Negotiation Protocol for Location Privacy

Article Preview

Abstract:

As metropolitan areas have expanded and been surrounded by huge buildings and complicated express ways, it has been increased to utilize advanced ICT(Information Computer Technology) devices and systems to innovate utility services such as GIS(Geographic Information System). Keeping abreast of this, location privacy has emerged as a critical issue in ubiquitous computing environments for the metropolitan areas. Nevertheless, the focus of the location privacy is only about personal location information, not about location information such as the place itself. However, in a real world, as seen in the precedent of ‘Dow Chemical vs. United States’ or in controlled areas of military districts, we have already recognized the importance of location information. In this paper, we propose a negotiation protocol to protect location information as well as personal location information. Thus, we can achieve real data protection through the negotiation-process in the respect of self-regulation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

957-964

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Bennicke, Towards automatic negotiation of privacy contracts for internet services, Networks, 2003. ICON2003. The 11th IEEE International Conference on, pp.319-324, (2003).

DOI: 10.1109/icon.2003.1266210

Google Scholar

[2] A. R. Beresford and F. Stajano, Location Privacy in Pervasive Computing, IEEE Pervasive Computing, Volume 2 Issue 1, Page 46-55, January (2003).

DOI: 10.1109/mprv.2003.1186725

Google Scholar

[3] S. Chakraborty, S. K. Sharma, A. K. Pal, Privacy-Preserving 1-n-p Negotiation Protocol, HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Page 479, (2008).

DOI: 10.1109/hicss.2008.355

Google Scholar

[4] Wu, Chen and Potdar, Vidyasagar and Chang, Elizabeth, A conceptual framework for privacy policy negotiation in web services, Sixth International Network Conference, pp.195-202, (2006).

Google Scholar

[5] N. Doty and E. Wilde, Simple Policy Negotiation for Location Disclosure, W3C Workshop on Privacy and Data Usage Control, Cambridge, Massachusetts, October (2010).

Google Scholar

[6] L. Fritsch, Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements, Journal of Theoretical and Applied Electronic Commerce Research, vol. 2, issue 3, pp.1-17, december, (2007).

DOI: 10.3390/jtaer2030018

Google Scholar

[7] O. Jorns, , G. Quirchmayr, and O. Jung, (2007). A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, Fifth Australasian Information Security Workshop, pp.133-142, (2007).

Google Scholar

[8] R. Shokri, G. Theodorakopoulos, J. -Y. Le Boudec, and J. -P. Hubaux. Quantifying location privacy. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, (2011).

DOI: 10.1109/sp.2011.18

Google Scholar

[9] D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, (2000).

DOI: 10.1109/secpri.2000.848445

Google Scholar

[10] J. Zibuschka, T. Scherner, L. Fritsch, K. Rannenberg, Towards a Unified Interface for Privacy Regulation-conformant Location-based Services, W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy, (2006).

Google Scholar

[11] http: /www. law. go. kr/engLsInfoPWah. do?lsiSeq=85238.

Google Scholar

[12] http: /supreme. justia. com/cases/federal/us/476/227/case. html.

Google Scholar

[13] http: /www. opencongress. org/bill/112-s1223/show.

Google Scholar