Enabling Privacy of Real-Life LBS

A Platform for Flexible Mobile Service Provisioning
  • Jan Zibuschka
  • Lothar Fritsch
  • Mike Radmacher
  • Tobias Scherner
  • Kai Rannenberg
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 232)


Privacy in computerized environments is perceived very differently depending on the respective point of view. Often “privacy enhancing technologies” — initiated by the user, as a measure of self-defense — are seen as conflicting with business goals such as cost-efficiency, revenue assurance, and options for further business development based on existing data. This paper presents the design and implementation of an architecture and prototype for privacy-friendly, interoperable location-based services (LBS), based on intermediation of location data via a location middleware component. The aim is to combine privacy-friendliness, efficiency, and market potential. Therefore the security interests of the stakeholders are analyzed and an architecture solution including an intermediary is introduced. Then the prototype implementation (at a mobile operator) is described and the usage of the prototype for a commercial service and product offer by the operator involved in the development is discussed.


Service Provider Mobile Operator Oblivious Transfer Privacy Requirement Mobile Network Operator 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bundesnetzagentur: Jahresbericht. 2005.Google Scholar
  2. 2.
    K. Rannenberg, “Recent Development in Information Technology Security Evaluation — The Need for Evaluation Criteria for multilateral Security”, in Richard Sizer et al.: Security and Control of Information Technology in Society — Proceedings of the IFIP TC9/WG 9.6 Working Conference August 12-17, St. Petersburg, Russia, North-Holland, Amsterdam, pp. 113–128, 1994.Google Scholar
  3. 3.
    K. Rannenberg, “Multilateral Security — A concept and examples for balanced security”, in Proceedings of the 9th ACM New Security Paradigms Workshop, Cork, Ireland: ACM Press, 2000, pp. 151–162.CrossRefGoogle Scholar
  4. 4.
    T. Koelsch, L. Fritsch, M. Kohlweiss, D. Kesdogan, “Privacy for Profitable Location Based Services”, Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing, Lecture Notes on Computer Science (LNCS 3450, pp. 164–179), Springer; Boppard, Germany, 2005.Google Scholar
  5. 5.
    M. Kohlweiss, B. Gedrojc, “Flexible Location Based Service Protocols Using Efficient Oblivious Transfer”, Kryptowochenende, 2006.Google Scholar
  6. 6.
    G.W. Blarkom; J. Borking; J.G. Olk: Handbook of Privacy and Privacy-Enhancing Technologies. College bescherming persoonsgegevens, The Hague. 2003.Google Scholar
  7. 7.
    K. Synnes; J. North; P. Parnes; Location Privacy in the Alipes Platform; Institutionen för Systemteknik; Lulea University of Technology; 2002.Google Scholar
  8. 8.
    R. Cheng; S. Prabhakar: Using Uncertainty to Provide-Preserving and High-Quality Location-Based Services, in: Workshop on Location Systems, Privacy and Control, 2004.Google Scholar
  9. 9.
    Jorns, O,-Bessler, S.: PRIVES: A privacy enhanced location based scheme, in: Workshop on Location Systems, Privacy and Control, 2004.Google Scholar
  10. 10.
    A. Albers, S. Figge, M. Radmacher, “LOC3 — Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures”, in Proceedings of 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS’05); München, 2005.Google Scholar
  11. 11.
    T. Lindner, L. Fritsch, K. Plank, K. Rannenberg, “Exploitation of Public and Private WiFi Coverage for New Business Models”, Proceedings of the 4th IFIP Conference on E-Commerce, E-Business, and E-Government (BE), 2004.Google Scholar
  12. 12.
    F. Rose, The economics, concept and design of information intermediaries. Heidelberg, Physica-Verlag, 1999.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Jan Zibuschka
    • 1
  • Lothar Fritsch
    • 1
  • Mike Radmacher
    • 1
  • Tobias Scherner
    • 1
  • Kai Rannenberg
    • 1
  1. 1.Chair for Mobile Commerce & Multilateral SecurityJohann Wolfgang Goethe University FrankfurtFrankfurt am MainGermany

Personalised recommendations