Internet-Draft                                            Kenji Takahashi
draft-takahashi-spatial-privacy-scenario-00.txt                       NTT
Expires:  Jan 2002                                            Haitao Tang
                                                                    Nokia
                                                                July 2001

      Location-based Service Scenarios for Privacy Analysis
        <draft-takahashi-spatial-privacy-scenario-00.txt>

Status of This Memo

This document is an Internet-Draft and is in subject to all
provisions of Section 10 of RFC 2026. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups.  Note that other groups may also distribute
working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as 'work in progress.'

The list of current Internet-Drafts can be accessed at
     http://www.ietf.org/ietf/1id-abstracts.txt

The list of Internet-Draft Shadow Directories can be accessed at
     http://www.ietf.org/shadow.html.

Abstract
   We propose a user scenario framework of location-based services to
   analyze security and privacy issues associated with the services.  The
   framework is intended to cover the most of the location-based services
   available today and in near future. There are many kinds of existing and
   possible location-based services. Though, what is meant by location-
   based service varies widely.  The framework gives people a common ground
   from  where  discussion on the security and privacy issues can start.

1. Introduction
   There are many kinds of existing and future location-based services.
   However, the definition of location-based services is different among
   users and service providers.  For example, what is a "push" service?
   Some people may say that the push service is a location based "handbill"
   delivery ? for example, when you come close to a pizza restaurant, you
   receive a mail message about the restaurant.  Other people may say the
   push service is a guardian service that periodically pushes location
   information of kids to their guardians.  The trust models are totally
   different in these two cases.  In the former case, the anonymized
   location information of a person is obtained by the trusted party (e.g.,
   an advertisement agency) if s/he is in a particular geographical area
   during an allowed time period.  In the latter case, the location
   information of the specific persons is kept tracked by the trusted party
   (e.g. parents).

   We therefore propose a user scenario framework as a common ground to
   productively discuss the security and privacy in location-based
   services.


2. Definition

   Throughout this document, we define and use the following terms

   Owner
   The owner is the person who rightfully owns the location information.
   The owner is the target of the location information if the target is a
   human, or is a human who owns the target if the target is a non-human
   object.  For example, John is obviously the owner of his location
   information.  John is also the owner of the location information of his
   dog.

   Requester
   A requester is a human or non-human entity that asks a responder for the
   location information of an owner. Requesters could be the owners, if,
   for example, the requesters themselves ask  where they are.

   Responder
   A responder is a human or non-human entity that delivers a requester the
   location information.  Responders could be the owners if, for example,
   the owners have GPS devices and the means that can send the location
   information obtained from the devices.  Responders could also be proxies
   of the owners.

   Proxy
   A proxy is a computer entity that acts on behalf of one or more
   responders to deliver the location information and/or on behalf of one
   or more requesters to ask for the location information.

   Location information
   The information about where a human or non-human entity is
   geographically located.  The location information can be represented in
   many ways, for example, a pair of longitude and latitude.

3. Security and privacy attacks

   Regarding location-based services, we have identified the following four
   major types of security and privacy attacks:

   Snoop
   Attackers snoop and reveal (and decrypts) the payloads of packets.  They
   may also modify the location information.  Interestingly, the location
   data alone, e.g., longitude and latitude, may not be necessarily
   encrypted because the data is useless in many cases if the data is not
   associated to an owner.  For example, "Kenji is at (35.55, 136.28)" is
   very private information, while the disclosure of the data content,
   "(35.55, 136.28)" alone is not harmful to Kenji.  This is fairly
   different from music data content distribution where the data itself is
   important and should be encrypted.  Anonymous use of the location data
   could be easier to implement without encryption.

   Replay attack
   There are two types of replay attacks: those by "owner" and by "receiver".
   In former case, the attackers, who disguise the true owners, receive and
   send the false location information to requesters.  In latter case,
   attackers, who disguise the true requester, send requests for the location
   information to the owners.

K. Takahashi, H. Tang                                               [Page2]
IETF Draft Location-based Service Scenarios for Privacy Analysis

   Traffic analysis
   Traffic analysis reveals the source and destination of packets delivered
   by tapping network links and/or actively attacking routers.  In
   particular, the source and destination of packets can be associated with
   location in mobile communication.

4. Basic episodes
   Location-based services could be very complicated.  However, we believe
   that it is possible to extract a limited number of common basic episodes,
   or building blocks of user scenarios, from the complicated services.
   Episodes are end-to-end transactions. Also for simplicity, we do not
   consider episodes in which proxies participate usually. Though, one
   exception is when a person is asking about oneself, s/he interacts with
   one's proxy that has the person's location information and can answer
   the person's question.  By considering what users experience through
   location-based services, we can identify four perspectives:

   Focus: Target / Place
   Services focused on "place" handle basically request for reports on
   "whether someone/something is in a particular place", whereas those
   focused on "target" handle requests for reports "where a particular
   person/thing is".  The different focuses make a significant difference
   in the interaction model.  In target-focused services, responses include
   location data, whereas in place focused-services, requests include
   location data (and responses, for example, are just "yes", "no", or
   "how many").

