Skip to main content

Privacy in Geospatial Applications and Location-Based Social Networks

  • Chapter
  • First Online:
Handbook of Mobile Data Privacy

Abstract

The use of location data has greatly benefited from the availability of location-based services, the popularity of social networks, and the accessibility of public location data sets. However, in addition to providing users with the ability to obtain accurate driving directions or the convenience of geo-tagging friends and pictures, location is also a very sensitive type of data, as attested by more than a decade of research on different aspects of privacy related to location data.

In this chapter, we focus on two domains that rely on location data as their core component: Geospatial applications (such as thematic maps and crowdsourced geo-information) and location-based social networks. We discuss the increasing relevance of geospatial applications to the current location-aware services, and we describe relevant concepts such as volunteered geographic information, geo-surveillance and how they relate to privacy. Then, we focus on a subcategory of geospatial applications, location-based social networks, and we introduce the different entities (such as users, services and providers) that are involved in such networks, and we characterize their role and interactions. We present the main privacy challenges and we discuss the approaches that have been proposed to mitigate privacy risks in location-based social networks. Finally, we conclude with a discussion of open research questions and promising directions that will contribute to improve privacy for users of location-based social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.merriam-webster.com/dictionary/cartography, last retrieved Dec. 4, 2016.

  2. 2.

    https://www.census.gov/geo/maps-data/maps/thematic.html, last retrieved Dec. 4, 2016.

  3. 3.

    http://unstats.un.org/unsd/demographic/sources/census/wphc/default.htm, last retrieved Dec. 4, 2016.

  4. 4.

    http://www.census.gov/data/data-tools.html, last retrieved Dec. 4, 2016.

  5. 5.

    http://earthexplorer.usgs.gov/, last retrieved Dec. 4, 2016.

  6. 6.

    https://www.google.com/earth/, last retrieved Dec. 4, 2016.

  7. 7.

    https://www.bing.com/maps/, last retrieved Dec. 4, 2016.

  8. 8.

    https://www.arcgis.com/features/index.html, last retrieved Dec. 4, 2016.

  9. 9.

    https://www.openstreetmap.org/, last retrieved Dec. 4, 2016.

  10. 10.

    http://wikimapia.org/, last retrieved Dec. 4, 2016.

  11. 11.

    http://www.openstreetmap.org/, last retrieved Dec. 4, 2016.

  12. 12.

    https://www.dhs.gov/radio-frequency-identification-rfid-what-it, last retrieved Dec. 4, 2016.

  13. 13.

    http://guides.lib.uw.edu/c.php?g=341594&p=2304475, last retrieved Dec. 6, 2016.

  14. 14.

    https://www.police.uk/, last retrieved Dec 7, 2016.

  15. 15.

    https://www.hipaa.com/hipaa-protected-health-information-what-does-phi-include/, last retrieved Dec. 4, 2016.

  16. 16.

    https://www.google.com/trends/, last retrieved Dec 7, 2016.

  17. 17.

    https://epic.org/privacy/flutrends/EPIC_ltr_FluTrends_11-08.pdf, last retrieved Dec 7, 2016.

  18. 18.

    http://www.classmates.com/, last retrieved on Dec. 14, 2016.

  19. 19.

    http://www.friendster.com/, last retrieved on Dec. 14, 2016. Friendster is no longer active as of Jun. 14, 2015.

  20. 20.

    https://www.linkedin.com/.

  21. 21.

    https://myspace.com/, last retrieved Dec. 14, 2016.

  22. 22.

    https://www.facebook.com/, last retrieved Dec. 14, 2016.

  23. 23.

    http://mashable.com/2012/03/11/gowalla-shuts-down/#sBOot7U3xSqf, last retrieved Dec. 14, 2016. Gowalla is no longer active as of 2012.

  24. 24.

    https://foursquare.com/, last retrieved Dec 14, 2016.

  25. 25.

    https://www.fitbit.com/, last retrieved Dec 16, 2016.

  26. 26.

    https://www.torproject.org/, last retrieved Dec. 16, 2016.

  27. 27.

    https://cloud.google.com/prediction/, https://aws.amazon.com/machine-learning/, last retrieved Dec. 17, 2016.

References

  1. M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 308–318. ACM, 2016.

    Google Scholar 

  2. A. Acquisti, I. Adjerid, and L. Brandimarte. Gone in 15 seconds: The limits of privacy transparency and control. IEEE Security & Privacy, 4(11):72–74, 2013.

    Article  Google Scholar 

  3. A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In International workshop on privacy enhancing technologies, pages 36–58. Springer, 2006.

    Google Scholar 

  4. G. J. Annas. Hipaa regulations-a new era of medical-record privacy? New England Journal of Medicine, 348(15):1486–1490, 2003.

    Article  Google Scholar 

  5. S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday, 11(9), 2006.

    Google Scholar 

  6. V. Benson, G. Saridakis, and H. Tennakoon. Information disclosure of social media users: does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3):426–441, 2015.

    Article  Google Scholar 

  7. M. Bezzi. An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3):199–215, 2010.

    MathSciNet  Google Scholar 

  8. G. Biczók and P. H. Chia. Interdependent privacy: Let me share your data. In International Conference on Financial Cryptography and Data Security, pages 338–353. Springer, 2013.

    Google Scholar 

  9. I. Bilogrevic, M. Jadliwala, I. Lám, I. Aad, P. Ginzboorg, V. Niemi, L. Bindschaedler, and J.-P. Hubaux. Big brother knows your friends: on privacy of social communities in pervasive networks. In International Conference on Pervasive Computing, pages 370–387. Springer Berlin Heidelberg, 2012.

    Google Scholar 

  10. I. Bilogrevic and M. Ortlieb. If you put all the pieces together…: Attitudes towards data combination and sharing across services and companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 5215–5227. ACM, 2016.

    Google Scholar 

  11. A. J. Blatt. The benefits and risks of volunteered geographic information. Journal of Map & Geography Libraries, 11(1):99–104, 2015.

    Article  Google Scholar 

  12. A. J. Blatt. Data privacy and ethical uses of volunteered geographic information. In Health, Science, and Place, pages 49–59. Springer, 2015.

    Google Scholar 

  13. D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III. Public key encryption that allows pir queries. In Annual International Cryptology Conference, pages 50–67. Springer, 2007.

    Google Scholar 

  14. J. A. Bovenberg, B. M. Knoppers, A. Hansell, and K. de Hoogh. Exposing participants? population biobanks go geo. European Journal of Human Genetics, 2015.

    Google Scholar 

  15. T. Burghardt, E. Buchmann, J. Müller, and K. Böhm. Understanding user preferences and awareness: Privacy mechanisms in location-based services. In OTM Confederated International Conferences” On the Move to Meaningful Internet Systems”, pages 304–321. Springer, 2009.

    Google Scholar 

  16. J. Cabalona. Gowalla Is Officially Shut Down.

    Google Scholar 

  17. B. Carbunar, M. Rahman, and N. Pissinou. A survey of privacy vulnerabilities and defenses in geosocial networks. IEEE Communications Magazine, 51(11):114–119, 2013.

    Article  Google Scholar 

  18. S. Chainey and L. Tompson. Engagement, empowerment and transparency: publishing crime statistics using online crime mapping. Policing, 6(3):228–239, 2012.

    Article  Google Scholar 

  19. C. Chan. Robbers Checked Facebook Status Updates To See When People Weren’t Home.

    Google Scholar 

  20. Y. Chen and H. Kobayashi. Signal strength based indoor geolocation. In Communications, 2002. ICC 2002. IEEE International Conference on, volume 1, pages 436–439. IEEE, 2002.

    Google Scholar 

  21. C. D. Cottrill et al. Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making. Transportation Research Part C: Emerging Technologies, 56:132–148, 2015.

    Article  Google Scholar 

  22. J. W. Crampton. Cartographic rationality and the politics of geosurveillance and security. Cartography and Geographic Information Science, 30(2):135–148, 2003.

    Article  Google Scholar 

  23. J. W. Crampton. Mapping: A critical introduction to cartography and GIS, volume 11. John Wiley & Sons, 2011.

    Google Scholar 

  24. R. Dayarathna. Taxonomy for information privacy metrics. J. Int’l Com. L. & Tech., 6:194, 2011.

    Google Scholar 

  25. C. Dempsey. Privacy in gis issues, 2008.

    Google Scholar 

  26. S. N. Desk. How many CCTV Cameras are there globally?, June 2015.

    Google Scholar 

  27. B. Dickinson. Infographic: 80% of robbers check Twitter, Facebook, Google Street View.

    Google Scholar 

  28. T. Dienlin and S. Trepte. Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3):285–297, 2015.

    Article  Google Scholar 

  29. W. Dong, V. Dave, L. Qiu, and Y. Zhang. Secure friend discovery in mobile social networks. In INFOCOM, 2011 Proceedings IEEE, pages 1647–1655. IEEE, 2011.

    Google Scholar 

  30. S. O. Dyke, E. S. Dove, and B. M. Knoppers. Sharing health-related data: a privacy test? NPJ Genomic Medicine, 1:16024, 2016.

    Article  Google Scholar 

  31. N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255–268, 2006.

    Article  Google Scholar 

  32. E. Erdin, C. Zachor, and M. H. Gunes. How to find hidden users: a survey of attacks on anonymity networks. IEEE Communications Surveys & Tutorials, 17(4):2296–2316, 2015.

    Article  Google Scholar 

  33. Facebook. Help Center - Location Privacy.

    Google Scholar 

  34. Facebook. Privacy Settings and Tools.

    Google Scholar 

  35. Facebook. Facebook Reports Second Quarter 2016 Results, 2016.

    Google Scholar 

  36. Facebook. Stats, facebook newsroom, 2016.

    Google Scholar 

  37. Fitbit. What should i know about my fitbit badges?, 2016.

    Google Scholar 

  38. M. Foucault. Discipline and punish: The birth of the prison. Vintage, 1977.

    Google Scholar 

  39. M. Foucault, G. Burchell, C. Gordon, and P. Miller. The Foucault effect: Studies in governmentality. University of Chicago Press, 1991.

    Google Scholar 

  40. D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, and C. S. Jensen. Preserving location and absence privacy in geo-social networks. In Proceedings of the 19th ACM international conference on Information and knowledge management, pages 309–318. ACM, 2010.

    Google Scholar 

  41. M. Furini. Users behavior in location-aware services: Digital natives versus digital immigrants. Advances in Human-Computer Interaction, 2014, 2014.

    Google Scholar 

  42. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 121–132. ACM, 2008.

    Google Scholar 

  43. O. Goldreich. Foundations of cryptography: volume 2, basic applications. Cambridge university press, 2009.

    MATH  Google Scholar 

  44. P. Golle and K. Partridge. On the anonymity of home/work location pairs. In International Conference on Pervasive Computing, pages 390–397. Springer, 2009.

    Google Scholar 

  45. M. F. Goodchild. Citizens as sensors: the world of volunteered geography. GeoJournal, 69(4):211–221, 2007.

    Article  Google Scholar 

  46. Google. Google My Account.

    Google Scholar 

  47. Google. The Next Chapter for Flu Trends.

    Google Scholar 

  48. M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In International Conference on Security in Pervasive Computing, pages 179–192. Springer, 2005.

    Google Scholar 

  49. B. Han, P. Cook, and T. Baldwin. Text-based twitter user geolocation prediction. Journal of Artificial Intelligence Research, 49:451–500, 2014.

    Article  Google Scholar 

  50. F. Harvey. To volunteer or to contribute locational information? towards truth in labeling for crowdsourced geographic information. In Crowdsourcing Geographic Knowledge, pages 31–42. Springer, 2013.

    Google Scholar 

  51. S. Hasan and S. V. Ukkusuri. Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, 44:363–381, 2014.

    Article  Google Scholar 

  52. S. Hasan and S. V. Ukkusuri. Location contexts of user check-ins to model urban geo life-style patterns. PloS one, 10(5):e0124819, 2015.

    Article  Google Scholar 

  53. S. Hasan, S. V. Ukkusuri, and X. Zhan. Understanding social influence in activity-location choice and life-style patterns using geo-location data from social media. Frontiers in ICT, 3:10, 2016.

    Article  Google Scholar 

  54. D. S. Herrmann. Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI. CRC Press, 2007.

    Book  Google Scholar 

  55. H. Hodson. Baidu uses millions of users’ location data to make predictions, 2016.

    Google Scholar 

  56. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38–46, 2006.

    Article  Google Scholar 

  57. P. Hu, T. Mukherjee, A. Valliappan, and S. Radziszowski. Homomorphic proximity computation in geosocial networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pages 616–621. IEEE, 2016.

