Skip to main content

Privacy Preservation of GPS Traces

  • Reference work entry
  • First Online:
Encyclopedia of GIS
  • 95 Accesses

Synonyms

Privacy of location traces; Anonymization of GPS traces; Privacy preserving in location based services

Definition

Techniques to evaluate and enhance the privacy of users that contribute traces of their movements to a geographical information system (GIS). Due to the increasing prevalence of global positioning system (GPS) chips in consumer electronics and advances in wireless networking, GIS can collect GPS traces of large numbers of individual users. These traces give rise to privacy concerns, since GPS traces can reveal visits to sensitive or private places (e.g., home, medical clinics) and associated information such as time of day or speed of travel.

Privacy can be enhanced through standard data protection techniques such as policy disclosure, obtaining user consent, access control, and encryption. Anonymization, another standard technique, is of particular interest for GIS applications that aggregate data from many users, since it also protects against accidental and...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,599.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 1,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD conference on management of data. ACM, Dallas, pp 439–450

    Google Scholar 

  • Beresford A, Stajano F (2004) Mix zones: user privacy in location-aware services. In: IEEE workshop on pervasive computing and communication security (PerSec). IEEE Computer Society, Washington DC, pp 127–131

    Google Scholar 

  • Blumberg AJ, Keeler L, Shelat A (2005) Automated traffic enforcement which respects driver privacy. In: Proceedings of the 7th international IEEE conference on intelligent transportation systems, Vienna. IEEE Computer Society, Washington DC, pp 650–655

    Google Scholar 

  • Brandeis L, Warren S (1890) The right to privacy. Harv Law Rev 4(5):193–220

    Article  Google Scholar 

  • Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10):1030–1044

    Article  Google Scholar 

  • Choi JY, Jakobsson M, Wetzel S (2005) Balancing auditability and privacy in vehicular networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’05), Montreal. ACM, New York, pp 79–87

    Google Scholar 

  • Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the first international conference on mobile systems, applications, and services, San Francisco. ACM, New York, pp 31–42

    Google Scholar 

  • Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Proceedings of IEEE/Create-Net SecureComm 2005, Athens. IEEE Computer Society, Washington DC, pp 194–205

    Google Scholar 

  • Hoh B, Gruteser M, Xiong H, Alrabady A (2006a) Enhancing privacy preservation of anonymous location sampling techniques in traffic monitoring systems. In: Proceedings (poster session) of IEEE/Create-Net SecureComm 2006, Baltimore. IEEE Computer Society, Washington DC, pp 1–3

    Google Scholar 

  • Hoh B, Gruteser M, Xiong H, Alrabady A (2006b) Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Comput 5(4):38–46

    Article  Google Scholar 

  • Hoh B, Gruteser M, Xiong H, Alrabady A (2007, in press) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), Alexandria. ACM, New York

    Google Scholar 

  • Li M, Sampigethaya K, Huang L, Poovendran R (2006) Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM workshop on privacy in electronic society (WPES’06), Alexandria. ACM, New York, pp 19–28. doi:10.1145/1179601.1179605

    Google Scholar 

  • Reid D (1979) An algorithm for tracking multiple targets. IEEE Trans Autom Control 24(6):843–854

    Article  Google Scholar 

  • Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (Technical report SRI-CSL-98-04). Computer Science Laboratory, SRI International

    Google Scholar 

Recommended Reading

  • Civilis A, Pakalnis S (2005) Techniques for efficient road-network-based tracking of moving objects. IEEE Trans Knowl Data Eng 17(5):698–712. Senior Member-Christian S. Jensen

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this entry

Cite this entry

Gruteser, M., Hoh, B. (2017). Privacy Preservation of GPS Traces. In: Shekhar, S., Xiong, H., Zhou, X. (eds) Encyclopedia of GIS. Springer, Cham. https://doi.org/10.1007/978-3-319-17885-1_1020

Download citation

Publish with us

Policies and ethics