Skip to main content

Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis

  • Conference paper
  • First Online:
Data Privacy Management and Security Assurance (DPM 2016, QASA 2016)

Abstract

Targeted Mobile Advertising (TMA) has emerged as a significant driver of the Internet economy. TMA gives rise to interesting challenges: there is a need to balance privacy and utility; there is a need to guarantee that applications’ access to resources is appropriate; and there is a need to ensure that the targeting of ads is effective. As many authors have argued, formal models are ideal vehicles for reasoning about privacy, as well as for reasoning about the relationship between privacy and utility. To this end, we describe how the formal notation Z has been used to develop formal models to underpin a prototype privacy-preserving TMA system. We give consideration to how formal models can help in underpinning the prototype system, in analysing privacy in the context of targeted mobile advertising, and in allowing users to specify control of their personal information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abe, A., Simpson, A.C.: Formal models for privacy. In: Proceedings of the 9th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2016). Bordeaux, France (2016)

    Google Scholar 

  2. Ahn, H., Kim, K.J., Han, I.: Mobile advertisement recommender system using collaborative filtering: MAR-CF. In: Proceedings of the 2006 Conference of the Korea Society of Management Information Systems, pp. 709–715. The Korea Society of Management Information Systems (2006)

    Google Scholar 

  3. Beales, H.: The value of behavioral targeting (2010). http://www.networkadvertising.org/pdfs/Beales_NAI_Study.pdf Accessed April 2015

  4. Farahat, A.: Privacy preserving frequency capping in Internet banner advertising. In: Proceedings of the 18th International Conference on World Wide Web (WWW 2009), pp. 1147–1148. ACM, Madrid, Spain (2009)

    Google Scholar 

  5. Goldfarb, A., Tucker, C.E.: Privacy regulation and online advertising. Manag. Sci. 57(1), 57–71 (2011)

    Article  Google Scholar 

  6. Guha, S., Cheng, B., Francis, P.: Privad: Practical privacy in online advertising. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI 2011), pp. 169–182. Boston, MA, USA (2011)

    Google Scholar 

  7. Haddadi, H.: Fighting online click-fraud using bluff ads. ACM SIGCOMM Comput. Commun. Rev. 40(2), 21–25 (2010)

    Article  Google Scholar 

  8. Haddadi, H., Hui, P., Brown, I.: MobiAd: Private and scalable mobile advertising. In: Proceedings of the 5th ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2010), pp. 33–38. ACM, Chicago, IL, USA (2010)

    Google Scholar 

  9. Hardt, M., Nath, S.: Privacy-aware personalization for mobile advertising. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012), pp. 662–673. ACM, Raleigh, NC, USA (2012)

    Google Scholar 

  10. ISO/IEC: ISO/IEC 13658: Information Technology – Z Formal Specification Notation – Syntax, Type System and Semantics. ISO/IEC (2002)

    Google Scholar 

  11. Jacky, J.: Model-based testing with spec#. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol. 3308, pp. 5–6. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Liu, Y., Simpson, A.C.: Privacy-preserving targeted mobile advertising: Requirements, design, and a prototype implementation. Software: Practice and Experience (2016). http://dx.doi.org/10.1002/spe.2403

  13. Plagge, D., Leuschel, M.: Validating Z specifications using the ProB animator and model checker. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 480–500. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H.J., Cowan, C.: User-driven access control: Rethinking permission granting in modern operating systems. In: Proceedings of the 2012 IEEE Symposium on Security and privacy (SP 2012), pp. 224–238. IEEE, San Francisco, CA, USA (2012)

    Google Scholar 

  15. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010). San Diego, CA, USA (2010), April 6, 2016. https://www.isoc.org/isoc/conferences/ndss/10/pdf/05.pdf

  16. Tschantz, M.C., Wing, J.M.: Formal methods for privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1–15. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Yan, J., Liu, N., Wang, G., Zhang, W., Jiang, Y., Chen, Z.: How much can behavioral targeting help online advertising? In: Proceedings of the 18th International Conference on World Wide Web (WWW 2009), pp. 261–270. ACM, Madrid, Spain (2009)

    Google Scholar 

  18. Yuan, S.T., Tsao, Y.W.: A recommendation mechanism for contextualized mobile advertising. Expert Syst. Appl. 24(4), 399–414 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Liu, Y., Simpson, A. (2016). Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47072-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47071-9

  • Online ISBN: 978-3-319-47072-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics