Knowledge (XXG)

Ride sharing privacy

Source πŸ“

337:
pieces of information, like closest religious institutions, which can reveal the identity of the user, which organizations utilize for purely commercial purposes. The paper proposes a solution, anonymization, which protects user's data in case of accidental breaches. There is an explanation of the fuzzy inference system and how it works *explain how it works* and then the potential implication method in taxi drivers to see if this is an effective way of protecting people's information because there isn't a concrete design with anonymization that has proven to do well. There are different levels of precision that the location system can narrow down on a user. These systems turn quantitative data into qualitative data which would obscure a user's identity and location. After a trial implementation with taxi drivers, several complications came up, mostly human misinterpretation, but in the future, investing more time into this solution and combining it with already existing solutions could provide a more effective solution. To those who are afraid of their locations being tracked and that being used to trace back to the user, this solution makes user data fuzzy so if they are being tracking, it is not completely precise. There are data tables that show experimental distances of how close a tracking software was to those who had implemented the fuzzy solution. This solution takes on a different approach because it doesn't entirely solve the problem of how to entirely protect the user's privacy, but it is working towards it since the solution has not had enough time to mature, as it is just in introductory stages. It sheds light on the fact that the location tracking software is still not private even when solutions have been taken to try and overcome this solution but leaves an open ending because it ends that with more research and resources put into it (and specifically told what areas could be developed better) it could expand further and be developed better.
46:, Los Angeles Smart Traveler from Los Angeles's Commuter Transportation Services, and Rideshare Express from Sacramento Rideshare. However, in these telephone-based programs the operational costs started exceeding their revenues and an alternative, internet and email driven ride-matches, was proposed. This program was tested on a closed campus (it was only available to people associated with the University of Washington), which proved highly successful. Two other programs, ATHENA and MINERVA were both computerized but faced unsuccessful endings. When the internet was created in the 1990s, online ride-matching was created. Websites originally had lists or forums that people could get information for 212:
road and keeping track of what happens outside the car. The implementation of cameras inside cars to record interactions between drivers and riders is something new. However, people are concerned about their privacy because this recording goes on during their trip duration, and they do not verbally consent to their recording. However, they consent to being in a person's car, hence they must abide to the driver's rules. There are federal rules about audio recordings, federal laws only requires "one party consent."
51:
ride-sharing were not very popular options, the smaller population who did participate already had set agendas, so timing-wise it was not helpful to those who needed transportation outside of a regular workday commute. Larger scale companies started becoming interested in partnering with ride-matching companies in order to spread the ride-sharing platform. They are gaining more traction as availability of mobile technology and thus accessibility not from a stationary point has become more prominent.
224:, there are policies regarding recording audio conversations, including clarifications about the "one-party consent" rule that comes with it. Regarding audio conversations, it is illegal to record a conversation for which one is not partaking in. However, they are allowed to record if they are a member of the conversation themselves, without having to receive consent from the other party or having to let them know there is recording happening. 242:
individual's interests and market towards them. Corporations can collect information on what types of stores and what brands are most often visited by a user and can build an online profile, which is traceable. This can also relate to advertising companies, which can target personal interests and alter their online interactions to start showing ads that are catered and specific towards where the user has visited. *citation*
316:. This solution helps with those who are suspicious of using these ride-sharing applications because of the fear of their privacy being invaded or potentially data being stolen, but this software has proven that it can handle securing data as well as keeping the user anonymous. It is more like an extra layer of security that creates another blanket to hide the user. 277:
user consents to it or not. These applications ask for user information such as phone number, email, and profile picture, all features which can be used to trace back to the user's identity. Once this information is in the application's database, it can accessed by the application as well as indirectly by any partners of the app.
336:
Another solution is to try and use fuzzy interference systems when relating to mobile geo-services. This solution would use different details to identify the user that would not be prone to organizations abusing the obtained information. Currently, location based services can reveal several sensitive
276:
Looking more at the applications and how a user accesses the ride-sharing service, once a user inputs data into the app, it will be accessible on the web forever. Even if they delete information or delete their account, the information has been created on an online platform and now exists whether the
253:
Users have the option to save a home or work address for easy access. Most often, users put their actual address, but in some cases, users have been known to put an address a couple streets away, just for their safety in case data gets leaked. However, while this is a very basic level of deflection,
358:
There is a program, called NRand algorithm, which is the algorithm that determines the amount of obstruction that is put on the user location data. There are a couple issues that arise with this algorithm, including determining how much noise should be implemented and if the changing of the data is
345:
One proposed solution is a model that would estimate how difficult it would be for outside sources to get their hands on someone's private information. There are several mechanisms proposed that would be helpful in hiding data including location obfuscation, perturbation, confusion and suppression,
328:
of users close to the actual users because then exact locations could not be correlated back to the original user in question and these several locations which cannot be identified to the users in close proximity would protect the original user. There is no way to distinguish between all the users.
327:
serves as an Anonymizing Server, which is a trusted third party server which is in charge of providing anonymous cover for users. K-anonymity is used to preserve the location privacy by creating a location cloak without knowing the actual location of the user. The software attempts to find a number
307:
Researchers have come up with a conclusion which introduces a solution for these issues which is a system that helps with both data privacy and user anonymity. The solution is a program that creates a noise distribution so a user's certain location is offset. It is basically putting the location of
262:
Individuals have concerns over how, what, when, and where their location information is being stored as well as to what extent others have access to it. Not only pertaining to ride-sharing applications, but any applications that have sharing enabled of sorts, there are several types of applications
249:
Relating more to the online profile created of the user, if a person solely relies on ride-sharing services to get around, one can track how long the user has been away from their home and how far away they are from their home. This becomes an opportunity for people to stalk or rob the user because
245:
There are some cases where bad implications could arise. If the user were to partake in something related to their political standpoints, companies can store this for later information and potentially use it against the user if they come into contact with the company in a professional setting. This
354:
Obfuscating a user's location means to cloud the user's location. A user's location coordinates are still being preserved, however the accuracy is just being degraded. However, this cannot be a complete solution because this would just neglect the entire reason of location-based services. So being
211:
Very recently has the presence of physical cameras been implemented in ride-share vehicles. Prior to this, the only time cameras were related to cars were traffic cameras and police cars. However, there has been a rise in the amount of continuous-recording cameras that are not just surveilling the
267:
services are having the user tracked with an environmental footprint. It's an estimate of a user's location. Mobile sensing is the process of pinpointing the user's physical device, which has sensors and information that can be collected. Location sharing is a voluntary state where the user is in
376:
A dummy location is set as the true location. This is done so by pinpointing a user's specific location and transforming it into several other locations, yet keeping the true location. Suppression is a subset of these different applications where for a short period of time, when a user enters an
280:
Most apps have the payment charged and completed before a user can be connected to their ride. Users have the option to store credit card information for easy access instead of having to repeatedly input payment information. While there is an added level of security, such as passcode or touch ID
289:
Users are allowed to input a profile picture into their applications. Doing so has the intention of helping drivers spot their intended riders. However, this can cause an issue because if somehow a rider's image is saved and uploaded to the web, connections can be made to personal accounts. For
241:
There are several areas where data could potentially be abused by the application knowing the rider's location. Since trip data is collected, if the ride-sharing company has partnerships with corporations, their partners can use the data to predict future locations and be able to pinpoint an
50:
options from, but the internet provided the ability to develop platforms, which were more dynamic and interactive. This concept didn't take off because the mechanics were not any different than traditional carpooling, only the ability to find them had been made easier. Since carpooling and
250:
they know when is the ideal time people aren't home. *citation* Looking on a broader scale, based on the demographics of the area a user interacts with, if they frequently visit the same stores within a certain area, information can be assumed, such as estimated income. *citation*
367:
On a map, a location locks onto something in close proximity but not the exact user location because of added noise. With this added layer, if there is another location in a close enough range, a transition will be added to multiple locations and mask all points of interest.
308:
the user through some encryption and reporting that location that only the system knows how to read, so it is not manipulating the actual location, but just how that data is input into the system. This solution has already been implemented into two major operating systems,
263:
that are location aware. Location based searching (LBS) occurs when a user's tracking returns items and buildings around the user's current location in order to be tracked. A map is drawn with the orientation of the surrounding buildings to determine a location.
112:
Letting the app connect to personal data that is stored in the phone, such as access to contacts, can let the app access more than just phone numbers (addresses, personal information) which have been stored under the contact in the
105:
The application automatically connects and tracks the user's current location and surrounding areas, so when the app opens, an accurate map is immediately opened as the home page and the location of the user are immediately
41:
Ride-sharing has been a concept since World War II, but it wasn't until around the 1990s when programs started to digitize. Some of the first telephone-based ride-matching programs were Bellevue Smart Traveler from the
858:
ZurbarΓ‘n, Mayra; Wightman, Pedro; Brovelli, Maria; Oxoli, Daniele; Iliffe, Mark; Jimeno, Miguel; Salazar, Augusto (2018-08-17). "NRand-K: Minimizing the impact of location obfuscation in spatial analysis".
