Skip to main content

Introduction to Mobility Data Privacy

  • Chapter
  • First Online:
  • 1268 Accesses

Abstract

The recent advances in mobile computing and positioning technologies have resulted in a tremendous increase to the amount and accuracy in which human location data can be collected and processed. Human mobility traces can be used to support a number of real-world applications spanning from urban planning and traffic engineering, to studying the spread of diseases and managing environmental pollution. At the same time, research studies have shown that individual mobility is highly predictable and mostly unique, thus information about individuals’ movement can be used by adversaries to re-identify them and to learn sensitive information about their whereabouts. To address such privacy concerns, a significant body of research has emerged in the last 15 years, studying privacy issues related to human mobility and location information, in a number of contexts and real-world applications. This work has led to the adoption of privacy laws worldwide, for location privacy protection, as well as to the proposal of novel privacy models and techniques for technically protecting user privacy, while maintaining data utility. This chapter provides an introduction to the field of mobility data privacy, discusses the emerging research directions, along with the real-world systems and applications that have been proposed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.ryerson.ca/pbdce/about/.

References

  1. G. Acs and C. Castelluccia. A case study: Privacy preserving release of spatio-temporal density in Paris. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’14, pages 1679–1688. ACM, 2014.

    Google Scholar 

  2. R. A. Becker, R. Caceres, K. Hanson, J. M. Loh, S. Urbanek, A. Varshavsky, and C. Volinsky. A tale of one city: Using cellular network data for urban planning. IEEE Pervasive Computing, 10(4):18–26, 2011.

    Article  Google Scholar 

  3. A. T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo, R. A. Peterson, H. Lu, X. Zheng, M. Musolesi, K. Fodor, and G. S. Ahn. The rise of people-centric sensing. IEEE Internet Computing, 12(4):12–21, 2008.

    Article  Google Scholar 

  4. L. Chen, S. Thombre, K. Järvinen, E. S. Lohan, A. AlÖén-Savikko, H. Leppäkoski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, S. Honkala, J. Lindqvist, L. Ruotsalainen, P. Korpisaari, and H. Kuusniemi. Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5:8956–8977, 2017.

    Article  Google Scholar 

  5. Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Nature Scientific Reports, 3, 2013.

    Google Scholar 

  6. M. Douriez, H. Doraiswamy, J. Freire, and C. T. Silva. Anonymizing nyc taxi data: Does it matter? In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 140–148, 2016.

    Google Scholar 

  7. C. Dwork. Differential privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II, ICALP’06, pages 1–12. Springer-Verlag, 2006.

    Google Scholar 

  8. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, Theory of Cryptography, pages 265–284. Springer Berlin Heidelberg, 2006.

    Chapter  Google Scholar 

  9. S. Ejsing-Duun. Location-based games: From screen to street. PhD thesis, Department of Communication and Psychology, Aalborg, University in Copenhagen, 2011.

    Google Scholar 

  10. M. Gerlach and F. Guttler. Privacy in vanets using changing pseudonyms - ideal and real. In 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, pages 2521–2525, 2007.

    Google Scholar 

  11. A. Gkoulalas-Divanis and V. S. Verykios. A privacy-aware trajectory tracking query engine. SIGKDD Explor. Newsl., 10(1):40–49, 2008.

    Article  Google Scholar 

  12. H. Hartenstein and L. P. Laberteaux. A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6):164–171, 2008.

    Article  Google Scholar 

  13. X. Hu, T. H. S. Chu, V. C. M. Leung, E. C. H. Ngai, P. Kruchten, and H. C. B. Chan. A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys Tutorials, 17(3):1557–1581, 2015.

    Article  Google Scholar 

  14. L. Kazemi and C. Shahabi. Geocrowd: Enabling query answering with spatial crowdsourcing. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems, SIGSPATIAL ’12, pages 189–198. ACM, 2012.

    Google Scholar 

  15. F. Mahmud and H. Aris. State of mobile crowdsourcing applications: A review. In 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS), pages 27–32, 2015.

    Google Scholar 

  16. N. Pelekis, A. Gkoulalas-Divanis, M. Vodas, D. Kopanaki, and Y. Theodoridis. Privacy-aware querying over sensitive trajectory data. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM ’11, pages 895–904. ACM, 2011.

    Google Scholar 

  17. N. Pelekis, A. Gkoulalas-Divanis, M. Vodas, A. Plemenos, D. Kopanaki, and Y. Theodoridis. Private-HERMES: A benchmark framework for privacy-preserving mobility data querying and mining methods. In Proceedings of the 15th International Conference on Extending Database Technology, EDBT ’12, pages 598–601. ACM, 2012.

    Google Scholar 

  18. F. Schaub, B. Könings, and M. Weber. Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1):34–43, 2015.

    Article  Google Scholar 

  19. B. Schilit, N. Adams, and R. Want. Context-aware computing applications. In 1994 First Workshop on Mobile Computing Systems and Applications, pages 85–90, 1994.

    Google Scholar 

  20. V. Sivaraman, J. Carrapetta, K. Hu, and B. G. Luxan. Hazewatch: A participatory sensor system for monitoring air pollution in sydney. In 38th Annual IEEE Conference on Local Computer Networks - Workshops, pages 56–64, 2013.

    Google Scholar 

  21. C. E. Walters, M. M. Meslé, and I. M. Hall. Modelling the global spread of diseases: A review of current practice and capability. Epidemics, 2018 (in press). https://www.sciencedirect.com/science/article/pii/S1755436517301135?via%3Dihub.

  22. T. D. Wemegah and S. Zhu. Big data challenges in transportation: A case study of traffic volume count from massive radio frequency identification (RFID) data. In 2017 IEEE International Conference on the Frontiers and Advances in Data Science (FADS), pages 58–63, 2017.

    Google Scholar 

  23. A. Wesolowski, N. Eagle, A. J. Tatem, D. L. Smith, A. M. Noor, R. W. Snow, and C. O. Buckee. Quantifying the impact of human mobility on malaria. Science (New York, N.Y.), 338(6104):267–70, 2012.

    Article  Google Scholar 

  24. H. Wu, S. Xiang, W. S. Ng, W. Wu, and M. Xue. HipStream: A privacy-preserving system for managing mobility data streams. In 2014 IEEE 15th International Conference on Mobile Data Management, volume 1, pages 360–363, 2014.

    Google Scholar 

  25. J. Xia, K. M. Curtin, W. Li, and Y. Zhao. A new model for a carpool matching service. PLoS One, 10(6), 2015.

    Article  Google Scholar 

  26. A. Yaeli, P. Bak, G. Feigenblat, S. Nadler, H. Roitman, G. Saadoun, H. J. Ship, D. Cohen, O. Fuchs, S. Ofek-Koifman, and T. Sandbank. Understanding customer behavior using indoor location analysis and visualization. IBM Journal of Research and Development, 58(5/6):3: 1–3:12, 2014.

    Article  Google Scholar 

  27. A. Yassin, Y. Nasser, M. Awad, A. Al-Dubai, R. Liu, C. Yuen, R. Raulefs, and E. Aboutanios. Recent advances in indoor localization: A survey on theoretical approaches and applications. IEEE Communications Surveys Tutorials, 19(2):1327–1346, 2017.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aris Gkoulalas-Divanis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gkoulalas-Divanis, A., Bettini, C. (2018). Introduction to Mobility Data Privacy. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98161-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98160-4

  • Online ISBN: 978-3-319-98161-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics