tify the requirements for LBS applications in future
large scale scenarios and addressing end user con-
cerns. Studies based on cryptographic schemes and
PETs have been tested on service provider’s data col-
lection servers but neither are implemented on the
mobile platform, nor on the actual app operation. In
addition, the lack of usability is one of the factors that
hinders the adoption of existing privacy-aware solu-
tions. We presented detailed analysis of the current
location computation process and proposed a novel
privacy-aware model. Both the end users and ser-
vice providers benefits from LP-Cach
´
e since the on-
device caching technique works on the minimisation
of the user’s private location collection process. With
a personalised permission mechanism, users can man-
age each app and private place distinctly. Immedi-
ate future work focuses on the implementation of the
model to measure the feasibility, usability and effi-
ciency of our approach while interacting with differ-
ent location-based apps.
REFERENCES
Aad, I. and Niemi, V. (2010). NRC data collection and the
privacy by design principles. In PhoneSense.
Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Ac-
quisti, A., and Others (2015). Your Location has been
Shared 5,398 Times! A Field Study on Mobile App
Privacy Nudging. In Procs. of ACM Conf. on Human
Factors in Computing Systems, pages 787–796. ACM.
Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E., and
Sadeh, N. (2011). Cach
´
e: caching location-enhanced
content to improve user privacy. In Procs. of ACM Int.
Conf. on Mobile Systems, Applications, and Services,
pages 197–210. ACM.
Android Developer Reference (2016).
http://developer.android.com/reference/.
Anonymizer (2016). http://www.anonymizer.com/.
Bell, S., Jung, W. R., and Krishnakumar, V. (2010).
WiFi-based enhanced positioning systems: accuracy
through mapping, calibration, and classification. In
Procs. of ACM SIGSPATIAL Int. Workshop on Indoor
Spatial Awareness, pages 3–9. ACM.
Beresford, A. R., Rice, A., Skehin, N., and Sohan, R.
(2011). Mockdroid: trading privacy for application
functionality on smartphones. In Procs. of ACM Work-
shop on Mobile Computing Systems and Applications,
pages 49–54. ACM.
Cranor, L. F. and Sadeh, N. (2013). A shortage of privacy
engineers. IEEE Security & Privacy, (2):77–79.
Damiani, M. L. (2011). Third party geolocation services in
LBS: Privacy requirements and research issues. Trans.
on Data Privacy, 4(2):55–72.
Doty, N. and Wilde, E. (2010). Geolocation privacy and ap-
plication platforms. In Procs. of ACM SIGSPATIAL
Int. Workshop on Security and Privacy in GIS and
LBS, pages 65–69. ACM.
Egele, M., Kruegel, C., Kirda, E., and Vigna, G. (2011).
PiOS: Detecting Privacy Leaks in iOS Applications.
In NDSS.
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-
G., and Others (2014). TaintDroid: an information-
flow tracking system for realtime privacy monitoring
on smartphones. TOCS, 32(2):5.
European Commission (2016). Protection of personal data.
http://ec.europa.eu/justice/data-protection/.
Fawaz, K. and Shin, K. G. (2014). Location Privacy Pro-
tection for Smartphone Users. In Procs. of ACM
SIGSAC Conf. on Computer and Communications Se-
curity, pages 239–250. ACM.
Felt, A. P., Egelman, S., and Wagner, D. (2012). I’ve got 99
problems, but vibration ain’t one: a survey of smart-
phone users’ concerns. In Procs. of ACM Workshop
on Security and Privacy in Smartphones and Mobile
Devices, pages 33–44. ACM.
Gibler, C., Crussell, J., Erickson, J., and Chen, H. (2012).
AndroidLeaks: Automatically detecting potential pri-
vacy leaks in Android applications on a large scale. In
TRUST 2012, pages 291–307. Springer.
Google Location Service (2016). https://support
.google.com/gmm/answer/1646140?hl=en-GB.
Hellman, E. (2013). Android programming: Pushing the
limits. John Wiley & Sons.
IETF (2016). Geographic Location Privacy.
http://datatracker.ietf.org/wg/geopriv/charter/.
Jeon, J., Micinski, K. K., Vaughan, J. A., Fogel, A., and
Reddy (2012). Dr. Android and Mr. Hide: fine-grained
permissions in android applications. In In Procs. of
ACM Workshop on Security and Privacy in Smart-
phones and Mobile Devices, pages 3–14. ACM.
Khoshgozaran, A., Shahabi, C., and Shirani-Mehr, H.
(2011). Location privacy: going beyond K-anonymity,
cloaking and anonymizers. Knowledge and Informa-
tion Systems, 26(3):435–465.
Kim, D. H., Hightower, J., Govindan, R., and Estrin, D.
(2009). Discovering semantically meaningful places
from pervasive RF-beacons. In Procs. of ACM Int.
Conf. on Ubiquitous Computing, pages 21–30. ACM.
Lin, D., Bertino, E., Cheng, R., and Prabhakar, S. (2008).
Position transformation: a location privacy protection
method for moving objects. In Procs. of the SIGSPA-
TIAL ACM GIS 2008 Int. Workshop on Security and
Privacy in GIS and LBS, pages 62–71. ACM.
Michael, K. and Clarke, R. (2013). Location and tracking of
mobile devices:
¨
Uberveillance stalks the streets. Com-
puter Law & Security Review, 29(3):216–228.
Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., and
Beznosov, K. (2012). Understanding users’ require-
ments for data protection in smartphones. In ICDE
Workshop, IEEE Int. Conf. on Secure Data Manage-
ment on Smartphones and Mobiles, pages 228–235.
IEEE.
Navizon (2016). http://www.navizon.com.
NetworkInfoIi (2016). http://play.google.com/store/apps/.
LP-Cache: Privacy-aware Cache Model for Location-based Apps
193