Skip to main content

Privacy Preservation over Untrusted Mobile Networks

  • Chapter
Book cover Privacy in Location-Based Applications

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5599))

Abstract

The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.

In this chapter, we first present a survey of existing state-of-the-art protection mechanisms and their challenges when deployed in the context of wired and wireless networks. Moreover, we illustrate recent and ongoing research that attempts to address different aspects of privacy in mobile applications. Furthermore, we present a new proposal to ensure private communication in the context of hybrid mobile networks, which integrate wired, wireless and cellular technologies. We conclude by outlining open problems and possible future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of user’s privacy concerns. In: Proc. of the 9th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), Zurich, Switzerland (September 2003)

    Google Scholar 

  2. D’Roza, T., Bilchev, G.: An overview of location-based services. BT Technology Journal 21(1), 20–27 (2003)

    Article  Google Scholar 

  3. Loopt (December 2008), http://www.loopt.com/about/privacy-security

  4. Zander, C.: Cia Cell Tower Monitors Local Internet Users’ Wireless Transmissions (September 2007), http://www.send2press.com/newswire/2007-09-0911-003.shtml

  5. Chicago Tribune: Rental firm uses GPS in speeding fine, p.9. Associated Press, Chicago (July 2, 2001)

    Google Scholar 

  6. Lee, J.W.: Location-tracing sparks privacy concerns. Korea Times, (November 16, 2004), http://news.naver.com/main/read.nhn?mode=LPOD&mid=etc&oid=040&aid=0000016873

  7. Giannotti, F., Pedreschi, D. (eds.): Mobility, data mining and privacy - Geographic knowledge discovery. Springer, Heidelberg (2008)

    Google Scholar 

  8. Kaufman, C., Perlman, R., Speciner, M.: Network security: Private communication in a public world. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  9. Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  10. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, Springer, Heidelberg (2007)

    Google Scholar 

  11. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  12. Ardagna, C., Stavrou, A., Jajodia, S., Samarati, P., Martin, R.: A multi-path approach for k-anonymity in mobile hybrid networks. In: Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain (October 2008)

    Google Scholar 

  13. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  14. Onion Routing, http://www.onion-router.net/

  15. Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)

    Article  Google Scholar 

  16. Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: Proc. of the 12th Annual Computer Security Applications Conference, San Diego, CA (December 1996)

    Google Scholar 

  17. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  18. Perkins, C., Royer, E.: Ad-hoc on demand distance vector routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA (February 1999)

    Google Scholar 

  19. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks, vol. 353. Kluwer Academic Publishers, Dordrecht (1996)

    Google Scholar 

  20. Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: A secure distributed anonymous routing protocol for wireless andmobile ad hoc networks. In: Proc. of the 29th Annual IEEE International Conference on Local Computer Networks (LCN 2004), Tampa, FL, USA (October 2004)

    Google Scholar 

  21. Kao, J.C., Marculescu, R.: Real-time anonymous routing for mobile ad hoc networks. In: Proc. of the Wireless Communications and Networking Conference (WCNC 2007), Hong Hong (March 2007)

    Google Scholar 

  22. Kong, J., Hong, X.: ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proc. of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003), Annapolis, MD, USA (June 2003)

    Google Scholar 

  23. Wu, X., Bhargava, B.: AO2P: Ad hoc on-demand position-based private routing protocol. IEEE Transaction on Mobile Computing 4(4) (July-August 2005)

    Google Scholar 

  24. Yang, L., Jakobsson, M., Wetzel, S.: Discount anonymous on demand routing for mobile ad hoc networks. In: Proc. of the Second International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), Baltimore, MD, USA (August-September 2006)

    Google Scholar 

  25. Zhang, Y., Liu, W., Lou, W.: Anonymous communication in mobile ad hoc networks. In: Proc. of the 24th Annual Joint Conference of the IEEE Communication Society (INFOCOM 2005), Miami, FL, USA (March 2005)

    Google Scholar 

  26. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Mask: Anonymous on-demand routing in mobile ad hoc networks. IEEE Transaction on Wireless Communications 5(9) (September 2006)

    Google Scholar 

  27. Capkun, S., Hubaux, J.P., Jakobsson, M.: Secure and privacy-preserving communication in hybrid ad hoc networks. Technical Report IC/2004/10, EPFL-IC, CH-1015 Lausanne, Switzerland (January 2004)

    Google Scholar 

  28. Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Proc. of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA (November 2005)

    Google Scholar 

  29. Dotzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  30. Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  31. Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications 25(8), 1569–1589 (2007)

    Article  Google Scholar 

  32. Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Supporting location-based conditions in access control policies. In: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan (March 2006)

    Google Scholar 

  33. Ardagna, C., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  34. Mascetti, S., Bettini, C.: A comparison of spatial generalization algorithms for LBS privacy preservation. In: Proc. of the 1st International Workshop on Privacy-Aware Location-based Mobile Services (PALMS 2007), Mannheim, Germany (May 2007)

    Google Scholar 

  35. Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  36. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA (May 2003)

    Google Scholar 

  37. Mokbel, M., Chow, C.Y., Aref, W.: The new casper: Query processing for location services without compromising privacy. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (September 2006)

    Google Scholar 

  38. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)

    Article  Google Scholar 

  39. Ghinita, G., Kalnis, P., Skiadopoulos, S.: Privè: Anonymous location-based queries in distributed mobile systems. In: Proc. of the International World Wide Web Conference (WWW 2007), Banff, Canada (May 2007)

    Google Scholar 

  40. Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372–390. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  41. Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: Anonysense: privacy-aware people-centric sensing. In: Proc. of the 6th international conference on Mobile systems, applications, and services (MobiSys 2008), Breckenridge, CO, USA (June 2008)

    Google Scholar 

  42. Zhong, G., Hengartner, U.: A distributed k-anonymity protocol for location privacy. In: Proc. of the Seventh IEEE International Conference on Pervasive Computing and Communication (PerCom 2009), Galveston, TX, USA (March 2009)

    Google Scholar 

  43. Fujiwara, T., Watanabe, T.: An ad hoc networking scheme in hybrid networks for emergency communications. Ad Hoc Networks 3(5), 607–620 (2005)

    Article  Google Scholar 

  44. Sphinx - A Hybrid Network Model for Next Generation Wireless Systems, http://www.ece.gatech.edu/research/GNAN/work/sphinx/sphinx.html

  45. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65–75 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  46. Stavrou, A., Keromytis, A.: Countering dos attacks with stateless multipath overlays. In: Proc. of the 12th ACM conference on Computer and communications security (CCS 2005), Alexandria, VA, USA (November 2005)

    Google Scholar 

  47. Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proc. of the 14th ACM conference on Computer and communications security (CCS 2007), Alexandria, Virginia, USA (October-November 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ardagna, C.A., Jajodia, S., Samarati, P., Stavrou, A. (2009). Privacy Preservation over Untrusted Mobile Networks. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds) Privacy in Location-Based Applications. Lecture Notes in Computer Science, vol 5599. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03511-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03511-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03510-4

  • Online ISBN: 978-3-642-03511-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics