Communications of the ACM
The GSM System for Mobile Communications
The GSM System for Mobile Communications
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Location Privacy through Secret Sharing Techniques
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Privacy protection in location-based services through a public-key privacy homomorphism
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.01 |
In certain circumstances an individual may not be in control of their private location information and thus vulnerable to a privacy violation. In this paper, we ensure location privacy through the establishment of a prohibitive contract in a situation where an individual wishes to minimize privacy loss and a service provider aims to maximize prots. Given the possible strategies we show that a privacy equilibrium can be found. This equilibrium, expressed in the form of a prohibitive contract, is established with the intention of preventing a possible privacy violation. Should within the constraints of the prohibitive contract, a violation occur, a suitable and efcient outcome for both parties presents itself. We further investigate how such violations may affect a user-centric location privacy system. Emphasis is placed on the economic and contract aspects of the parties' relationship, rather than specic technical detail of location privacy. Utilizing the utilitarian paradigm approach, we evaluate the overall efciency of the prohibitive contracts which we show postulates convergence towards an overall balanced system.