23:
like other online platforms do. Concerns surrounding the apps include the security of financial details (which are often required to pay for the service), and privacy of personal details and
246:
can apply to medicinal, religious, or legal affiliations as well, that a user's location and places visited cannot be justified when being looked at from an outside perspective.
905:
Hua, Jingyu; Tong, Wei; Xu, Fengyuan; Zhong, Sheng (2017). "A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries".
281:
before every transaction, this does not ensure the safety of this information in the app. It only ensures that the current transaction is made under the consent of the user.
221: 385:
Original data is unable to be tracked because information goes through some sort of cryptographic interpreter, could be transformed into several different data points.
377:
area, the user information is temporarily suspended and the identity of the user is lost, so when they exit back out of the protected area, they have a new identity.
953: 125:
has an option where user privacy can potentially be forgotten and they are aware of what data they are collecting from the user and are being transparent:
707:
Pingley, Aniket; Yu, Wei; Zhang, Nan; Fu, Xinwen; Zhao, Wei (July 2012). "A context-aware scheme for privacy-preserving location-based services".
27:. Privacy concerns can also rise during the ride as some drivers choose to use passenger facing cameras for their own security. As the use of 637: 592: 135:
Ability to remove stored contacts which adds on another way that can link two people together if someone is tracking someone's information.
788:
Hashemi, Mahdi; Malek, Mohammad Reza (July 2012). "Protecting location privacy in mobile geoservices using fuzzy inference systems".
161:
If a social media account is used to register, information from that profile will be used (name, gender, profile picture, friends)
101:
Ride-sharing companies also have several tracking features that are unclear in terms of what user information is being collected:
16: 664:
Damiani, Maria L. (Oct 2014). "Location privacy models in mobile applications: conceptual view and research directions".
429: 399: 291: 823:
Ji, Rui; Yang, Yupu (2013-06-19). "Smooth support vector learning for fuzzy rule-based classification systems".
43: 745:
Biswas, Pratima; Sairam, Ashok Singh (July 2018). "Modeling privacy approaches for location based services".
254:
putting a home address a couple streets away still gives a general location of where the user is stationed.
173:
Information provided during the driver application (DOB, address, Social Security, license information etc.)
109:
Recent addresses that have been set as either pick-up or drop-off locations are kept in the search history.
24: 689: 930: 884: 770: 681: 598: 460: 97:
Users can see the profiles of their potential drivers as well as any reviews that come with it.
922: 876: 840: 805: 762: 724: 633: 588: 521: 452: 167:
Payment information to charge riders (although credit card information is not stored by them)
958: 914: 868: 832: 797: 754: 716: 673: 625: 580: 444: 533: 129:
Ability to share or un-share live location as well as having location settings always on.
801: 618:"Zipf distribution model for quantifying risk of re-identification from trajectory data" 294:
advanced algorithm, it is easier to identify people's identities from outside pictures.
91:
Users can invite their friends which the app pulls from their phone contact information.
947: 464: 934: 888: 774: 602: 685: 29: 547: 758: 720: 693: 448: 324: 264: 572: 918: 677: 617: 926: 880: 844: 809: 766: 728: 629: 456: 355:
selective in what an application is obfuscating, would help with protection.
584: 872: 836: 404: 394: 47: 20: 359:
enough to alter it to an unrecognizable form from its original state.
268:
live-time and their location is constantly being updated and tracked.
33:
become more widespread so do the privacy issues associated with them.
158:
Registration information provided to them (name, email, phone number)
478: 69:
Ride-sharing applications have several common user input features:
571:
Hallgren, Per; Orlandi, Claudio; Sabelfeld, Andrei (August 2017).
313: 309: 622:
2015 13th Annual Conference on Privacy, Security and Trust (PST)
151: 122: 503: 132:
Ability to receive notifications about your account and trip.
88:
Users can save their credit card information for easy access.
577:
2017 IEEE 30th Computer Security Foundations Symposium (CSF)
138:
Ability to share trip details with 911 in case of emergency.
82:
Users can save unique places if they are visited frequently.
154:'s Privacy Policy, the information they collect includes: 430:"Ridesharing in North America: Past, Present, and Future" 182:
Information about the device that the app's being used on
907:
IEEE Transactions on Information Forensics and Security
164:
Any information the user chooses to put in the profile
85:
Users can also pinpoint their exact location on a map.
428:Chan, Nelson D.; Shaheen, Susan A. (January 2012). 616:Kikuchi, Hiroaki; Takahashi, Katsumi (July 2015). 222:Omnibus Crime Control and Safe Streets Act of 1968 552:The Reporters Committee for Freedom of the Press 141:Ability to sync personal calendar with the app. 659: 657: 655: 653: 651: 649: 179:Location information including saved locations 740: 738: 579:. Santa Barbara, CA: IEEE. pp. 276–291. 573:"PrivatePool: Privacy-Preserving Ridesharing" 8: 900: 898: 423: 421: 419: 76:Users can input their drop-off destination. 188:Calls and Texts between riders and drivers 73:Users can input their pick-up destination. 790:Computers, Environment and Urban Systems 237:The potential abuse of location-tracking 415: 529: 519: 170:Any interactions with the support team 79:Users can save a home or work address. 55:User input/privacy with software data 7: 954:Transportation in the United States 802:10.1016/j.compenvurbsys.2011.12.002 216:Government policies about recording 94:Users can create their own profile. 176:Payment information to pay drivers 14: 346:and cryptographic techniques. 272:Making use of user information 1: 194:Contacts (if user permits it) 759:10.1016/j.comnet.2018.04.016 721:10.1016/j.comnet.2012.03.022 548:"Reporter's Recording Guide" 449:10.1080/01441647.2011.621557 258:Location aware applications 975: 332:Fuzzy interference systems 919:10.1109/tifs.2017.2779402 825:Intelligent Data Analysis 678:10.1007/s10707-014-0205-7 372:Confusion and suppression 290:example, with Facebook's 630:10.1109/pst.2015.7232949 624:. IEEE. pp. 14–21. 381:Cryptographic techniques 44:University of Washington 341:Location transformation 504:"Lyft Privacy Policy" 363:Location perturbation 207:Camera inside the car 30:ride sharing services 17:Ride sharing networks 350:Location obfuscation 285:Reverse image search 19:face issues of user 861:Transactions in GIS 585:10.1109/CSF.2017.24 65:User input features 873:10.1111/tgis.12462 837:10.3233/ida-130600 532:has generic name ( 303:Noise distribution 747:Computer Networks 715:(11): 2551–2568. 709:Computer Networks 639:978-1-4673-7828-4 594:978-1-5386-3217-8 437:Transport Reviews 405:Dashboard cameras 220:According to the 966: 939: 938: 913:(5): 1155–1168. 902: 893: 892: 867:(5): 1257–1274. 855: 849: 848: 820: 814: 813: 785: 779: 778: 742: 733: 732: 704: 698: 697: 661: 644: 643: 613: 607: 606: 568: 562: 561: 559: 558: 544: 538: 537: 531: 527: 525: 517: 515: 514: 499: 493: 492: 490: 489: 483:privacy.uber.com 475: 469: 468: 434: 425: 292:face recognition 974: 973: 969: 968: 967: 965: 964: 963: 944: 943: 942: 904: 903: 896: 857: 856: 852: 822: 821: 817: 787: 786: 782: 744: 743: 736: 706: 705: 701: 663: 662: 647: 640: 615: 614: 610: 595: 570: 569: 565: 556: 554: 546: 545: 541: 528: 518: 512: 510: 501: 500: 496: 487: 485: 477: 476: 472: 432: 427: 426: 417: 413: 391: 383: 374: 365: 352: 343: 334: 322: 305: 300: 287: 274: 260: 239: 234: 218: 209: 204: 148: 120: 67: 62: 57: 39: 12: 11: 5: 972: 970: 962: 961: 956: 946: 945: 941: 940: 894: 850: 831:(4): 679–695. 815: 796:(4): 311–320. 780: 734: 699: 672:(4): 819–842. 666:GeoInformatica 645: 638: 608: 593: 563: 539: 494: 479:"Uber Privacy" 470: 414: 412: 409: 408: 407: 402: 397: 390: 387: 382: 379: 373: 370: 364: 361: 351: 348: 342: 339: 333: 330: 321: 318: 304: 301: 299: 296: 286: 283: 273: 270: 259: 256: 238: 235: 233: 230: 229: 228: 217: 214: 208: 205: 203: 200: 199: 198: 195: 192: 189: 186: 183: 180: 177: 174: 171: 168: 165: 162: 159: 147: 144: 143: 142: 139: 136: 133: 130: 119: 116: 115: 114: 110: 107: 99: 98: 95: 92: 89: 86: 83: 80: 77: 74: 66: 63: 61: 58: 56: 53: 38: 35: 13: 10: 9: 6: 4: 3: 2: 971: 960: 957: 955: 952: 951: 949: 936: 932: 928: 924: 920: 916: 912: 908: 901: 899: 895: 890: 886: 882: 878: 874: 870: 866: 862: 854: 851: 846: 842: 838: 834: 830: 826: 819: 816: 811: 807: 803: 799: 795: 791: 784: 781: 776: 772: 768: 764: 760: 756: 752: 748: 741: 739: 735: 730: 726: 722: 718: 714: 710: 703: 700: 695: 691: 687: 683: 679: 675: 671: 667: 660: 658: 656: 654: 652: 650: 646: 641: 635: 631: 627: 623: 619: 612: 609: 604: 600: 596: 590: 586: 582: 578: 574: 567: 564: 553: 549: 543: 540: 535: 523: 509: 505: 498: 495: 484: 480: 474: 471: 466: 462: 458: 454: 450: 446: 443:(1): 93–112. 442: 438: 431: 424: 422: 420: 416: 410: 406: 403: 401: 398: 396: 393: 392: 388: 386: 380: 378: 371: 369: 362: 360: 356: 349: 347: 340: 338: 331: 329: 326: 319: 317: 315: 311: 302: 297: 295: 293: 284: 282: 278: 271: 269: 266: 257: 255: 251: 247: 243: 236: 231: 227: 226: 225: 223: 215: 213: 206: 201: 196: 193: 190: 187: 184: 181: 178: 175: 172: 169: 166: 163: 160: 157: 156: 155: 153: 150:According to 145: 140: 137: 134: 131: 128: 127: 126: 124: 117: 111: 108: 104: 103: 102: 96: 93: 90: 87: 84: 81: 78: 75: 72: 71: 70: 64: 59: 54: 52: 49: 45: 36: 34: 32: 31: 26: 22: 18: 910: 906: 864: 860: 853: 828: 824: 818: 793: 789: 783: 750: 746: 712: 708: 702: 669: 665: 621: 611: 576: 566: 555:. Retrieved 551: 542: 511:. Retrieved 507: 497: 486:. Retrieved 482: 473: 440: 436: 384: 375: 366: 357: 353: 344: 335: 323: 306: 288: 279: 275: 265:Geo-location 261: 252: 248: 244: 240: 219: 210: 149: 146:Lyft privacy 121: 118:Uber privacy 100: 68: 40: 28: 15: 530:|last= 502:Inc, Lyft. 325:K-anonymity 320:K-anonymity 948:Categories 694:1562335430 557:2020-12-01 513:2019-04-21 488:2019-03-14 411:References 185:Usage data 48:carpooling 927:1556-6013 881:1361-1682 845:1571-4128 810:0198-9715 767:1389-1286 729:1389-1286 465:131187130 457:0144-1647 298:Solutions 935:25233842 889:53013020 775:47021116 753:: 1–14. 690:ProQuest 603:10509617 522:cite web 389:See also 232:Concerns 202:Hardware 191:Feedback 106:tracked. 60:Software 25:location 959:Privacy 686:1536208 395:Carpool 197:Cookies 37:History 21:privacy 933:  925:  887:  879:  843:  808:  773:  765:  727:  692:  684:  636:  601:  591:  463:  455:  310:Mac OS 113:phone. 931:S2CID 885:S2CID 771:S2CID 682:S2CID 599:S2CID 461:S2CID 433:(PDF) 314:Linux 923:ISSN 877:ISSN 841:ISSN 806:ISSN 763:ISSN 725:ISSN 634:ISBN 589:ISBN 534:help 508:Lyft 453:ISSN 400:CCTV 312:and 152:Lyft 123:Uber 915:doi 869:doi 833:doi 798:doi 755:doi 751:140 717:doi 674:doi 626:doi 581:doi 445:doi 950:: 929:. 921:. 911:13 909:. 897:^ 883:. 875:. 865:22 863:. 839:. 829:17 827:. 804:. 794:36 792:. 769:. 761:. 749:. 737:^ 723:. 713:56 711:. 688:. 680:. 670:18 668:. 648:^ 632:. 620:. 597:. 587:. 575:. 550:. 526:: 524:}} 520:{{ 506:. 481:. 459:. 451:. 441:32 439:. 435:. 418:^ 937:. 917:: 891:. 871:: 847:. 835:: 812:. 800:: 777:. 757:: 731:. 719:: 696:. 676:: 642:. 628:: 605:. 583:: 560:. 536:) 516:. 491:. 467:. 447::

Index

Ride sharing networks
privacy
location
ride sharing services
University of Washington
carpooling
Uber
Lyft
Omnibus Crime Control and Safe Streets Act of 1968
Geo-location
face recognition
Mac OS
Linux
K-anonymity
Carpool
CCTV
Dashboard cameras



"Ridesharing in North America: Past, Present, and Future"
doi
10.1080/01441647.2011.621557
ISSN
0144-1647
S2CID
131187130
"Uber Privacy"
"Lyft Privacy Policy"
cite web

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