LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Rossi, Luca; Walker, James; Musolesi, Mirco (2015)
Publisher: Springer Nature
Journal: EPJ Data Science
Languages: English
Types: Article
Subjects: Physics - Data Analysis, Statistics and Probability, GPS, privacy, identification, Computer Science - Computers and Society, Computer Science - Cryptography and Security
One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers. Moreover, people tend to have regular routines and be characterized by a set of “significant places”, thus making it possible to identify a user from his/her mobility data. In this paper we present a series of techniques for identifying individuals from their GPS movements. More specifically, we study the uniqueness of GPS information for three popular datasets, and we provide a detailed analysis of the discriminatory power of speed, direction and distance of travel. Most importantly, we present a simple yet effective technique for the identification of users from location information that are not included in the original dataset used for training, thus raising important privacy concerns for the management of location datasets.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Bohn J, Coroama˘ V, Langheinrich M, Mattern F, Rohs M (2005) Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In: Ambient intelligence. Springer, Berlin, pp 5-29
    • 2. Krumm J (2009) A survey of computational location privacy. Pers Ubiquitous Comput 13(6):391-399
    • 3. Hightower J, Borriello G (2001) Location systems for ubiquitous computing. Computer 34(8):57-66
    • 4. Ashbrook D, Starner T (2003) Using GPS to learn significant locations and predict movement across multiple users. Pers Ubiquitous Comput 7(5):275-286
    • 5. Zheng Y, Li Q, Chen Y, Xie X, Ma W-Y (2008) Understanding mobility based on GPS data. In: Proceedings of UbiComp'08. ACM, New York, pp 312-321
    • 6. de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the crowd: The privacy bounds of human mobility. Sci Rep 3:1376
    • 7. Gonzalez MC, Hidalgo CA, Barabasi A-L (2008) Understanding individual human mobility patterns. Nature 453(7196):779-782
    • 8. Piorkowski M, Sarafijanovic-Djukic N, Grossglauser M (2009) CRAWDAD data set epfl/mobility (v. 2009-02-24). Downloaded from http://crawdad.cs.dartmouth.edu/epfl/mobility
    • 9. Musolesi M, Piraccini M, Fodor K, Corradi A, Campbell A (2008) CRAWDAD data set dartmouth/cenceme (v. 2008-08-13). Downloaded from http://crawdad.cs.dartmouth.edu/dartmouth/cenceme
    • 10. Microsoft Research (2012) Geolife trajectories (v. 1.3). Downloaded from http://research.microsoft.com/en-us/downloads/b16d359d-d164-469e-9fd4-daa38f2b2e13
    • 11. Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):571-588
    • 12. Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of ICDE'08, pp 376-385
    • 13. Robusto C (1957) The cosine-haversine formula. Am Math Mon 64(1):38-40
    • 14. Dubuisson M-P, Jain AK (1994) A modified Hausdorff distance for object matching. In: Proceedings of ICPR'94, pp 566-568
    • 15. Sack J-R, Urrutia J (1999) Handbook of computational geometry. Elsevier, Amsterdam
    • 16. Berndt DJ, Clifford J (1994) Using dynamic time warping to find patterns in time series. In: Proceedings of the AAAI-94 workshop on knowledge discovery in databases, vol 10, pp 359-370
    • 17. Ratanamahatana CA, Keogh E (2004) Everything you know about dynamic time warping is wrong. In: Proceedings of the third workshop on mining temporal and sequential data, pp 22-25
    • 18. Brakatsoulas S, Pfoser D, Salas R, Wenk C (2005) On map-matching vehicle tracking data. In: Proceedings of the 31st international conference on very large data bases, pp 853-864
    • 19. Piorkowski M, Sarafijanovoc-Djukic N, Grossglauser M (2009) A parsimonious model of mobile partitioned networks with clustering. In: Proceedings of COMSNETS'09
    • 20. Musolesi M, Piraccini M, Fodor K, Corradi A, Campbell AT (2010) Supporting energy-efficient uploading strategies for continuous sensing applications on mobile phones. In: Proceedings of Pervasive'10. Springer, Berlin, pp 355-372
    • 21. Robinson AH (1960) Elements of cartography. Soil Sci 90(2):147
    • 22. Thornton C (1998) Separability is a learner's best friend. In: Proceedings of the 4th neural computation and psychology workshop. Springer, Berlin, pp 40-46
    • 23. Gruteser M, Hoh B (2005) On the anonymity of periodic location samples. In: Security in pervasive computing. Springer, Berlin, pp 179-192
    • 24. de Montjoye Y-A, Radaelli L, Singh VK, Pentland A (2015) Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221):536-539
    • 25. Golle P, Partridge K (2009) On the anonymity of home/work location pairs. In: Proceedings of Pervasive'09. Springer, Berlin, pp 390-397
    • 26. Ranjan G, Zang H, Zhang Z-L, Bolot J (2012) Are call detail records biased for sampling human mobility? Mob Comput Commun Rev 16(3):33-44
    • 27. De Mulder Y, Danezis G, Batina L, Preneel B (2008) Identification via location-profiling in GSM networks. In: Proceedings of WPES'08. ACM, New York, pp 23-32
    • 28. Rossi L, Musolesi M (2014) It's the way you check-in: identifying users in location-based social networks. In: Proceedings of COSN'14. ACM, New York, pp 215-226
    • 29. Monreale A, Rinzivillo S, Pratesi F, Giannotti F, Pedreschi D (2014) Privacy-by-design in big data analytics and social mining. EPJ Data Sci 3(1):10
    • 30. Xue AY, Zhang R, Zheng Y, Xie X, Huang J, Xu Z (2013) Destination prediction by sub-trajectory synthesis and privacy protection against such prediction. In: Proceedings of ICDE'13, pp 254-265
    • 31. Krumm J (2007) Inference attacks on location tracks. In: Proceedings of Pervasive'07. Lecture notes in computer science, vol 4480. Springer, Berlin, pp 127-143
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

  • RCUK | The Uncertainty of Identit...

Cite this article