   Target: User's own position / Third party's position

   Trigger: Requester-pull / Owner-push

   Anonymity: Anonymous / Non-anonymous

   As shown in Figure 1, there are 10 basic episodes from the combination of
   these four perspectives.

   (Ep1) Owner asks Proxy where he is.
   (Ep2) Owner tells anonymously Requester where he is.
   (Ep3) Owner tells Requester where he is.
   (Ep4) Requester asks Responder where an anonymous target is.
   (Ep5) Requester asks Responder where Target Y is.
   (Ep6) Owner asks Proxy whether he is in Place X.
   (Ep7) Owner anonymously tells Requester whether he is in Place X.
   (Ep8) Owner tells Requester whether he is in Place X.
   (Ep9) Requester asks Responder whether an anonymous target is in Place X.
   (Ep10) Requester asks Responder whether Target Y is in Place X.








K. Takahashi, H. Tang                                               [Page3]
IETF Draft Location-based Service Scenarios for Privacy Analysis


   [Focus]  [Target]     [Trigger]  [Anonymity]
   Target -+- Self  -----+- Pull -------------------- (Ep1)
           |             |
           |             +- Push -+- Anonymous  ----- (Ep2)
           |                      |
           |                      +- Not anonymous -- (Ep3)
           |
           +- 3rd party --- Pull -+- Anonymous  ----- (Ep4)
                                  |
                                  +- Not anonymous -- (Ep5)

   Place  -+- Self  -----+- Pull -------------------- (Ep6)
           |             |
           |             +- Push -+- Anonymous  ----- (Ep7)
           |                      |
           |                      +- Not anonymous -- (Ep8)
           |
           +- 3rd party --- Pull -+- Anonymous  ----- (Ep9)
                                  |
                                  +- Not anonymous -- (Ep10)

      Figure 1. Basic episodes in location-based service

5. Composite scenarios

   There can be an unlimited number of location services that comprise of
   the basic episodes.  Here we illustrate how three scenarios consist of
   the episodes.  Certainly, these scenarios could be specified in more
   detail and may contain more intermediaries. However, we describe here
   the  simplest cases.

   (1) Where is the nearest pizza restaurant?
   A person looking for a nearest pizza restaurant can start this scenario
   by using a location service for Ep1 ("Owner asks Proxy where he is."),
   or getting the position locally, e.g., via using GPS.  Then the person
   uses a service for Ep2 ("Owner anonymously tells Requester where he is")
   to let the service provider know where he is.  At last the service
   provider gives the person the information about the nearest pizza
   restaurant.  The last interaction looks like a simple information
   delivery, while there is still a potential risk of the disclosure of
   location information.  An attacker can know that the person may go to
   the restaurant if the attacker can snoop the information that the person
   got and identify whom the person is.

   (2) Location-based advertisement distribution.
   Suppose that a person subscribes to an advertisement provider and allow
   it to use the information about his location in a limited manner.  A
   person may start with Ep2, Ep3, Ep7, or Ep8, depending on the trust
   relationship between the person and the provider, to tell the provider
   where s/he is or whether s/he is in a specific place.  Then the provider
   distributes the advertisement information to the person based on where
   s/he is.  There is a potential risk where attackers know where s/he is by
   associating the advertisement with its receivers.

K. Takahashi, H. Tang                                               [Page4]
IETF Draft Location-based Service Scenarios for Privacy Analysis

   (3) Web-based "whereabouts" service
   A service provider provides users a service to tell them where a person
   is.  A user starts with Ep5 ("Requester asks Responder where Target Y
   is").  Then the provider, as a proxy of the person (the location owner) ,
   executes Ep3 ("Owner tells Requester where he is").  In this scenario,
   the provider should get the permission from the location owner to use his
   location report.

6. Conclusion

   The location privacy and security problems are usually specific to
   certain application(s) of the location information. It would be very
K. Takahashi, H. Tang                                               [Page2]
IETF Draft Location-based Service Scenarios for Privacy Analysis

   difficult to design an effective privacy and security scheme for
   something, unless the associated use cases are analysed. We therefore
   propose to solve these problems inside the applications rather than by
   considering the location something alone.

Author's Addresses

   Haitao Tang
   P.O. Box 407, FIN-00045 Nokia
   Finland
   Email: haitao.tang@nokia.com

   Kenji Takahashi
   NTT
   3-9-11 Midoricho
   Musashino, Tokyo 180-8585 Japan
   Email: takahashi.kenji@lab.ntt.co.jp























K. Takahashi, H. Tang                                               [Page5]
IETF Draft Location-based Service Scenarios for Privacy Analysis

Copyright Statement

Copyright (C) The Internet Society (2001).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English. The limited permissions granted above are perpetual and will
   not be revoked by the Internet Society or its successors or assigns.
   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."