Abstract
This paper describes a new model for sharing location info without revealing identity to third party servers. We can describe it as a safe location sharing. Proposed approach splits location info and identity information. Service operates with a special kind of distributed data store, where identity info is always local. It eliminates one of the main concerns with location-based systems – privacy. This article describes a model itself as well as its implementation in the form of HTML5 mobile web application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Namiot, D.: Geo messages. In: 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 14–19 (2010), doi:10.1109/ICUMT.2010.5676665
Scipioni, M.P., Langheinrich, M.: I’m Here! Privacy Challenges in Mobile Location Sharing. In: Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU 2010), Helsinki, Finland (May 2010)
Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide and seek: location sharing practices with social media. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, Lisbon, Portugal, September 07-10 (2010)
Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, Boston, MA, USA, April 04-09 (2009)
de Paiva, A.C., Monteiro, E.F., Leal Rocha, J.J., de Souza Baptista, C., Silva, A.C.: Location Information Management in LBS Applications. In: Encyclopedia of Information Science and Technology, 2nd edn., pp. 2450–2455 (2009)
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)
Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42. ACM, New York (2003)
Langheinrich, M.: Privacy in ubiquitous computing. In: Krumm, J. (ed.) Ubiquitous Computing, pp. 95–160. CRC Press (September 2009)
WATN, http://watn.linkstore.ru (revised: March 2012)
Geolocation API Specification (September 7, 2010), http://www.w3.org/TR/geolocation-API/
Casario, M., Elst, P., Brown, C., Wormser, N., Hanquez, C.: HTML5 Solutions: Essential Techniques for HTML5 Developers 2011, pp. 281–303 (2011), doi:10.1007/978-1-4302-3387-9_11
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Namiot, D., Sneps-Sneppe, M. (2012). Where Are They Now – Safe Location Sharing. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networking. ruSMART NEW2AN 2012 2012. Lecture Notes in Computer Science, vol 7469. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32686-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-32686-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32685-1
Online ISBN: 978-3-642-32686-8
eBook Packages: Computer ScienceComputer Science (R0)