Skip to main content

Introduction

  • Chapter
  • First Online:
  • 647 Accesses

Part of the book series: SpringerBriefs on Cyber Security Systems and Networks ((BRIEFSCSSN))

Abstract

This chapter introduces the basic concepts and the current research status of location privacy issues in mobile applications. It spans four aspects of study: the definition of location privacy, attacks and adversaries, people’s view about the location privacy, and the current status of location-based applications. Through this comprehensive introduction, all the interrelated aspects of location privacy are integrated into a unified framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. U.S. location-based service users, https://www.statista.com/statistics/436071/location-based-service-users-usa/. Accessed 19 Dec 2016

  2. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.-L. Tan, Private queries in location based services: anonymizers are not necessary, in Proceedings of the ACM SIGMOD (2008), pp. 121–132

    Google Scholar 

  3. M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in Proceedings of the ACM MobiSys (2003), pp. 31–42

    Google Scholar 

  4. H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services, in Proceedings of the IEEE ICPS (2005), pp. 88–97

    Google Scholar 

  5. C.A. Ardagna, M. Cremonini, S.D.C. di Vimercati, P. Samarati, An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable and Secur. Comput. 8(1), 13–27 (2011)

    Article  Google Scholar 

  6. B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, Enhancing privacy through caching in location-based services, in Proceedings of the IEEE INFOCOM (2015)

    Google Scholar 

  7. K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, A. Williams, A data privacy taxonomy, in British National Conference on Databases (Springer, Berlin, 2009), pp. 42–54

    Google Scholar 

  8. M. Wernke, P. Skvortsov, F. Dürr, K. Rothermel, A classification of location privacy attacks and approaches. Pers. Ubiquitous Comput. 18(1), 163–175 (2014)

    Article  Google Scholar 

  9. C.-Y. Chow, M.F. Mokbel, Privacy of spatial trajectories, in Computing with Spatial Trajectories (Springer, Berlin, 2011), pp. 109–141

    Google Scholar 

  10. Wechat (2019), https://www.wechat.com. Accessed 19 Dec 2016

  11. H. Li, H. Zhu, S. Du, X. Liang, X. Shen, Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Dependable Secur. Comput. 1, 1–1 (2016)

    Google Scholar 

  12. A.J. Blumberg, P. Eckersley, On locational privacy, and how to avoid losing it forever. Electron. Frontier Found. 10(11) (2009)

    Google Scholar 

  13. Why location privacy is important (2030), http://www.itworld.com/article/2752981/mobile/why-location-privacy-is-important.html. Accessed 30 Nov 2016

  14. J. Krumm, Inference attacks on location tracks, in Proceedings of the IEEE Percom (2007), pp. 127–143

    Google Scholar 

  15. Y. Gu, Y. Yao, W. Liu, J. Song, We know where you are: Home location identification in location-based social networks, in Proceedings of the ICCCN (IEEE, 2016), pp. 1–9

    Google Scholar 

  16. J. Mahmud, J. Nichols, C. Drews, Home location identification of twitter users. ACM Trans. Intell. Syst. Technol. 5(3), 47 (2014)

    Article  Google Scholar 

  17. How burglars use facebook to target vacationing homeowners (2013), http://www.ibtimes.com/how-burglars-use-facebook-target-vacationing-homeowners-1341325. Accessed 30 Nov 2016

  18. J. Bellatti, A. Brunner, J. Lewis, P. Annadata, W. Eltarjaman, R. Dewri, R. Thurimella, Driving habits data: location privacy implications and solutions. IEEE Secur. Priv. 15(1), 12–20 (2017)

    Article  Google Scholar 

  19. Tracing a stalker (2013), http://www.nbcnews.com/id/19253352/#.WDexmYVOLD4. Accessed 30 Nov 2016

  20. Authorities: GPS system used to stalk woman (2013), http://usatoday30.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm. Accessed 30 Nov 2016

  21. Steven brown used GPS devices and private detectives to stalk his estranged partner (2030), http://www.dailyecho.co.uk/news/14920127.Stalker_used_GPS_devices_and_private_detectives_to_stalk_his_estranged_partner/. Accessed 30 Nov 2016

  22. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, J.-P. Hubaux, Quantifying location privacy, in Proceedings of the IEEE Symposium on Security and Privacy (2011), pp. 247–262

    Google Scholar 

  23. K. Minami, N. Borisov, Protecting location privacy against inference attacks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (2010), pp. 123–126

    Google Scholar 

  24. S. Gambs, M.-O. Killijian, M.N. del Prado Cortez, De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8), 1597–1614 (2014)

    Google Scholar 

  25. T. Murakami, H. Watanabe, Localization attacks using matrix and tensor factorization. IEEE Trans. Inf. Forensics Secur. 11(8), 1647–1660 (2016)

    Article  Google Scholar 

  26. T. Weyand, I. Kostrikov, J. Philbin, Planet-photo geolocation with convolutional neural networks, in European Conference on Computer Vision (Springer, Berlin, 2016), pp. 37–55

    Google Scholar 

  27. M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, K. Ren, All your location are belong to us: breaking mobile social networks for automated user location tracking, in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014, pp. 43–52

    Google Scholar 

  28. M. Colbert, A diary study of rendezvousing: implications for position-aware computing and communications for the general public, in Proceedings of the ACM SIGGROUP Conference on Supporting Group Work (2001), pp. 15–23

    Google Scholar 

  29. E. Kaasinen, User needs for location-aware mobile services. Pers. Ubiquitous Comput. 7(1), 70–79 (2003)

    Article  Google Scholar 

  30. G. Danezis, S. Lewis, R.J. Anderson, How much is location privacy worth? in WEIS (Citeseer), vol. 5 (2005)

    Google Scholar 

  31. H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L.F. Cranor, Y. Agarwal, Your location has been shared 5,398 times!: a field study on mobile app privacy nudging, in Proceedings of the ACM Conference on Human Factors in Computing Systems (2015), pp. 787–796

    Google Scholar 

  32. K. Fawaz, K.G. Shin, Location privacy protection for smartphone users, in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2014), pp. 239–250

    Google Scholar 

  33. Mobile location apps review (2030), http://www.webmapsolutions.com/mobile-location-apps/. Accessed 30 Nov 2016

  34. C.R. Vicente, D. Freni, C. Bettini, C.S. Jensen, Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20–27 (2011)

    Article  Google Scholar 

  35. Foursqure (2021), https://foursquare.com/. Accessed 21 Dec 2016

  36. Glympse (2021), https://www.glympse.com/. Accessed 21 Dec 2016

  37. twitter (2021), https://twitter.com/. Accessed 21 Dec 2016

  38. Yelp (2019), https://www.tripadvisor.com.au/. Accessed 19 Dec 2016

  39. Tripadvisor (2002), https://www.yelp.com.au/. Accessed 02 Jan 2017

  40. Fitbit (2019), https://www.fitbit.com. Accessed 19 Dec 2016

  41. Pokemon go (2019), http://www.pokemongo.com/. Accessed 19 Dec 2016

  42. B. Liu, W. Zhou, T. Zhu, L. Gao, Y. Xiang, Location privacy and its applications: a systematic study, in IEEE Access, vol. 6 (2018), pp. 17606–17624

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Liu .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Liu, B., Zhou, W., Zhu, T., Xiang, Y., Wang, K. (2018). Introduction. In: Location Privacy in Mobile Applications. SpringerBriefs on Cyber Security Systems and Networks. Springer, Singapore. https://doi.org/10.1007/978-981-13-1705-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1705-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1704-0

  • Online ISBN: 978-981-13-1705-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics