Reconstructing spatial distributions from anonymized locations

James Horey, Stephanie Forrest, Michael Groat

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many realworld scenarios.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Pages243-250
Number of pages8
DOIs
StatePublished - Nov 19 2012
Externally publishedYes
Event2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 - Arlington, VA, United States
Duration: Apr 1 2012Apr 5 2012

Other

Other2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
CountryUnited States
CityArlington, VA
Period4/1/124/5/12

Fingerprint

Spatial distribution
Mobile devices
Mobile phones
Global positioning system
Servers
Communication
Sensors

ASJC Scopus subject areas

  • Software

Cite this

Horey, J., Forrest, S., & Groat, M. (2012). Reconstructing spatial distributions from anonymized locations. In Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 (pp. 243-250). [6313687] https://doi.org/10.1109/ICDEW.2012.82

Reconstructing spatial distributions from anonymized locations. / Horey, James; Forrest, Stephanie; Groat, Michael.

Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. p. 243-250 6313687.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Horey, J, Forrest, S & Groat, M 2012, Reconstructing spatial distributions from anonymized locations. in Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012., 6313687, pp. 243-250, 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012, Arlington, VA, United States, 4/1/12. https://doi.org/10.1109/ICDEW.2012.82
Horey J, Forrest S, Groat M. Reconstructing spatial distributions from anonymized locations. In Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. p. 243-250. 6313687 https://doi.org/10.1109/ICDEW.2012.82
Horey, James ; Forrest, Stephanie ; Groat, Michael. / Reconstructing spatial distributions from anonymized locations. Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. pp. 243-250
@inproceedings{2c4c66fad43c4c9e97a6128e6260668c,
title = "Reconstructing spatial distributions from anonymized locations",
abstract = "Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many realworld scenarios.",
author = "James Horey and Stephanie Forrest and Michael Groat",
year = "2012",
month = "11",
day = "19",
doi = "10.1109/ICDEW.2012.82",
language = "English (US)",
isbn = "9780769547480",
pages = "243--250",
booktitle = "Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012",

}

TY - GEN

T1 - Reconstructing spatial distributions from anonymized locations

AU - Horey, James

AU - Forrest, Stephanie

AU - Groat, Michael

PY - 2012/11/19

Y1 - 2012/11/19

N2 - Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many realworld scenarios.

AB - Devices such as mobile phones, tablets, and sensors are often equipped with GPS that accurately report a person's location. Combined with wireless communication, these devices enable a wide range of new social tools and applications. These same qualities, however, leave location-aware applications vulnerable to privacy violations. This paper introduces the Negative Quad Tree, a privacy protection method for location aware applications. The method is broadly applicable to applications that use spatial density information, such as social applications that measure the popularity of social venues. The method employs a simple anonymization algorithm running on mobile devices, and a more complex reconstruction algorithm on a central server. This strategy is well suited to low-powered mobile devices. The paper analyzes the accuracy of the reconstruction method in a variety of simulated and real-world settings and demonstrates that the method is accurate enough to be used in many realworld scenarios.

UR - http://www.scopus.com/inward/record.url?scp=84869022514&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84869022514&partnerID=8YFLogxK

U2 - 10.1109/ICDEW.2012.82

DO - 10.1109/ICDEW.2012.82

M3 - Conference contribution

AN - SCOPUS:84869022514

SN - 9780769547480

SP - 243

EP - 250

BT - Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012

ER -