132,809 research outputs found

    Privacy through uncertainty in location-based services

    Get PDF
    Location-Based Services (LBS) are becoming more prevalent. While there are many benefits, there are also real privacy risks. People are unwilling to give up the benefits - but can we reduce privacy risks without giving up on LBS entirely? This paper explores the possibility of introducing uncertainty into location information when using an LBS, so as to reduce privacy risk while maintaining good quality of service. This paper also explores the current uses of uncertainty information in a selection of mobile applications

    Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of Twitter users

    Get PDF
    With the ubiquitous use of location-based services, large-scale individual-level location data has been widely collected through location-awareness devices. Geoprivacy concerns arise on the issues of user identity de-anonymization and location exposure. In this work, we investigate the effectiveness of geomasking techniques for protecting the geoprivacy of active Twitter users who frequently share geotagged tweets in their home and work locations. By analyzing over 38,000 geotagged tweets of 93 active Twitter users in three U.S. cities, the two-dimensional Gaussian masking technique with proper standard deviation settings is found to be more effective to protect user\u27s location privacy while sacrificing geospatial analytical resolution than the random perturbation masking method and the aggregation on traffic analysis zones. Furthermore, a three-dimensional theoretical framework considering privacy, analytics, and uncertainty factors simultaneously is proposed to assess geomasking techniques. Our research offers insights into geoprivacy concerns of social media users\u27 georeferenced data sharing for future development of location-based applications and services

    Towards trajectory anonymization: a generalization-based approach

    Get PDF
    Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets. We first adopt the notion of k-anonymity to trajectories and propose a novel generalization-based approach for anonymization of trajectories. We further show that releasing anonymized trajectories may still have some privacy leaks. Therefore we propose a randomization based reconstruction algorithm for releasing anonymized trajectory data and also present how the underlying techniques can be adapted to other anonymity standards. The experimental results on real and synthetic trajectory datasets show the effectiveness of the proposed techniques

    Emerging privacy challenges and approaches in CAV systems

    Get PDF
    The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing. Numerous developing CAV (Connected and Autonomous Vehicle) functions, such as traffic planning, optimisation, management, safety-critical and cooperative autonomous driving applications, rely on data from various sources. The efficacy of these functions is highly dependent on the dimensionality, amount and accuracy of the data being shared. It holds, in general, that the greater the amount of data available, the greater the efficacy of the function. However, much of this data is privacy-sensitive, including personal, commercial and research data. Location data and its correlation with identity and temporal data can help infer other personal information, such as home/work locations, age, job, behavioural features, habits, social relationships. This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions

    On the Measurement of Privacy as an Attacker's Estimation Error

    Get PDF
    A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial models, and are difficult to generalize or translate to other contexts. Furthermore, a better understanding of the relationships between the different privacy metrics is needed to enable more grounded and systematic approach to measuring privacy, as well as to assist systems designers in selecting the most appropriate metric for a given application. In this work we propose a theoretical framework for privacy-preserving systems, endowed with a general definition of privacy in terms of the estimation error incurred by an attacker who aims to disclose the private information that the system is designed to conceal. We show that our framework permits interpreting and comparing a number of well-known metrics under a common perspective. The arguments behind these interpretations are based on fundamental results related to the theories of information, probability and Bayes decision.Comment: This paper has 18 pages and 17 figure

    Final report: Workshop on: Integrating electric mobility systems with the grid infrastructure

    Full text link
    EXECUTIVE SUMMARY: This document is a report on the workshop entitled “Integrating Electric Mobility Systems with the Grid Infrastructure” which was held at Boston University on November 6-7 with the sponsorship of the Sloan Foundation. Its objective was to bring together researchers and technical leaders from academia, industry, and government in order to set a short and longterm research agenda regarding the future of mobility and the ability of electric utilities to meet the needs of a highway transportation system powered primarily by electricity. The report is a summary of their insights based on workshop presentations and discussions. The list of participants and detailed Workshop program are provided in Appendices 1 and 2. Public and private decisions made in the coming decade will direct profound changes in the way people and goods are moved and the ability of clean energy sources – primarily delivered in the form of electricity – to power these new systems. Decisions need to be made quickly because of rapid advances in technology, and the growing recognition that meeting climate goals requires rapid and dramatic action. The blunt fact is, however, that the pace of innovation, and the range of business models that can be built around these innovations, has grown at a rate that has outstripped our ability to clearly understand the choices that must be made or estimate the consequences of these choices. The group of people assembled for this Workshop are uniquely qualified to understand the options that are opening both in the future of mobility and the ability of electric utilities to meet the needs of a highway transportation system powered primarily by electricity. They were asked both to explain what is known about the choices we face and to define the research issues most urgently needed to help public and private decision-makers choose wisely. This report is a summary of their insights based on workshop presentations and discussions. New communication and data analysis tools have profoundly changed the definition of what is technologically possible. Cell phones have put powerful computers, communication devices, and position locators into the pockets and purses of most Americans making it possible for Uber, Lyft and other Transportation Network Companies to deliver on-demand mobility services. But these technologies, as well as technologies for pricing access to congested roads, also open many other possibilities for shared mobility services – both public and private – that could cut costs and travel time by reducing congestion. Options would be greatly expanded if fully autonomous vehicles become available. These new business models would also affect options for charging electric vehicles. It is unclear, however, how to optimize charging (minimizing congestion on the electric grid) without increasing congestion on the roads or creating significant problems for the power system that supports such charging capacity. With so much in flux, many uncertainties cloud our vision of the future. The way new mobility services will reshape the number, length of trips, and the choice of electric vehicle charging systems and constraints on charging, and many other important behavioral issues are critical to this future but remain largely unknown. The challenge at hand is to define plausible future structures of electric grids and mobility systems, and anticipate the direct and indirect impacts of the changes involved. These insights can provide tools essential for effective private ... [TRUNCATED]Workshop funded by the Alfred P. Sloan Foundatio

    A Utility-Theoretic Approach to Privacy in Online Services

    Get PDF
    Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent efforts have highlighted the potential to improve performance by introducing methods to personalize services based on special knowledge about users and their context. For example, a user's demographics, location, and past search and browsing may be useful in enhancing the results offered in response to web search queries. However, reasonable concerns about privacy by both users, providers, and government agencies acting on behalf of citizens, may limit access by services to such information. We introduce and explore an economics of privacy in personalization, where people can opt to share personal information, in a standing or on-demand manner, in return for expected enhancements in the quality of an online service. We focus on the example of web search and formulate realistic objective functions for search efficacy and privacy. We demonstrate how we can find a provably near-optimal optimization of the utility-privacy tradeoff in an efficient manner. We evaluate our methodology on data drawn from a log of the search activity of volunteer participants. We separately assess users’ preferences about privacy and utility via a large-scale survey, aimed at eliciting preferences about peoples’ willingness to trade the sharing of personal data in returns for gains in search efficiency. We show that a significant level of personalization can be achieved using a relatively small amount of information about users
    corecore