ABSTRACT

Portions reprinted with permission, from “Location Privacy for Users of Wireless Devices through Cloaking” from the Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, HI, 2008. © IEEE

CONTENTS

9.1 Introduction ................................................................................................ 208 9.2 Selecting a Location System to Support Privacy ................................... 209 9.3 Cloaking to Protect Online Privacy ........................................................ 209

9.3.1 Previous work in online location privacy .................................. 210 9.3.2 Mathematical foundation of cloaking ......................................... 211 9.3.3 Cloaking system ............................................................................. 212

9.3.3.1 Rounding .......................................................................... 213 9.3.3.2 Truncating ........................................................................ 213 9.3.3.3 Geodetic resolution ......................................................... 213 9.3.3.4 Randomization ................................................................ 215

9.3.4 System analysis .............................................................................. 217 9.3.5 Resources ........................................................................................ 217

9.3.5.1 Power ................................................................................ 218 9.3.5.2 Memory ............................................................................ 219 9.3.5.3 Run-time memory ........................................................... 219 9.3.5.4 Bandwidth ........................................................................ 219

9.4 Problems with Corporate Tracking ......................................................... 220 9.5 Protecting Privacy by Using Prediction ................................................. 221

9.5.1 Location determination ................................................................. 221 9.5.1.1 Symbolic location ............................................................222