Location Based Services and Privacy Issues

Slides:



Advertisements
Similar presentations
Case Study: Examining the Results of P2P Collaboration at PricewaterhouseCoopers February 14, 2001 Case Study: Examining the Results of Collaboration at.
Advertisements

H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Accountability and Resource Management A discussion of issues for peer-to-peer systems Roger Dingledine Reputation Technologies Michael.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
1 FPEG Identity theft & payment fraud point December 2007.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Introduction ATMCP and Performance Dominique Colin de Verdière (CENA) Bernard Miaillier (Eurocontrol) TIM9 - ATMCP-RTSP May 2002.
0 - 0.
Addition Facts
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Limitations of the relational model 1. 2 Overview application areas for which the relational model is inadequate - reasons drawbacks of relational DBMSs.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs.
Chapter 10 Real world security protocols
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
Addition 1’s to 20.
Test B, 100 Subtraction Facts
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Key Management in Cryptography
LOCATION- BASED SERVICES INDUSTRIAL AND BUSINESS ANALYSIS Group 6 Huanhuan WANG Bo WANG Xinwei YANG Han LIU Telecommunication Management F2011.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Preserving Privacy in Location-Based Services using Sudoku Structures A Presentation for ICISS-2014 IDRBT, Hyderabad Authors : Sumitra Biswal, Goutam Paul.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Privacy Issues in Vehicular Ad Hoc Networks.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
© Synergetics Portfolio Security Aspecten.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Telecom and Informatics 1 Security and Privacy in Distributed Services Trial lecture: Security and Privacy in Distributed Services Richard Torbjørn Sanders.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Privacy-Preserving and Content-Protecting Location Based Queries.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Independent Centre for Privacy Protection Schleswig-Holstein
The time to address enterprise mobility is now
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Information and Network Security
Social Applications: The Mobile Imperative
“Location Privacy Protection for Smartphone Users”
A Unified Framework for Location Privacy
Presentation transcript:

Location Based Services and Privacy Issues Tsovinar Chugaszyan Presentation date 07.02.11

Outline LBS Technologies Privacy in LBS Main components Infrastructure Applications Privacy in LBS Threats and concerns Solutions for privacy-preserving LBS Analysis and challenges

Location Based Services Main idea: utilize the location information of the user in order to provide different services One of the most important Value-Added Services in the mobile market The first commercial LBS service: introduced in 2001 by Japanese mobile operator NTT- DoCoMo,

Main Components

Main data flow between the LBS components

LBS Applications Categories and examples of applications Information services – requesting the rearest ATM Navigation - how to reach the specified target location Emergency - person who is in a need of ambulance and is lost in woods Entertainment – social networking, mobile games Marketing – location-based mobile advertising Tracking – tracking of postal packages

Privacy and Security Issues Revealing of sensitive information about an individual or a union. There are already some real life incidents Social networking platforms: Google Latitude, FourSquere, Gowalla, Facebook raise safety issues of the user's movement tracking records Misuse of location information may also have commercial purposes

Existing solutions for privacy protection: Legal Frameworks Aim to protect and preserve the privacy of the user's personal data (e.g. Directive on privacy and electronic communications by The European Parliament and the Council of the European Union) Main point: the user must be able to control the availability of her location information, i.e. who can access it and for what purposes Used in conjunction with technical Solutions

Existing solutions for privacy protection: Technical Solutions The 3 main categories of Privacy-Enhancing Technologies: Cryptographic Encryption techniques- security mechanisms providing location authentication and authorization. Pseudonymization techniques- replace the user's actual identity with an artificial one (pseudonym). Location anonymization techniques-transform the precise location of the user into a cloaked spatial area.

Location Anonymization Main idea: the exact location information of the user gets transformed into cloaked location areas Metric: k-anonymity, indicates that the user prefers to be not distinguishable among k users The most famous model: Trusted Third Party paradigm, which utilizes a middle layer between the mobile device and the database server

Sample privacy-preserving architechture

Location anonymization algorithm Processing of queries

Analysis TTP Advantages : suitable for real time applications requires less operating costs. TTP Drawbacks : trust vs. financial obligations creates risks of compromising the privacy in case trusted party gets attacked

The Main Challenge The tradeoff between privacy and the quality of service that the LBS can provide. The strong solution is the one which provides best balance “….develop customizable privacy protection mechanisms that can help users find a comfortable balance between the extreme of fully disclosed location data and the extreme of completely withheld location data.„(L. Liu)

Special thanks to our tutors and to all reviewers of my work for very helpful remarks

Thank you for your attention!