PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
MobiUS: enable together-viewing video experience across two mobile devices
Proceedings of the 5th international conference on Mobile systems, applications and services
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
COMBINE: leveraging the power of wireless peers through collaborative downloading
Proceedings of the 5th international conference on Mobile systems, applications and services
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
A survey of computational location privacy
Personal and Ubiquitous Computing
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Virtual individual servers as privacy-preserving proxies for mobile devices
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Place-Its: a study of location-based reminders on mobile phones
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
A moving-object index for efficient query processing with peer-wise location privacy
Proceedings of the VLDB Endowment
Friendship-based location privacy in Mobile Social Networks
International Journal of Security and Networks
Confidant: protecting OSN data without locking it up
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
Confidant: protecting OSN data without locking it up
Proceedings of the 12th International Middleware Conference
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Mobility and social networking: a data management perspective
Proceedings of the VLDB Endowment
Relative Location Oriented Mobile LBS
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.