A Privacy-by-Design Approach to Location Sharing

被引:0
作者
Scipioni, Marcello Paolo [1 ]
机构
[1] Univ Lugano USI, Fac Informat, Via G Buffi 13, CH-6904 Lugano, Switzerland
来源
UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING | 2012年
基金
瑞士国家科学基金会;
关键词
Location sharing; privacy; location privacy; location based services; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the proliferation of location-based services on mobile platforms, privacy concerns still refrain many people from using them regularly. Moreover, current location sharing tools often present over-simplistic privacy settings by which users are forced to the binary alternative of sharing everything or nothing. The goal of this research is to build novel privacy-aware tools through which users can share their location more easily and in the way they consider more appropriate. Starting from the study of the sharing functionalities and how people use them, I aim at building a platform for efficiently sharing location, supported by a usable interface through which users can easily understand how sharing works and feel in control of their data. Furthermore, the security mechanisms employed are conceived such that privacy is considered as an integral part of the sharing mechanisms, in a privacy-by-design approach.
引用
收藏
页码:580 / 583
页数:4
相关论文
共 26 条
[1]  
Amin S., MOBILE CENTURY USING
[2]  
Ateniese G., 2005, NDSS, P29
[3]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[4]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[5]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[6]  
Consolvo S., 2005, CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, P81
[7]  
Dong C., 2011, IFIP INT C TRUST MAN, P133
[8]   Collective information practice: Exploring privacy and security as social and cultural phenomena [J].
Dourish, Paul ;
Anderson, Ken .
HUMAN-COMPUTER INTERACTION, 2006, 21 (03) :319-342
[9]  
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
[10]   Inferring friendship network structure by using mobile phone data [J].
Eagle, Nathan ;
Pentland, Alex ;
Lazer, David .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2009, 106 (36) :15274-15278