Hiding User Privacy for Location Sharing Services in Social Networks Manu Manjunath,Pavan Kumar Kuppalu Basavarajappa, Sharath Ramesha Department of Computer Science, Texas A&M University-Kingsville Abstract— A location sharing service is one of the services offered by location based services (LBS) which allows a group of people to share their locations. With an not so trustworthy servers around, such a location sharing services (LSS) may intimidate the privacy of users. Current solutions for hiding user privacy for Location Sharing Services (HUPLSS) need a trusted third party which can access the exact locality of all users in the system or depend on algorithms or protocols for computations or communication overhead. In this paper, …show more content…
1.1 Problem Identification The problem is with centralized server that is it can produce complete information about the user i.e., location , time and number of times the user visited the certain place and which in turn breaches the privacy issues [5]-[7]of the user. Current privacy preserving techniques target at preserving user privacy by protecting the centralized server to some extent .However, it is not able to fully protect the user privacy because center server identifies the user location [8]-[11]. While other techniques need some information to exchanged not only between user and centralized server but also with their friends.[12][13].Other techniques make use of NAT(network address translation) where user devices communicate with the intermediate server directly thereby avoiding direct communication with the device[14]-[15]. …show more content…
Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers, “From awareness to repartee: Sharing location within social groups,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2008. [6] E. Toch et al., “Empirical models of privacy in location sharing,” in Proceedings of the ACM International Conference on Ubiquitous Computing, 2010. [7] S. Consolvo et al., “Location disclosure to social relations: Why, when, & what people want to share,” in Proceedings of the ACM Conference on Human Factors in Computing Systems, 2005. [8] C.-Y. Chow, M. F. Mokbel, and W. G. Aref, “Casper*: Query processing for location services without compromising privacy,” ACM Transactions on Database Systems, vol. 34, no. 4, pp. 1–48, 2009. [9] M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services, 2003. [10] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services withoutcompromising privacy,” in Proceedings of the International Conference on Very Large Data Bases,
Privacy is a complex concept with no universal definition as its meaning changes with society. Invasion of privacy occurs when there is an intrusion upon the reasonable expectation to be left alone. There has been a growing debate about the legitimacy of privacy in public
Security versus privacy is becoming a major issue in today’s society. Recently, the National Security Agency has been the victim of scrutiny due to allegations of espionage. Similar claims not only stem from the authority, but also come from the public as well. For example, one is enjoying a night out in a restaurant when a group of teenagers arrives. Before it is noticed, some of the teenagers take photos with a cell phone. The picture encompasses most of the area occupied; therefore, every person in that general area is included in it. A few moments later, one teen uploads that picture to various social media websites to share along with captions stating the current location. Although not a single person gave consent, pictures are being circulated with thousands of strangers in the innumerable realms of the internet. Not only are these pictures all over the web and an invasion of privacy, but people viewing those pictures are able to discover recent whereabouts with the simple click of a button. Due to technology’s rapid advancements, similar acts such as these are becoming nearly inevitable. But, these are the very same advancements that help us live in a free and open society. In order to avoid intrusions yet maintain safety, restrictions should be put upon consumer devices, capabilities of security devices, and government abilities.
Technological advancements have positively impacted society by increasing safety, promoting global communication, and presenting easy access to knowledge. However, there are many negative impacts to these devices, including the manipulation of privacy.
The Internet offers many benefits but it also creates many threats that undermines our personal privacy. Concerns about loss of privacy are not new. But the computer's ability to gather and sort vast amounts of data and the Internet's ability to distribute it globally magnify those concerns [1]. Privacy concerns on the Internet are centered on improper acquisition, improper use of personal information such as intrusions, manipulation, discrimination, identity theft, and stalking of personal information. Today the Internet stretches our geographic boundaries and force us to deal with global ethic based on moral principles held to be valid across the cultures. Due to the nature of the Internet, our personal information may be transmitted over the internet and that the transfer of personal information may be made to any country in the world, regardless of the extent of any data protection laws and regulations in any of those countries.
Rosen, David. Four ways your privacy is being invaded. 11 september 2012. 13 february 2014 .
In Lecture 26 of INFO 3200’s Spring 2014 offering, the instructor talks about the concept of privacy in new media and society. This is a popular topic of conversation in the public sphere. In a world in which the easiest way to keep track of someone is to do so online, it is essential that we know and control what information others get access to.
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
People have the fundamental desire to maintain strong connections with others. Through logic and reasoning, Sherry states, “But what do we have, now that we have what we say we want, now that we have what technology makes easy?”(Turkle). Face to face conversations are now mundane because of the accessibility to interact at our fingertips, at free will through text, phone calls and social media. Belonging, the very essence of a relationship has now become trivial.
Hargittai, Eszter and Boyd, Dana. “Facebook Privacy settings: Who cares?” First Monday 15.8 (2010): 12-20.
In our modern society almost every online act is a freedom of a citizen or a professional expression. Some content is stored and kept safe amongst small groups and some is made publicly available. Yet all acts can generate transactional information which can be viewed by many other parties over the web. This m...
Sites offer a feature where users can check into their location to share where they currently are, giving users the ability to check into their schools, community centers, the homes of peers, and their own homes. Although this feature can come in handy for occasional events, is it really necessary for the everyday person to report that they are at home? To make matters worse, the location feature can give away the exact address a person decides to disclose, so anyone can know where a person is located. Ultimately, home addresses are not as private as they used to be a few years
The issue on privacy is extremely controversial in today’s world. As the United States’ use of the internet, a global web of interconnected computer networks, expands, so does its problem with privacy invasion. With the U.S. pushing for new laws governing internet use, citizens are finding their privacy being pulled right from underneath them. Web users are buying and selling personal information online as well as hacking users for more information. One may argue that there is no such thing as privacy on the internet, but privacy is a right among Americans, and should be treated as such.
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
That’s My Tracker.”, written by Peter Maass and Megha Rajagopalan, indicates that the, “...tracking device that happens to make calls...” are exploiting our identities far more than we know (Maass and Rajagopalan,P.129). It was shared that cellphone carriers disclosed and “...responded 1.3 million times last year to law enforcement requests for call data...” without warrants (Maass and Rajagopalan,P.129). These reporters enlighten that all the “explosion of GPS technology and smartphone apps...” as well as “...frictionless sharing...”or “...surveillance has caught our attention so much so that it blinded us from the ugly truth (Maass and Rajagopalan,P.129). In actuality, modern technology such as cellphones and surveillance cameras allow the government to know of it 's citizens location, conversations, and actions—“...treasured by police departments and online advertisers...”(Maass and Rajagopalan,P.130). The mania of technology and “...these invasive services have proved irresistible to consumers…” writes Paul Ohm (Maass and Rajagopalan,P.129). He states that the overly advertised technology is like a magnet to consumers because it continues to be bought and sold regardless of the facts
In a world of Facebook and LinkedIn and YouTube and OKCupid and Google and IPhones and Ipads and Kindles and all the other hundreds of sites and devices designed to garner personal information, data-mine your information, to better advertise, sell, inform, and connect you with the people or the places that you want to experience. The wonderful world of the Internet helps connect millions of people with millions of other people in milliseconds all day, every day. All the swapping and sharing of information create a world of transparency, deception, fraud, and identity confusion. Avatars, aliases, and profiles are the ways most people advertise their goods and services and themselves. With this consideration an erosion of privacy has changed our culture in ways that some predicted years ago and some that are new to our era. This paper will explore some primary regarding how technology causes the changes in privacy and what are the effects brought on by these changes.