – Aaron Quigley – Alexander Varshavsky and Shwetak Patel – Anind K. Dey – John Krumm