Skip to main content

Anonymity-Preserving Methods for Client-Side Filtering in Position-Based Collaboration Approaches

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10397))

Abstract

This paper describes and evaluates three methods for anonymizing location data in the context of an example of practical relevance. These anonymization methods are designed for a smartphone-based system to integrate voluntary helpers into professional rescue processes, especially in case of time-critical medical emergencies, but can also be used for other collaboration approaches. We analyze the methods with a focus on anonymity of the operation site, precision and filtering.

This is a preview of subscription content, log in via an institution.

References

  1. Detjen, H., Hoffmann, S., Rösner, L., Winter, S., Geisler, S., Krämer, N., Bumiller, G.: Integrating volunteers into rescue processes: analysis of user requirements and mobile app conception. Int. J. Inf. Syst. Crisis Response Manag. 7, 1–18 (2015)

    Article  Google Scholar 

  2. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  3. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond K-anonymity. ACM Trans. Knowl. Discov. Data 1, 3 (2007)

    Article  Google Scholar 

  4. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering (2007)

    Google Scholar 

  5. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1

    Chapter  Google Scholar 

  6. Vagts, H.-H.: Privatheit und Datenschutz in der intelligenten Überwachung. KIT Scientific Publishing, Karlsruhe (2013)

    Google Scholar 

  7. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, California (2003)

    Google Scholar 

  8. Masoumzadeh, A., Joshi, J., Karimi, H.A.: LBS (K, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, Washington (2009)

    Google Scholar 

  9. European Commission, “europa.eu”. http://ec.europa.eu/eurostat/de/web/population-and-housing-census/census-data/2011-census. Accessed May 10 2016

  10. Kim, J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the Section on Survey Research Methods of the American (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Hoffmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Detjen, H., Hoffmann, S., Bumiller, G., Geisler, S., Jansen, M., Markard, M. (2017). Anonymity-Preserving Methods for Client-Side Filtering in Position-Based Collaboration Approaches. In: Yoshino, T., Yuizono, T., Zurita, G., Vassileva, J. (eds) Collaboration Technologies and Social Computing. CollabTech 2017. Lecture Notes in Computer Science(), vol 10397. Springer, Cham. https://doi.org/10.1007/978-3-319-63088-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63088-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63087-8

  • Online ISBN: 978-3-319-63088-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics