DOC PREVIEW
Pitt IS 2620 - Preserving Privacy in Environments with Location Based Applications

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1Preserving Privacy in Environments with Location-Based ApplicationsNathan SulinskiIntroduction“The increase in location-based applications makes protecting personal location information a major challenge. Addressing thischallenge requires a mechanism that lets users automate control of their location information, thereby minimizing the extent to which the system intrudes on their lives.”--Ginger Myles, Adrian Friday, Nigel Davies2Introduction• Initial Problem– Location based applications are on the rise so the privacy concerns associated with them must be addressed• Solution Requirements– Minimize intrusiveness on user– Minimize demands on userIntroduction• Related Work– Geopriv• IETF initiative (November 2002)• Use of location objects to “encapsulate” location data & privacy requirements• Location Objects support tamper-resistant measures, like digital signatures– P3P & Appel• Website support to announce privacy practices• Automation of user decisions (reject/accept)• P3P described user agent architecture• Appel is a language used to describe privacy policies– pawS• Beacons announce policy of each service• “Privacy Proxies” check policies against user preferences3Introduction• LocServ Approach– “…middleware service that lies between location-based applications and location-trackingtechnologies.”– Enables application development independent ofunderlying location technologyDetails• System Constraints– Organization: Restrict location info to specific organizations–Service: Acceptance of certain information from new entities–Time: Additional parameter to govern organizational tracking– Location: Tracking allowed based on location– Request Type: Restriction on type of request to be accepted– Context: – Legislative: Flexibility to comply with legislation– Interaction Minimization: Minimize user interaction4Details• Development Goals– Minimal user involvement• Privacy policies handle bulk of information requests– Privacy by default• “Elect to share” vs. “Elect to block”Details• System Architecture5Details• Applications• Queries (Information Requests)– Location (location details for user)– Enumeration (lists of users at specific location)– Asynchronous (event information)Details• Supporting Technology–GPS–Active Bat• Validators– User’s privacy preferences– Registered with each Location Server6Details• Privacy Policies (enhanced P3P)–Entity• Original: Mechanism for describing business & contact information for organization.• Enhanced: Type & Cert fields– Purpose• Original: Orientation towards e-commerce & web interactions• Enhanced: Broadened with new set of classifications– Request Initiation• Original: n/a• Enhanced: Solicited vs. UnsolicitedDetails• Sample Policy Table7Conclusion• Currently being implemented in conjunction with ongoing research to create “deployable pervasive systems”• Lancaster Guide tourist system– Allow users to create their own Guide content• Pervasive healthcare based on mobile devices– Reassure patients of the privacy of their


View Full Document

Pitt IS 2620 - Preserving Privacy in Environments with Location Based Applications

Download Preserving Privacy in Environments with Location Based Applications
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Preserving Privacy in Environments with Location Based Applications and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Preserving Privacy in Environments with Location Based Applications 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?