Skip to main content

A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms

  • Conference paper
Book cover Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. However, such functions can be easily misused for tracking users and building their activity profiles, if privacy enhancement mechanisms are not integrated into the service architecture. In this paper we present a protocol based on transaction pseudonyms that protects the user’s address from being disclosed and associated with their location. Based on hash chains, the pseudonyms are used to authorize service and the localization requests, making possible ad hoc service usage without registration. We further analyze security aspects of the proposed protocol.

This work was supported by the Austrian Kplus program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Parlay: Parlay x, http://www.parlay.org/ (accessed May 03, 2005)

  2. W3C (Soap (simple object access protocol) version 1.2), http://www.w3.org/TR/soap (accessed May 03)

  3. Alamäki, T., Björksten, M., Dornbach, P., Gripenberg, C., Gyorbíró, N., Márton, G., Németh, Z., Skyttä, T., Tarkiainen, M.: Privacy enhancing service architectures. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 99–109. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)

    Google Scholar 

  5. ISO/IEC 9797-2: Information Technology — Security Techniques — Message Authentication Codes (MACs) - Part 2: Mechanisms Using a Dedicated Hash-Function. International Organization for Standardization, Geneva, Switzerland (2002)

    Google Scholar 

  6. Menezes, A.J.A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)

    Google Scholar 

  7. National Institute of Standards and Technology: Secure hash standard (SHS). Federal Information Processing Standards Publication 180-2 (2002)

    Google Scholar 

  8. Rivest, R.: RFC 1321: The MD5 message-digest algorithm, Status: INFORMATIONAL (1992)

    Google Scholar 

  9. Wang, X., Lai, X., Daum, M.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD (2004), http://eprint.iacr.org/2004/199.pdf

  10. Wang, X., Yin, Y.L., Yu, H.: Collision search attacks on SHA1, http://www.infosec.sdu.edu.cn/paper/sha-attack-note.pdf (2005)

  11. ECRYPT Network of Excellence: Recent collision attacks on hash functions: ECRYPT position paper, http://www.ecrypt.eu.org/documents/ECRYPT-hash-statement.pdf (accessed May 03, 2004)

  12. Andersson, C., Lundin, R., Fischer-Huebner, S.: Enabling anonymity for the mobile internet using the mcrowds system. In: FIP WG 9.2, 9.6/11.7 Summer School on Risks and Challenges of the Network Society, Karlstad University Studies (2004)

    Google Scholar 

  13. Jorns, O., Bessler, S., Pailer, R.: An Efficient Mechanism to ensure Location Privacy in Telecommunication Service Applications. In: Proc. International Conference on Network Control and Engineering, Palma de Mallorca, Spain (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jorns, O., Jung, O., Gross, J., Bessler, S. (2005). A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_11

Download citation

  • DOI: https://doi.org/10.1007/11537878_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics