Location Privacy in Multiple Social Contexts

نویسندگان

  • Ian Elcoate
  • Jim Longstaff
  • Paul Massey
چکیده

Personal location data is stored as the result of using equipment that many people now own or have access to. Typically this data contains details of identity, location and the time the equipment was used. The data is usually stored in a central repository, held by the organisation owning the network or related equipment, and it is assumed that access controls are in place and privacy policies are adhered to. It would be unusual in such circumstance for the equipment user, the Tracked Entity, to set their access controls and privacy policies. An alternative architecture is available for systems that store personal location data and is based upon local storage of data allied to locally applied access controls. Such a system can pose problems, particularly in the spatial processing of data, but has the advantage that the Tracked Entity may have control over the data and the access controls. A system of access controls to personal location data is proposed that could operate with either architecture and could be plugged into a variety of access control models. These controls allow for the disclosure of information in different ways for different users. In controlling who has access to the data and also in setting the spatial and temporal constraints on the data it is possible to create a complex set of controls via a simple interface. Thus an individual would be able to manage their location data for differing social contexts from the same piece of software

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense

Along with the popularity of mobile social networks (MSNs) is the increasing danger of privacy breaches due to user location exposures. In this work, we take an initial step towards quantifying location privacy leakage from MSNs by matching the users’ shared locations with their real mobility traces. We conduct a three-week real-world experiment with 30 participants and discover that both direc...

متن کامل

A Comparative Study of the Concept of "Privacy" in the House of Islamic Countries in the Middle East (Case Study: Houses of Isfahan, Sanaa, Damascus)

One of the most important dimensions in the design of Islamic buildings is the creation of privacy. The word ‘privacy’ means ‘environment’, referring to a place where its support and protecting is obligatory and as a whole, it is a barrier to avoid others’ assault. It is of utmost importance in traditional houses especially in Islamic countries the houses separate the family privacy from the st...

متن کامل

A Review of Spatial Factor Modeling Techniques in Recommending Point of Interest Using Location-based Social Network Information

The rapid growth of mobile phone technology and its combination with various technologies like GPS has added location context to social networks and has led to the formation of location-based social networks. In social networking sites, recommender systems are used to recommend points of interest (POIs) to users. Traditional recommender systems, such as film and book recommendations, have a lon...

متن کامل

Privacy Protection in Context-Dependent Retrieval of Information and Multimedia

This work presents a method and experiments with privacy protection in multimedia and information retrieval system, currently being developed in Amigo project. Since Amigo environment is capable of recognition of user situations (contexts), the recommender system takes into account both long-term user interests and contexts when providing recommendations. We propose to utilize context recogniti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006