» Articles » PMID: 34996962

Modelling Imperfect Knowledge Via Location Semantics for Realistic Privacy Risks Estimation in Trajectory Data

Overview
Journal Sci Rep
Specialty Science
Date 2022 Jan 8
PMID 34996962
Citations 1
Authors
Affiliations
Soon will be listed here.
Abstract

Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis. Location-based service providers must balance the value they extract from trajectory data with protecting the privacy of the individuals behind those trajectories. Reaching this goal requires measuring accurately the values of utility and privacy. Current measurement approaches assume adversaries with perfect knowledge, thus overestimate the privacy risk. To address this issue, we introduce a model of an adversary with imperfect knowledge about the target. The model is based on equivalence areas, spatio-temporal regions with a semantic meaning, e.g. the target's home, whose size and accuracy determine the skill of the adversary. We then derive the standard privacy metrics of k-anonymity, l-diversity and t-closeness from the definition of equivalence areas. These metrics can be computed on any dataset, irrespective of whether and what kind of anonymization has been applied to it. This work is of high relevance to all service providers acting as processors of trajectory data who want to manage privacy risks and optimize the privacy vs. utility trade-off of their services.

Citing Articles

Collective privacy recovery: Data-sharing coordination via decentralized artificial intelligence.

Pournaras E, Ballandies M, Bennati S, Chen C PNAS Nexus. 2024; 3(2):pgae029.

PMID: 38328783 PMC: 10847902. DOI: 10.1093/pnasnexus/pgae029.

References
1.
de Montjoye Y, Hidalgo C, Verleysen M, Blondel V . Unique in the Crowd: The privacy bounds of human mobility. Sci Rep. 2013; 3:1376. PMC: 3607247. DOI: 10.1038/srep01376. View

2.
de Montjoye Y, Radaelli L, Singh V, Pentland A . Identity and privacy. Unique in the shopping mall: on the reidentifiability of credit card metadata. Science. 2015; 347(6221):536-9. DOI: 10.1126/science.1256297. View