SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Successfully reported this slideshow.
Activate your 14 day free trial to unlock unlimited reading.
Anonymous and Privacy-Sensitive Collection of Sensed Data in Location-Based Applications
4.
Use Hitchhiking <ul><li>The Hitchhiking Approach </li></ul><ul><li>Hitchhiking approach has seven requirements </li></ul>
5.
The Hitchhiking Approach <ul><li>Existing commodity devices, including notebook and mobile-phones. </li></ul><ul><li>Use GPS </li></ul><ul><li>Application: Traffic flow model </li></ul>
6.
S even requirements <ul><li>Location is computed on the client. </li></ul><ul><li>Only the client device is trusted. </li></ul><ul><li>Each person must approve reporting from a location. </li></ul><ul><li>Physical constraints prevent location spoofing. </li></ul>
7.
S even requirements (continue) <ul><li>Location identifiers are based in the physical location. </li></ul><ul><li>Location identifiers are generated by the client . </li></ul><ul><li>Sensed identifiers are not reported to a server . </li></ul>
8.
Location is computed on the client <ul><li>Client use GPS </li></ul><ul><li>Server only know device’s location </li></ul>
9.
Only the client device is trusted <ul><li>Design Client is easy </li></ul><ul><li>Server must higher standard </li></ul>
10.
Each person must approve reporting from a location. <ul><li>No approve reporting, No application </li></ul><ul><li>Applications can’t reveal identity </li></ul>
11.
Physical constraints prevent location spoofing <ul><li>Request location must be approved </li></ul><ul><li>Malicious server may be request the sensitive location. </li></ul>YES or NO
12.
Location identifiers are based in the physical location. <ul><li>ID and GPS (or WiFi access points ) identify together </li></ul><ul><li>If only use the ID, it may be danger </li></ul>
13.
Location identifiers are generated by the client <ul><li>Use GPS to provide location identifier </li></ul><ul><li>Server only provide state about location of interest </li></ul>
14.
Sensed identifiers are not reported to a server . <ul><li>No report the sensed identifier </li></ul><ul><li>Malicious operator may be track by sensed identifiers </li></ul>
15.
Discussion <ul><li>What is hot </li></ul><ul><li>Share location is currently busy </li></ul><ul><li>Letting others join the party </li></ul>
16.
Conclusion <ul><li>Danger and convenience is contradictory </li></ul><ul><li>Make laws to protect privacy </li></ul>
0 likes
Be the first to like this
Views
Total views
994
On SlideShare
0
From Embeds
0
Number of Embeds
45
You have now unlocked unlimited access to 20M+ documents!
Unlimited Reading
Learn faster and smarter from top experts
Unlimited Downloading
Download to take your learnings offline and on the go
You also get free access to Scribd!
Instant access to millions of ebooks, audiobooks, magazines, podcasts and more.
Read and listen offline with any device.
Free access to premium services like Tuneln, Mubi and more.