337:
pieces of information, like closest religious institutions, which can reveal the identity of the user, which organizations utilize for purely commercial purposes. The paper proposes a solution, anonymization, which protects user's data in case of accidental breaches. There is an explanation of the fuzzy inference system and how it works *explain how it works* and then the potential implication method in taxi drivers to see if this is an effective way of protecting people's information because there isn't a concrete design with anonymization that has proven to do well. There are different levels of precision that the location system can narrow down on a user. These systems turn quantitative data into qualitative data which would obscure a user's identity and location. After a trial implementation with taxi drivers, several complications came up, mostly human misinterpretation, but in the future, investing more time into this solution and combining it with already existing solutions could provide a more effective solution. To those who are afraid of their locations being tracked and that being used to trace back to the user, this solution makes user data fuzzy so if they are being tracking, it is not completely precise. There are data tables that show experimental distances of how close a tracking software was to those who had implemented the fuzzy solution. This solution takes on a different approach because it doesn't entirely solve the problem of how to entirely protect the user's privacy, but it is working towards it since the solution has not had enough time to mature, as it is just in introductory stages. It sheds light on the fact that the location tracking software is still not private even when solutions have been taken to try and overcome this solution but leaves an open ending because it ends that with more research and resources put into it (and specifically told what areas could be developed better) it could expand further and be developed better.
46:, Los Angeles Smart Traveler from Los Angeles's Commuter Transportation Services, and Rideshare Express from Sacramento Rideshare. However, in these telephone-based programs the operational costs started exceeding their revenues and an alternative, internet and email driven ride-matches, was proposed. This program was tested on a closed campus (it was only available to people associated with the University of Washington), which proved highly successful. Two other programs, ATHENA and MINERVA were both computerized but faced unsuccessful endings. When the internet was created in the 1990s, online ride-matching was created. Websites originally had lists or forums that people could get information for
212:
road and keeping track of what happens outside the car. The implementation of cameras inside cars to record interactions between drivers and riders is something new. However, people are concerned about their privacy because this recording goes on during their trip duration, and they do not verbally consent to their recording. However, they consent to being in a person's car, hence they must abide to the driver's rules. There are federal rules about audio recordings, federal laws only requires "one party consent."
51:
ride-sharing were not very popular options, the smaller population who did participate already had set agendas, so timing-wise it was not helpful to those who needed transportation outside of a regular workday commute. Larger scale companies started becoming interested in partnering with ride-matching companies in order to spread the ride-sharing platform. They are gaining more traction as availability of mobile technology and thus accessibility not from a stationary point has become more prominent.
224:, there are policies regarding recording audio conversations, including clarifications about the "one-party consent" rule that comes with it. Regarding audio conversations, it is illegal to record a conversation for which one is not partaking in. However, they are allowed to record if they are a member of the conversation themselves, without having to receive consent from the other party or having to let them know there is recording happening.
242:
individual's interests and market towards them. Corporations can collect information on what types of stores and what brands are most often visited by a user and can build an online profile, which is traceable. This can also relate to advertising companies, which can target personal interests and alter their online interactions to start showing ads that are catered and specific towards where the user has visited. *citation*
316:. This solution helps with those who are suspicious of using these ride-sharing applications because of the fear of their privacy being invaded or potentially data being stolen, but this software has proven that it can handle securing data as well as keeping the user anonymous. It is more like an extra layer of security that creates another blanket to hide the user.
277:
user consents to it or not. These applications ask for user information such as phone number, email, and profile picture, all features which can be used to trace back to the user's identity. Once this information is in the application's database, it can accessed by the application as well as indirectly by any partners of the app.
336:
Another solution is to try and use fuzzy interference systems when relating to mobile geo-services. This solution would use different details to identify the user that would not be prone to organizations abusing the obtained information. Currently, location based services can reveal several sensitive
276:
Looking more at the applications and how a user accesses the ride-sharing service, once a user inputs data into the app, it will be accessible on the web forever. Even if they delete information or delete their account, the information has been created on an online platform and now exists whether the
253:
Users have the option to save a home or work address for easy access. Most often, users put their actual address, but in some cases, users have been known to put an address a couple streets away, just for their safety in case data gets leaked. However, while this is a very basic level of deflection,
358:
There is a program, called NRand algorithm, which is the algorithm that determines the amount of obstruction that is put on the user location data. There are a couple issues that arise with this algorithm, including determining how much noise should be implemented and if the changing of the data is
345:
One proposed solution is a model that would estimate how difficult it would be for outside sources to get their hands on someone's private information. There are several mechanisms proposed that would be helpful in hiding data including location obfuscation, perturbation, confusion and suppression,
328:
of users close to the actual users because then exact locations could not be correlated back to the original user in question and these several locations which cannot be identified to the users in close proximity would protect the original user. There is no way to distinguish between all the users.
327:
serves as an
Anonymizing Server, which is a trusted third party server which is in charge of providing anonymous cover for users. K-anonymity is used to preserve the location privacy by creating a location cloak without knowing the actual location of the user. The software attempts to find a number
307:
Researchers have come up with a conclusion which introduces a solution for these issues which is a system that helps with both data privacy and user anonymity. The solution is a program that creates a noise distribution so a user's certain location is offset. It is basically putting the location of
262:
Individuals have concerns over how, what, when, and where their location information is being stored as well as to what extent others have access to it. Not only pertaining to ride-sharing applications, but any applications that have sharing enabled of sorts, there are several types of applications
249:
Relating more to the online profile created of the user, if a person solely relies on ride-sharing services to get around, one can track how long the user has been away from their home and how far away they are from their home. This becomes an opportunity for people to stalk or rob the user because
245:
There are some cases where bad implications could arise. If the user were to partake in something related to their political standpoints, companies can store this for later information and potentially use it against the user if they come into contact with the company in a professional setting. This
354:
Obfuscating a user's location means to cloud the user's location. A user's location coordinates are still being preserved, however the accuracy is just being degraded. However, this cannot be a complete solution because this would just neglect the entire reason of location-based services. So being
211:
Very recently has the presence of physical cameras been implemented in ride-share vehicles. Prior to this, the only time cameras were related to cars were traffic cameras and police cars. However, there has been a rise in the amount of continuous-recording cameras that are not just surveilling the
267:
services are having the user tracked with an environmental footprint. It's an estimate of a user's location. Mobile sensing is the process of pinpointing the user's physical device, which has sensors and information that can be collected. Location sharing is a voluntary state where the user is in
376:
A dummy location is set as the true location. This is done so by pinpointing a user's specific location and transforming it into several other locations, yet keeping the true location. Suppression is a subset of these different applications where for a short period of time, when a user enters an
280:
Most apps have the payment charged and completed before a user can be connected to their ride. Users have the option to store credit card information for easy access instead of having to repeatedly input payment information. While there is an added level of security, such as passcode or touch ID
289:
Users are allowed to input a profile picture into their applications. Doing so has the intention of helping drivers spot their intended riders. However, this can cause an issue because if somehow a rider's image is saved and uploaded to the web, connections can be made to personal accounts. For
241:
There are several areas where data could potentially be abused by the application knowing the rider's location. Since trip data is collected, if the ride-sharing company has partnerships with corporations, their partners can use the data to predict future locations and be able to pinpoint an
50:
options from, but the internet provided the ability to develop platforms, which were more dynamic and interactive. This concept didn't take off because the mechanics were not any different than traditional carpooling, only the ability to find them had been made easier. Since carpooling and
250:
they know when is the ideal time people aren't home. *citation* Looking on a broader scale, based on the demographics of the area a user interacts with, if they frequently visit the same stores within a certain area, information can be assumed, such as estimated income. *citation*
367:
On a map, a location locks onto something in close proximity but not the exact user location because of added noise. With this added layer, if there is another location in a close enough range, a transition will be added to multiple locations and mask all points of interest.
308:
the user through some encryption and reporting that location that only the system knows how to read, so it is not manipulating the actual location, but just how that data is input into the system. This solution has already been implemented into two major operating systems,
263:
that are location aware. Location based searching (LBS) occurs when a user's tracking returns items and buildings around the user's current location in order to be tracked. A map is drawn with the orientation of the surrounding buildings to determine a location.
112:
Letting the app connect to personal data that is stored in the phone, such as access to contacts, can let the app access more than just phone numbers (addresses, personal information) which have been stored under the contact in the
105:
The application automatically connects and tracks the user's current location and surrounding areas, so when the app opens, an accurate map is immediately opened as the home page and the location of the user are immediately
41:
Ride-sharing has been a concept since World War II, but it wasn't until around the 1990s when programs started to digitize. Some of the first telephone-based ride-matching programs were
Bellevue Smart Traveler from the
858:
ZurbarΓ‘n, Mayra; Wightman, Pedro; Brovelli, Maria; Oxoli, Daniele; Iliffe, Mark; Jimeno, Miguel; Salazar, Augusto (2018-08-17). "NRand-K: Minimizing the impact of location obfuscation in spatial analysis".
23:
like other online platforms do. Concerns surrounding the apps include the security of financial details (which are often required to pay for the service), and privacy of personal details and
246:
can apply to medicinal, religious, or legal affiliations as well, that a user's location and places visited cannot be justified when being looked at from an outside perspective.
905:
Hua, Jingyu; Tong, Wei; Xu, Fengyuan; Zhong, Sheng (2017). "A Geo-Indistinguishable
Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries".
281:
before every transaction, this does not ensure the safety of this information in the app. It only ensures that the current transaction is made under the consent of the user.
221:
385:
Original data is unable to be tracked because information goes through some sort of cryptographic interpreter, could be transformed into several different data points.
377:
area, the user information is temporarily suspended and the identity of the user is lost, so when they exit back out of the protected area, they have a new identity.
953:
125:
has an option where user privacy can potentially be forgotten and they are aware of what data they are collecting from the user and are being transparent:
707:
Pingley, Aniket; Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (July 2012). "A context-aware scheme for privacy-preserving location-based services".
27:. Privacy concerns can also rise during the ride as some drivers choose to use passenger facing cameras for their own security. As the use of
637:
592:
135:
Ability to remove stored contacts which adds on another way that can link two people together if someone is tracking someone's information.
788:
Hashemi, Mahdi; Malek, Mohammad Reza (July 2012). "Protecting location privacy in mobile geoservices using fuzzy inference systems".
161:
If a social media account is used to register, information from that profile will be used (name, gender, profile picture, friends)
101:
Ride-sharing companies also have several tracking features that are unclear in terms of what user information is being collected:
16:
664:
Damiani, Maria L. (Oct 2014). "Location privacy models in mobile applications: conceptual view and research directions".
429:
399:
291:
823:
Ji, Rui; Yang, Yupu (2013-06-19). "Smooth support vector learning for fuzzy rule-based classification systems".
43:
745:
Biswas, Pratima; Sairam, Ashok Singh (July 2018). "Modeling privacy approaches for location based services".
254:
putting a home address a couple streets away still gives a general location of where the user is stationed.
173:
Information provided during the driver application (DOB, address, Social
Security, license information etc.)
109:
Recent addresses that have been set as either pick-up or drop-off locations are kept in the search history.
24:
689:
930:
884:
770:
681:
598:
460:
97:
Users can see the profiles of their potential drivers as well as any reviews that come with it.
922:
876:
840:
805:
762:
724:
633:
588:
521:
452:
167:
Payment information to charge riders (although credit card information is not stored by them)
958:
914:
868:
832:
797:
754:
716:
673:
625:
580:
444:
533:
129:
Ability to share or un-share live location as well as having location settings always on.
801:
618:"Zipf distribution model for quantifying risk of re-identification from trajectory data"
294:
advanced algorithm, it is easier to identify people's identities from outside pictures.
91:
Users can invite their friends which the app pulls from their phone contact information.
947:
464:
934:
888:
774:
602:
685:
29:
547:
758:
720:
693:
448:
324:
264:
572:
918:
677:
617:
926:
880:
844:
809:
766:
728:
629:
456:
355:
selective in what an application is obfuscating, would help with protection.
584:
872:
836:
404:
394:
47:
20:
359:
enough to alter it to an unrecognizable form from its original state.
268:
live-time and their location is constantly being updated and tracked.
33:
become more widespread so do the privacy issues associated with them.
158:
Registration information provided to them (name, email, phone number)
478:
69:
Ride-sharing applications have several common user input features:
571:
Hallgren, Per; Orlandi, Claudio; Sabelfeld, Andrei (August 2017).
313:
309:
622:
2015 13th Annual
Conference on Privacy, Security and Trust (PST)
151:
122:
503:
132:
Ability to receive notifications about your account and trip.
88:
Users can save their credit card information for easy access.
577:
2017 IEEE 30th
Computer Security Foundations Symposium (CSF)
138:
Ability to share trip details with 911 in case of emergency.
82:
Users can save unique places if they are visited frequently.
154:'s Privacy Policy, the information they collect includes:
430:"Ridesharing in North America: Past, Present, and Future"
182:
Information about the device that the app's being used on
907:
IEEE Transactions on
Information Forensics and Security
164:
Any information the user chooses to put in the profile
85:
Users can also pinpoint their exact location on a map.
428:Chan, Nelson D.; Shaheen, Susan A. (January 2012).
616:Kikuchi, Hiroaki; Takahashi, Katsumi (July 2015).
222:Omnibus Crime Control and Safe Streets Act of 1968
552:The Reporters Committee for Freedom of the Press
141:Ability to sync personal calendar with the app.
659:
657:
655:
653:
651:
649:
179:Location information including saved locations
740:
738:
579:. Santa Barbara, CA: IEEE. pp. 276β291.
573:"PrivatePool: Privacy-Preserving Ridesharing"
8:
900:
898:
423:
421:
419:
76:Users can input their drop-off destination.
188:Calls and Texts between riders and drivers
73:Users can input their pick-up destination.
790:Computers, Environment and Urban Systems
237:The potential abuse of location-tracking
415:
529:
519:
170:Any interactions with the support team
79:Users can save a home or work address.
55:User input/privacy with software data
7:
954:Transportation in the United States
802:10.1016/j.compenvurbsys.2011.12.002
216:Government policies about recording
94:Users can create their own profile.
176:Payment information to pay drivers
14:
346:and cryptographic techniques.
272:Making use of user information
1:
194:Contacts (if user permits it)
759:10.1016/j.comnet.2018.04.016
721:10.1016/j.comnet.2012.03.022
548:"Reporter's Recording Guide"
449:10.1080/01441647.2011.621557
258:Location aware applications
975:
332:Fuzzy interference systems
919:10.1109/tifs.2017.2779402
825:Intelligent Data Analysis
678:10.1007/s10707-014-0205-7
372:Confusion and suppression
290:example, with Facebook's
630:10.1109/pst.2015.7232949
624:. IEEE. pp. 14β21.
381:Cryptographic techniques
44:University of Washington
341:Location transformation
504:"Lyft Privacy Policy"
363:Location perturbation
207:Camera inside the car
30:ride sharing services
17:Ride sharing networks
350:Location obfuscation
285:Reverse image search
19:face issues of user
861:Transactions in GIS
585:10.1109/CSF.2017.24
65:User input features
873:10.1111/tgis.12462
837:10.3233/ida-130600
532:has generic name (
303:Noise distribution
747:Computer Networks
715:(11): 2551β2568.
709:Computer Networks
639:978-1-4673-7828-4
594:978-1-5386-3217-8
437:Transport Reviews
405:Dashboard cameras
220:According to the
966:
939:
938:
913:(5): 1155β1168.
902:
893:
892:
867:(5): 1257β1274.
855:
849:
848:
820:
814:
813:
785:
779:
778:
742:
733:
732:
704:
698:
697:
661:
644:
643:
613:
607:
606:
568:
562:
561:
559:
558:
544:
538:
537:
531:
527:
525:
517:
515:
514:
499:
493:
492:
490:
489:
483:privacy.uber.com
475:
469:
468:
434:
425:
292:face recognition
974:
973:
969:
968:
967:
965:
964:
963:
944:
943:
942:
904:
903:
896:
857:
856:
852:
822:
821:
817:
787:
786:
782:
744:
743:
736:
706:
705:
701:
663:
662:
647:
640:
615:
614:
610:
595:
570:
569:
565:
556:
554:
546:
545:
541:
528:
518:
512:
510:
501:
500:
496:
487:
485:
477:
476:
472:
432:
427:
426:
417:
413:
391:
383:
374:
365:
352:
343:
334:
322:
305:
300:
287:
274:
260:
239:
234:
218:
209:
204:
148:
120:
67:
62:
57:
39:
12:
11:
5:
972:
970:
962:
961:
956:
946:
945:
941:
940:
894:
850:
831:(4): 679β695.
815:
796:(4): 311β320.
780:
734:
699:
672:(4): 819β842.
666:GeoInformatica
645:
638:
608:
593:
563:
539:
494:
479:"Uber Privacy"
470:
414:
412:
409:
408:
407:
402:
397:
390:
387:
382:
379:
373:
370:
364:
361:
351:
348:
342:
339:
333:
330:
321:
318:
304:
301:
299:
296:
286:
283:
273:
270:
259:
256:
238:
235:
233:
230:
229:
228:
217:
214:
208:
205:
203:
200:
199:
198:
195:
192:
189:
186:
183:
180:
177:
174:
171:
168:
165:
162:
159:
147:
144:
143:
142:
139:
136:
133:
130:
119:
116:
115:
114:
110:
107:
99:
98:
95:
92:
89:
86:
83:
80:
77:
74:
66:
63:
61:
58:
56:
53:
38:
35:
13:
10:
9:
6:
4:
3:
2:
971:
960:
957:
955:
952:
951:
949:
936:
932:
928:
924:
920:
916:
912:
908:
901:
899:
895:
890:
886:
882:
878:
874:
870:
866:
862:
854:
851:
846:
842:
838:
834:
830:
826:
819:
816:
811:
807:
803:
799:
795:
791:
784:
781:
776:
772:
768:
764:
760:
756:
752:
748:
741:
739:
735:
730:
726:
722:
718:
714:
710:
703:
700:
695:
691:
687:
683:
679:
675:
671:
667:
660:
658:
656:
654:
652:
650:
646:
641:
635:
631:
627:
623:
619:
612:
609:
604:
600:
596:
590:
586:
582:
578:
574:
567:
564:
553:
549:
543:
540:
535:
523:
509:
505:
498:
495:
484:
480:
474:
471:
466:
462:
458:
454:
450:
446:
443:(1): 93β112.
442:
438:
431:
424:
422:
420:
416:
410:
406:
403:
401:
398:
396:
393:
392:
388:
386:
380:
378:
371:
369:
362:
360:
356:
349:
347:
340:
338:
331:
329:
326:
319:
317:
315:
311:
302:
297:
295:
293:
284:
282:
278:
271:
269:
266:
257:
255:
251:
247:
243:
236:
231:
227:
226:
225:
223:
215:
213:
206:
201:
196:
193:
190:
187:
184:
181:
178:
175:
172:
169:
166:
163:
160:
157:
156:
155:
153:
150:According to
145:
140:
137:
134:
131:
128:
127:
126:
124:
117:
111:
108:
104:
103:
102:
96:
93:
90:
87:
84:
81:
78:
75:
72:
71:
70:
64:
59:
54:
52:
49:
45:
36:
34:
32:
31:
26:
22:
18:
910:
906:
864:
860:
853:
828:
824:
818:
793:
789:
783:
750:
746:
712:
708:
702:
669:
665:
621:
611:
576:
566:
555:. Retrieved
551:
542:
511:. Retrieved
507:
497:
486:. Retrieved
482:
473:
440:
436:
384:
375:
366:
357:
353:
344:
335:
323:
306:
288:
279:
275:
265:Geo-location
261:
252:
248:
244:
240:
219:
210:
149:
146:Lyft privacy
121:
118:Uber privacy
100:
68:
40:
28:
15:
530:|last=
502:Inc, Lyft.
325:K-anonymity
320:K-anonymity
948:Categories
694:1562335430
557:2020-12-01
513:2019-04-21
488:2019-03-14
411:References
185:Usage data
48:carpooling
927:1556-6013
881:1361-1682
845:1571-4128
810:0198-9715
767:1389-1286
729:1389-1286
465:131187130
457:0144-1647
298:Solutions
935:25233842
889:53013020
775:47021116
753:: 1β14.
690:ProQuest
603:10509617
522:cite web
389:See also
232:Concerns
202:Hardware
191:Feedback
106:tracked.
60:Software
25:location
959:Privacy
686:1536208
395:Carpool
197:Cookies
37:History
21:privacy
933:
925:
887:
879:
843:
808:
773:
765:
727:
692:
684:
636:
601:
591:
463:
455:
310:Mac OS
113:phone.
931:S2CID
885:S2CID
771:S2CID
682:S2CID
599:S2CID
461:S2CID
433:(PDF)
314:Linux
923:ISSN
877:ISSN
841:ISSN
806:ISSN
763:ISSN
725:ISSN
634:ISBN
589:ISBN
534:help
508:Lyft
453:ISSN
400:CCTV
312:and
152:Lyft
123:Uber
915:doi
869:doi
833:doi
798:doi
755:doi
751:140
717:doi
674:doi
626:doi
581:doi
445:doi
950::
929:.
921:.
911:13
909:.
897:^
883:.
875:.
865:22
863:.
839:.
829:17
827:.
804:.
794:36
792:.
769:.
761:.
749:.
737:^
723:.
713:56
711:.
688:.
680:.
670:18
668:.
648:^
632:.
620:.
597:.
587:.
575:.
550:.
526::
524:}}
520:{{
506:.
481:.
459:.
451:.
441:32
439:.
435:.
418:^
937:.
917::
891:.
871::
847:.
835::
812:.
800::
777:.
757::
731:.
719::
696:.
676::
642:.
628::
605:.
583::
560:.
536:)
516:.
491:.
467:.
447::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.