Skip to main content

Privacy and Security Considerations

  • Chapter
  • First Online:
Indoor Location-Based Services
  • 1517 Accesses

Abstract

This chapter discusses privacy in location systems and the impact for indoor location-based services. It introduces the main approaches for providing privacy including multiparty computation, k-anonymity, l-diversity, spatial and temporal cloaking, differential privacy, and private information retrieval.

Privacy is effective ability to misrepresent yourself.

Dan Geer

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beimel, A., Nissim, K., Omri, E.: Distributed private data analysis: simultaneously solving how and what. In: Advances in Cryptology—CRYPTO 2008, pp. 451–468. Springer, Berlin (2008)

    Google Scholar 

  2. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  3. Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation, pp. 1–19. Springer, Berlin (2008)

    Google Scholar 

  4. Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13(6), 391–399 (2009)

    Article  Google Scholar 

  5. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, vol. 7, pp. 106–115 (2007)

    Google Scholar 

  6. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)

    Google Scholar 

  7. Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)

    Google Scholar 

  8. Yao, A.C.C.: Protocols for secure computations. In: FOCS, vol. 82, pp. 160–164 (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Werner, M. (2014). Privacy and Security Considerations. In: Indoor Location-Based Services. Springer, Cham. https://doi.org/10.1007/978-3-319-10699-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10699-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10698-4

  • Online ISBN: 978-3-319-10699-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics