Presentation is loading. Please wait.

Presentation is loading. Please wait.

Economic Location-Based Services, Privacy and the Relationship to Identity Lothar Fritsch Lehrstuhl für M-Commerce & Mehrseitige.

Similar presentations


Presentation on theme: "Economic Location-Based Services, Privacy and the Relationship to Identity Lothar Fritsch Lehrstuhl für M-Commerce & Mehrseitige."— Presentation transcript:

1 Economic Location-Based Services, Privacy and the Relationship to Identity Lothar Fritsch Lothar.Fritsch@M-Lehrstuhl.de Lehrstuhl für M-Commerce & Mehrseitige Sicherheit Johann Wolfgang Goethe-Universität Frankfurt am Main 22 – Jan - 2005

2 2 Location Based Service Typical relationship of today‘s LBS: Mobile User Application Provider of LBS Network Provider

3 3 LBS Business Scenarios

4 4 Privacy threats posed by LBS 1.A subject might find himself or herself in the situation to justify the whereabouts stored in someone else’s systems. This is an essential issue concerning control over one’s personal data (just like address trade, or consumer profiling). 2.An anonymous subject’s identity can be learned by observing its frequently-used locations (where one stays every night is one’s home). 3.A subject’s context can be guessed by observing location combined with geographic metadata (e.g. about office location, business district, sport locations, red light area). 4.The proximity to other subjects can reveal personal relationships.

5 5 Dimension of ID Gary T. Marx proposes seven types of ID relevant information, or „attributes“, as Hansen/Pfitzmann call ID information. Legal Name Location / reachability Publicly intermediated pseudonyms Secret pseudonyms Appearance and Behaviour patterns Social categorization Possession of knowledge

6 6 Problem in ID attributes: Mobility ID follwoing the Hansen/Pfitzmann Definition: Identifiability is the possibility of being individualized within a set of subjects, the identifiability set. (…) An identity is any subset of attributes of an individual which uniquely characterizes this individual within any set of individuals. So usually there is no such thing as “the identity”, but several of them.

7 7 Problem in ID attributes: Mobility ID_Lothar= (Male,190cm,beard,drinks_beer,Is_In_Rie zlern) But I‘m not always in Riezlern. What happens to my ID when I‘m mobile?

8 8 Problem in ID attributes: Mobility Do we need the introduction of a „freshness“ timestamp for volatile ID attributes? This would lead to attributes of long- time value, and attributes of temporal value.

9 9 LBS & attributes LBS obviously need location information. According to Marx, rechability is an important attribute, too. Beyond these two attributes, IDs for LBS should have as little information as possible.

10 10 Suggestion for LBS IDM LBS with IDM will need machanisms to: 1.Conceal attributes not needed 2.Provide location and a few attributes 3.Create rechability with anonymity Solutions: 1.Should be done with good pseudonymity 2.Can be done with selective IDM 3.Should be done with anonymous channels used for communications

11 11 Discussion Please ask, discuss, critizise, send references :-)

12 12 Rollen und Geschäftsmodell M-Business Modell nach G. Camponovo, 2001

13 13 Genauigkeit Quelle: Nokia

14 14 Dienste und Präzision Quelle: EMT, PinPoint Engine m

15 15 Bedrohungen BedrohungBeispielBeschreibung Unsolicited profiling The long time collection of personal information with the aim of creating detailed profiles. Blackmailing of politicians, digging in the past Unsolicited tracking Use of information about the current position and movement of persons. Kidnapping, burglary Merging data sources The merging of data sources may intensify the problems related to profiling and tracking. Collaboration of different service providers or of service providers with network operators. Loss of reachability control Marketing and sales location are valuable for spammers. User looses control over his reachability. Unsolicited email sent to persons with matching profiles. Quelle: PRIME-Projekt, interner Bericht

16 16 Bedrohungen BedrohungBeispielBeschreibung Extraction of sensitive information Use of location information to extract context sensitive information. People that consult medical specialists Disclosure of social network Services establishingan online community gain and potentially leak a person’s private social network. An online dating service leaks information to the public about who met whom. Peer pressure The privacy decisions of individuals in a group may be biased by peer pressure. Street gang that requires their members to share location information. Quelle: PRIME-Projekt, interner Bericht


Download ppt "Economic Location-Based Services, Privacy and the Relationship to Identity Lothar Fritsch Lehrstuhl für M-Commerce & Mehrseitige."

Similar presentations


Ads by Google