skip to main content
research-article

A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information

Published: 01 August 2015 Publication History

Abstract

Organizations are starting to realize the significant value of advertising on mobile devices, and a number of systems have been developed to exploit this opportunity. From a privacy perspective, practically all systems developed so far are based either on a trusted third-party model or on a generalized architecture. We propose a system for delivering context, location, time, and preference-aware advertisements to mobiles with a novel architecture to preserve privacy. The main adversary in our model is the server distributing the ads, which is trying to identify users and track them, and to a lesser extent, other peers in the wireless network. When a node is interested in an ad, it forms a group of nearby nodes seeking ads and willing to cooperate to achieve privacy. Peers combine their interests using a shuffling mechanism in an ad-hoc network and send them through a primary peer to the ad-server. In this way, preferences are masqueraded to request custom ads, which are then distributed by the primary peer. Another mechanism is proposed to implement the billing process without disclosing user identities.

References

[1]
L. Aalto, N. Gothlin, J. Korhonen, and T. Ojala, “Bluetooth and WAP push based location-aware mobile advertising system,” in Proc. 2nd Int. Conf. Mobile Syst., Appl., Serv., 2004, pp. 49–58.
[3]
C. Andersson, M. Kohlweiss, L.A. Martucci, and A. Panchenko, “A self-certified and Sybil-free framework for secure digital identity domain buildup,” in Proc. 2nd IFIP WG 11.2 Int. Conf. Inf. Security Theory Practices: Smart Dev., Convergence Next Generation Netw., May 2008, pp. 64–77.
[5]
Apple Inc. (2010) Apple customer privacy policy [Online] Available: http://www.apple.com/privacy/
[6]
R. Bulander, M. Decker, G. Schiefer, and B. Klmel, “Advertising via mobile terminals—Delivering context sensitive and personalized advertising while guaranteeing privacy, ” in Proc. 2nd Int. Conf. E-Bus. Telecommun. Netw., 2007, pp. 15 –25.
[7]
R. Bulander, M. Decker, G. Schiefer, and B. Kolmel, “Comparison of different approaches for mobile advertising,” in Proc. 2nd IEEE Int. Workshop Mobile Commerce Serv., 2006, pp. 174–182.
[8]
A. Bureau. (2012). Internet Advertising Revenues Set First Quarter Record at $8.4 Billion. www.iab.net/about the iab/recent press releases/press release archive/press release/pr-061112.
[9]
H. Choi, W. Enck, J. Shin, P. D. McDaniel, and T. F. La Porta, “ASR: Anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks,” Wireless Netw., vol. 15, pp. 525–539, 2009.
[10]
G. Danezis, R. Dingledine, and N. Mathewson, “ Mixminion: Design of a type III anonymous remailer protocol,” in Proc. Symp. Security Privacy, 2003, pp. 2–15.
[11]
S. Debroy, S. De, S. Das, A. Chakbraborty, P. Das, and S. Paul, “ My-PULSE: Mobile yellow pages with user interest and location sensing ensemble,” in Proc. IEEE Region 10 Conf., 2009, pp. 1–6.
[12]
R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The second-generation onion router,” in Proc. 13th Conf. USENIX Security Symposium, 2004, p. 21.
[13]
Crypt4All Lite (AES), https://play.google.com/store/apps/details?id=com.codewell4.Crypt4AllLite&hl=en, 2014.
[14]
A. Fawaz, A. Hojaij, H. Kobeissi, and H. Artail, “An on-demand mobile advertising system that protects source privacy using interest aggregation,” in Proc. 7th IEEE Int. Conf. Wireless Mobile Comput., Netw. Commun., Shanghai, China, Oct. 2011, pp. 127–134.
[15]
M. J. Freedman and R. Morris, “Tarzan: A peer-to-peer anonymizing network layer,” in Proc. 9th ACM Conf. Comput. Commun. Security, 2002, pp. 193–206.
[16]
S. Goel, M. Robson, M. Polte, and E. Sirer, “ Herbivore: A scalable and efficient protocol for anonymous communication,” Cornell University, Ithaca, NY, USA, Tech. Rep. TR2003-1890, 2003.
[17]
Google Inc. (2009). Admob privacy policy [Online]. Available: http://www.admob.com/home/privacy
[18]
C. Gulcu and G. Tsudik, “Mixing E-mail with Babel,” in Proc. Symp. Netw. Syst. Security , 1996, pp. 2–16.
[19]
H. Haddadi, P. Hui, and I. Brown, “MobiAd: Private and scalable mobile advertising,” in Proc. 5th ACM Int. Workshop Mobility Evolving Internet Archit., 2010, pp. 33–38.
[20]
J. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, “ How to win the clone wars: Efficient periodic n-times anonymous authentication,” in Proc. 13th ACM Conf. Comput. Commun. Security, Oct. 2006, pp. 201–210.
[21]
X. Lin, X. Sun, P. H. Ho, and X. Shen, “GSIS: A secure and privacy-preserving protocol for vehicular communications,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442–3456, Nov. 2007.
[22]
A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Proc. IEEE Symp. Security Privacy, 2008, pp. 111–125.
[23]
A. Pathak, Y. C. Hu, M. Zhang, P. Bahl, and Y.-M. Wang, “Fine-grained power modeling for smartphones using system call tracing,” in Proc. 6th Conf. Comput. Syst., Salzburg, Austria, Apr. 2011, pp. 153–168.
[24]
P. Pearce, A. Felt, G. Nunez, and D. Wagner, “AdDroid: Privilege separation for applications and advertisers in android,” in Proc. 7th ACM Symp. Inf., Comput. Commun. Security, Seoul, Korea, May 2012, pp. 4 –5.
[25]
M. K. Reiter and A. D. Rubin, “Crowds: Anonymity for web transactions,” ACM Trans. Inf. Syst. Security, vol. 1, pp. 66 –92, 1998.
[26]
J. Sanchez, J. Cano, C. Calafate, and P. Manzoni, “BlueMall: A bluetooth-based advertisement system for commercial areas,” in Proc. 3rd ACM Workshop Perform. Monitoring Meas. Heterogeneous Wireless Wired Netw., 2008, pp. 17–22.
[27]
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J. Hubaux, “Preserving privacy in collaborative filtering through distributed aggregation of offline profiles,” in Proc. 3rd ACM Conf. Recommender Syst., 2009, pp. 157–164.
[29]
Y. Sun and G. Ji, “ Privacy preserving in personalized mobile marketing,” in Proc. 6th Int. Conf. Active Media Technol., 2010, pp. 538–545.
[30]
N. Vratonjic, J. Freudiger, and J.-P. Hubaux, “ Integrity of the web content: The case of online advertising,” in Proc. Int. Conf. Collaborative Methods Security Privacy, 2010, p. 2.
[31]
X. Wu and E. Bertino, “ Achieving k-anonymity in mobile ad hoc networks,” in Proc. 1st IEEE ICNP Workshop Secure Netw. Protocols, 2005, pp. 37–42.
[32]
D. Xu, S. Liao, and Q. Li, “ Combining empirical experimentation and modeling techniques: A design research approach for personalized mobile advertising applications,” Decision Support Syst., vol. 44, no. 3, pp. 710–724, 2008.
[33]
H. Xu, J. Bagby, and T. Melonas, “Regulating privacy in wireless advertising messaging: FIPP compliance by policy vs. by design,” in Proc. 9th Int. Symp. Privacy Enhancing Technol., 2009, pp. 19–36.

Cited By

View all

Index Terms

  1. A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Mobile Computing
          IEEE Transactions on Mobile Computing  Volume 14, Issue 8
          Aug. 2015
          220 pages

          Publisher

          IEEE Educational Activities Department

          United States

          Publication History

          Published: 01 August 2015

          Author Tags

          1. mobile devices
          2. Network privacy
          3. mobile advertising
          4. advertising billing
          5. collaboration

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 07 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media