Reconstructing spatial distributions from anonymized locations

James Horey, Stephanie Forrest, Michael Groat

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

Abstract

Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many realworld scenarios.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Pages243-250
Number of pages8
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 - Arlington, VA, United States
Duration: Apr 1 2012Apr 5 2012

Publication series

NameProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012

Other

Other2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Country/TerritoryUnited States
CityArlington, VA
Period4/1/124/5/12

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Reconstructing spatial distributions from anonymized locations'. Together they form a unique fingerprint.

Cite this