Verified Document

Factsheet On Location Privacy In Pervasive Computing Term Paper

Related Topics:

Location Privacy in Pervasive Computing Lab workers wore bats (small mobile devices with radio transceivers and ultrasonic transmitters) to provide position information to location-aware applications and colleagues in the lab. * The strong correlation between entry and exit motion is not modeled in anonymity sets. Per Shannon's1 definition of maximal entropy, only when all the members of an anonymity set are of interest to the observer, anonymity set size is a good measure of anonymity. *If all elements are equiprobable, for a set size of n, a log2 n bits of information is needed to identify one element.

Modeling user movements can show the anonymity level offered by the mix zone. Knowledge encoded in a movement matrix enables an observer to make a "guess" about user activity superior to the accuracy that can be achieved through a random choice. The identity of users is expressible as a conditional probability of the users' next action. A hostile observer can unlink pseudonyms more successfully than the size of the anonymity set suggests because the actions are not equiprobable.

Experimental Data From AT&T Lab

Mix Networks and Mix Zones

Applications Collude & Share Information About User Sightings

"To thwart more sophisticated attacks, users should change pseudonyms frequently, even while being tracked."

Beresford & Stajano 2003

"The mix zone store-and-forward network offers anonymous communication facilities."

Future Research

Prevent preferences from the multiple pseudonyms created from identifiably mapping back to the...

Shannon, "A Mathematical Theory of Communication," Bell System Tech. J., 27, July 1948, pp. 379-423, and Oct. 1948, pp. 623-656.
MIX NETWORK. A mix network consists of normal message-routing nodes and special mix nodes. A hostile observer monitoring network links cannot trace messages from their source to their destinations without the collusion of the mix nodes. Incoming and outgoing messages are made unlinkable as the mix node collects and reorders equal-length packets, according to a certain metric, prior to forwarding the messages. As the size of an anonymity set increases, so does the anonymity it provides. A smaller anonymity set has less anonymity to offer.

2. F. Stajano, Securtiy for Ubiquitous Computing, John Wiley & sons, New York, 2002.

3. D. Chaum, "Untraceable Electronic Mail, Return Addresses and Digital Pseudonums," Comm. ACM, vol. 24, no. 2, 1981, pp. 84-88.

4. D. Chaum, "The…

Sources used in this document:
Pervasive computing can enable observers to achieve submeter accuracy of the comings and goings of those they track. Stejano (2002) argues that a change of scale of several orders of magnitude impacts qualitative as well as quantitative data -- this is a residual problem in pervasive computing. Many location systems track users in an ongoing fashion, gathering huge amounts of information that has the potential to be sensitive and valuable data. Options for controlling the information that is tracked by location systems are limited. Users want to be in control of access to their private and personal data. Users also want to experience applications with the ease that is a result of data tracking.

Resources 5 -- Harvard

* The inherent tension that exists in the privacy-protection framework can be addressed through the use of pseudonyms that are changed frequently. This measure provides a way for users to avoidance having their identification revealed by the locations they visit. Beresford and Stanjano describe techniques they have developed for mapping the location privacy issue to anonymous communication through the application of mix zones, and they provide examples of two anonymity assessment metrics: anonymity sets and entropy.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now