132,809 research outputs found
Privacy through uncertainty in location-based services
Location-Based Services (LBS) are becoming more prevalent. While there are many benefits, there are also real privacy risks. People are unwilling to give up the benefits - but can we reduce privacy risks without giving up on LBS entirely?
This paper explores the possibility of introducing uncertainty into location information when using an LBS, so as to reduce privacy risk while maintaining good quality of service. This paper also explores the current uses of uncertainty information in a selection of mobile applications
Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of Twitter users
With the ubiquitous use of location-based services, large-scale individual-level location data has been widely collected through location-awareness devices. Geoprivacy concerns arise on the issues of user identity de-anonymization and location exposure. In this work, we investigate the effectiveness of geomasking techniques for protecting the geoprivacy of active Twitter users who frequently share geotagged tweets in their home and work locations. By analyzing over 38,000 geotagged tweets of 93 active Twitter users in three U.S. cities, the two-dimensional Gaussian masking technique with proper standard deviation settings is found to be more effective to protect user\u27s location privacy while sacrificing geospatial analytical resolution than the random perturbation masking method and the aggregation on traffic analysis zones. Furthermore, a three-dimensional theoretical framework considering privacy, analytics, and uncertainty factors simultaneously is proposed to assess geomasking techniques. Our research offers insights into geoprivacy concerns of social media users\u27 georeferenced data sharing for future development of location-based applications and services
Towards trajectory anonymization: a generalization-based approach
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets. We first adopt the notion of k-anonymity to trajectories and propose a novel generalization-based approach for anonymization of trajectories. We further show that releasing
anonymized trajectories may still have some privacy leaks. Therefore we propose a randomization based reconstruction algorithm for releasing anonymized trajectory data and also present how the underlying techniques can be adapted to other anonymity standards. The experimental results on real and synthetic trajectory datasets show the effectiveness of the proposed techniques
Emerging privacy challenges and approaches in CAV systems
The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing. Numerous developing CAV (Connected and Autonomous Vehicle) functions, such as traffic planning, optimisation, management, safety-critical and cooperative autonomous driving applications, rely on data from various sources. The efficacy of these functions is highly dependent on the dimensionality, amount and accuracy of the data being shared. It holds, in general, that the greater the amount of data available, the greater the efficacy of the function. However, much of this data is privacy-sensitive, including personal, commercial and research data. Location data and its correlation with identity and temporal data can help infer other personal information, such as home/work locations, age, job, behavioural features, habits, social relationships. This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions
On the Measurement of Privacy as an Attacker's Estimation Error
A wide variety of privacy metrics have been proposed in the literature to
evaluate the level of protection offered by privacy enhancing-technologies.
Most of these metrics are specific to concrete systems and adversarial models,
and are difficult to generalize or translate to other contexts. Furthermore, a
better understanding of the relationships between the different privacy metrics
is needed to enable more grounded and systematic approach to measuring privacy,
as well as to assist systems designers in selecting the most appropriate metric
for a given application.
In this work we propose a theoretical framework for privacy-preserving
systems, endowed with a general definition of privacy in terms of the
estimation error incurred by an attacker who aims to disclose the private
information that the system is designed to conceal. We show that our framework
permits interpreting and comparing a number of well-known metrics under a
common perspective. The arguments behind these interpretations are based on
fundamental results related to the theories of information, probability and
Bayes decision.Comment: This paper has 18 pages and 17 figure
Final report: Workshop on: Integrating electric mobility systems with the grid infrastructure
EXECUTIVE SUMMARY:
This document is a report on the workshop entitled “Integrating Electric Mobility
Systems with the Grid Infrastructure” which was held at Boston University on November 6-7
with the sponsorship of the Sloan Foundation. Its objective was to bring together researchers
and technical leaders from academia, industry, and government in order to set a short and longterm research agenda regarding the future of mobility and the ability of electric utilities to meet
the needs of a highway transportation system powered primarily by electricity. The report is a
summary of their insights based on workshop presentations and discussions. The list of
participants and detailed Workshop program are provided in Appendices 1 and 2.
Public and private decisions made in the coming decade will direct profound changes in
the way people and goods are moved and the ability of clean energy sources – primarily
delivered in the form of electricity – to power these new systems. Decisions need to be made
quickly because of rapid advances in technology, and the growing recognition that meeting
climate goals requires rapid and dramatic action. The blunt fact is, however, that the pace of
innovation, and the range of business models that can be built around these innovations, has
grown at a rate that has outstripped our ability to clearly understand the choices that must be
made or estimate the consequences of these choices. The group of people assembled for this
Workshop are uniquely qualified to understand the options that are opening both in the future of
mobility and the ability of electric utilities to meet the needs of a highway transportation system
powered primarily by electricity. They were asked both to explain what is known about the
choices we face and to define the research issues most urgently needed to help public and
private decision-makers choose wisely. This report is a summary of their insights based on
workshop presentations and discussions.
New communication and data analysis tools have profoundly changed the definition of
what is technologically possible. Cell phones have put powerful computers, communication
devices, and position locators into the pockets and purses of most Americans making it possible
for Uber, Lyft and other Transportation Network Companies to deliver on-demand mobility
services. But these technologies, as well as technologies for pricing access to congested
roads, also open many other possibilities for shared mobility services – both public and private –
that could cut costs and travel time by reducing congestion. Options would be greatly expanded
if fully autonomous vehicles become available. These new business models would also affect
options for charging electric vehicles. It is unclear, however, how to optimize charging
(minimizing congestion on the electric grid) without increasing congestion on the roads or
creating significant problems for the power system that supports such charging capacity.
With so much in flux, many uncertainties cloud our vision of the future. The way new
mobility services will reshape the number, length of trips, and the choice of electric vehicle
charging systems and constraints on charging, and many other important behavioral issues are
critical to this future but remain largely unknown. The challenge at hand is to define plausible
future structures of electric grids and mobility systems, and anticipate the direct and indirect
impacts of the changes involved. These insights can provide tools essential for effective private ... [TRUNCATED]Workshop funded by the Alfred P. Sloan Foundatio
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent efforts have highlighted the potential to improve performance by introducing methods to personalize services based on special knowledge about users and their context. For example, a user's demographics, location, and past search and browsing may be useful in enhancing the results offered in response to web search queries. However, reasonable concerns about privacy by both users, providers, and government agencies acting on behalf of citizens, may limit access by services to such information. We introduce and explore an economics of privacy in personalization, where people can opt to share personal information, in a standing or on-demand manner, in return for expected enhancements in the quality of an online service. We focus on the example of web search and formulate realistic objective functions for search efficacy and privacy. We demonstrate how we can find a provably near-optimal optimization of the utility-privacy tradeoff in an efficient manner. We evaluate our methodology on data drawn from a log of the search activity of volunteer participants. We separately assess users’ preferences about privacy and utility via a large-scale survey, aimed at eliciting preferences about peoples’ willingness to trade the sharing of personal data in returns for gains in search efficiency. We show that a significant level of personalization can be achieved using a relatively small amount of information about users
- …