    Google Scholar 

  58. Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In 2012 IEEE Symposium on Security and Privacy, pages 272–284. IEEE, 2012.

    Google Scholar 

  59. M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In International Conference on Financial Cryptography and Data Security, pages 407–426. Springer, 2015.

    Google Scholar 

  60. ICO. Crime-mapping and geo-spatial crime data: Privacy and transparency principles., 2012.

    Google Scholar 

  61. IDC. Worldwide Wearables Market Increases 67.2% Amid Seasonal Retrenchment, According to IDC.

    Google Scholar 

  62. N. Jean, M. Burke, M. Xie, W. M. Davis, D. B. Lobell, and S. Ermon. Combining satellite imagery and machine learning to predict poverty. Science, 353(6301):790–794, Aug. 2016.

    Article  Google Scholar 

  63. C. S. Jensen, H. Lu, and M. L. Yiu. Location privacy techniques in client-server architectures. In Privacy in location-based applications, pages 31–58. Springer, 2009.

    Google Scholar 

  64. D. Jurgens. That’s what friends are for: Inferring location in online social media platforms based on social relationships. ICWSM, 13:273–282, 2013.

    Google Scholar 

  65. M. Kandias, L. Mitrou, V. Stavrou, and D. Gritzalis. Which side are you on? a new panopticon vs. privacy. In Security and Cryptography (SECRYPT), 2013 International Conference on, pages 1–13. IEEE, 2013.

    Google Scholar 

  66. B. Kar and R. Ghose. Is my information private? geo-privacy in the world of social media. In GIO@ GIScience, pages 28–31, 2014.

    Google Scholar 

  67. H.-S. Kim. What drives you to check in on facebook? motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, 54:397–406, 2016.

    Article  Google Scholar 

  68. R. Kitchin. The real-time city? big data and smart urbanism. GeoJournal, 79(1):1–14, 2014.

    Article  Google Scholar 

  69. R. Kitchin. Data-driven, networked urbanism. In Data and the City workshop, 2015.

    Google Scholar 

  70. P. Kotzanikolaou, C. Patsakis, E. Magkos, and M. Korakakis. Lightweight private proximity testing for geospatial social networks. Computer Communications, 73:263–270, 2016.

    Article  Google Scholar 

  71. O. Kounadi, K. Bowers, and M. Leitner. Crime Mapping On-line: Public Perception of Privacy Issues. European Journal on Criminal Policy and Research, 21(1):167–190, Mar. 2015.

    Article  Google Scholar 

  72. D. Lazer, R. Kennedy, G. King, and A. Vespignani. The parable of google flu: traps in big data analysis. Science, 343(6176):1203–1205, 2014.

    Article  Google Scholar 

  73. J. H. Lee, S. Gao, K. Janowicz, and K. G. Goulias. Can twitter data be used to validate travel demand models? In IATBR 2015-WINDSOR, 2015.

    Google Scholar 

  74. H. Li, H. Zhu, S. Du, X. Liang, and X. Shen. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing, (1):1–1, 2016.

    Google Scholar 

  75. H. P. Li, H. Hu, and J. Xu. Nearby friend alert: Location anonymity in mobile geosocial networks. IEEE Pervasive Computing, 12(4):62–70, 2013.

    Article  Google Scholar 

  76. D. Lian and X. Xie. Collaborative activity recognition via check-in history. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-Based Social Networks, pages 45–48. ACM, 2011.

    Google Scholar 

  77. F. Liu, D. Janssens, J. Cui, G. Wets, and M. Cools. Characterizing activity sequences using profile hidden markov models. Expert Systems with Applications, 42(13):5705–5722, 2015.

    Article  Google Scholar 

  78. Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 61–70. ACM, 2011.

    Google Scholar 

  79. M. Madden. Americans Consider Certain Kinds of Data to be More Sensitive than Others, Nov. 2014.

    Google Scholar 

  80. M. Madden, S. Fox, A. Smith, and J. Vitak. Digital Footprints: Online identity management and search in the age of transparency. Pew Internet & American Life Project Washington, DC, 2007.

    Google Scholar 

  81. B. M. C. f. MailOnline. Ashley Madison members reveal the impact of last year’s hack, Aug. 2016.

    Google Scholar 

  82. A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic. (smart) watch your taps: side-channel keystroke inference attacks using smartwatches. In Proceedings of the 2015 ACM International Symposium on Wearable Computers, pages 27–30. ACM, 2015.

    Google Scholar 

  83. S. Mardenfeld, D. Boston, S. J. Pan, Q. Jones, A. Iamntichi, and C. Borcea. Gdc: Group discovery using co-location traces. In Social computing (SocialCom), 2010 IEEE second international conference on, pages 641–648. IEEE, 2010.

    Google Scholar 

  84. M. Maron. How complete is OpenStreetMap?

    Google Scholar 

  85. S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The International Journal on Very Large Data Bases, 20(4):541–566, 2011.

    Article  Google Scholar 

  86. D. McCullagh. Microsoft’s Web map exposes phone, PC locations, 2011.

    Google Scholar 

  87. G. McKenzie and K. Janowicz. Where is also about time: A location-distortion model to improve reverse geocoding using behavior-driven temporal semantic signatures. Computers, Environment and Urban Systems, 54:1–13, 2015.

    Article  Google Scholar 

  88. P. Meier. Crisis mapping in action: How open source software and global volunteer networks are changing the world, one map at a time. Journal of Map & Geography Libraries, 8(2):89–100, 2012.

    Article  Google Scholar 

  89. G. R. Milne and M. J. Culnan. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3):15–29, 2004.

    Article  Google Scholar 

  90. MIT. Real Time Rome.

    Google Scholar 

  91. A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS, 2011.

    Google Scholar 

  92. B. News. Ice age star map discovered, 2000.

    Google Scholar 

  93. J. D. Nielsen, J. I. Pagter, and M. B. Stausholm. Location privacy via actively secure private proximity testing. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 381–386. IEEE, 2012.

    Google Scholar 

  94. A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In NIPS Workshop on Analyzing Networks and Learning with Graphs, pages 2–88, 2009.

    Google Scholar 

  95. A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. IEEE Transactions on Mobile Computing, 2016.

    Google Scholar 

  96. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.

    Google Scholar 

  97. R. L. Penslar and J. Porter. Institutional review board guidebook. Retrieved July, 18:2003, 1993.

    Google Scholar 

  98. Pew Research Center. More Americans using smartphones for getting directions, streaming TV, Jan. 2016.

    Google Scholar 

  99. N. Polatidis, C. K. Georgiadis, E. Pimenidis, and E. Stiakakis. A method for privacy-preserving context-aware mobile recommendations. In International Conference on e-Democracy, pages 62–74. Springer, 2015.

    Google Scholar 

  100. K. Pomfret. Latitudes and attitudes: Zooming in on geospatial data, privacy and the law in the digital age. Centre for Spatial Law and Policy, 2013.

    Google Scholar 

  101. J. H. Reiman. Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Santa Clara Computer & High Tech. LJ, 11:27, 1995.

    Google Scholar 

  102. L. Rossi and M. Musolesi. It’s the way you check-in: identifying users in location-based social networks. In Proceedings of the second ACM conference on Online social networks, pages 215–226. ACM, 2014.

    Google Scholar 

  103. L. Rossi, M. Williams, C. Stich, and M. Musolesi. Privacy and the city: User identification and location semantics in location-based social networks. In Ninth International AAAI Conference on Web and Social Media, 2015.

    Google Scholar 

  104. Z. Sahnoune, C. Y. Yep, and E. Aïmeur. Privacy issues in geosocial networks. In International Conference on Risks and Security of Internet and Systems, pages 67–82. Springer, 2014.

    Google Scholar 

  105. M. Saini and A. El Saddik. Absence privacy loss. Computer, 48(11):102–105, 2015.

    Article  Google Scholar 

  106. D. Schoepe and A. Sabelfeld. Understanding and enforcing opacity. In 2015 IEEE 28th Computer Security Foundations Symposium, pages 539–553. IEEE, 2015.

    Google Scholar 

  107. K. G. Shin, X. Ju, Z. Chen, and X. Hu. Privacy protection for users of location-based services. IEEE Wireless Communications, 19(1):30–39, 2012.

    Article  Google Scholar 

  108. R. Shokri, M. Stronati, and V. Shmatikov. Membership inference attacks against machine learning models. arXiv preprint arXiv:1610.05820, 2016.

    Google Scholar 

  109. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In 2011 IEEE Symposium on Security and Privacy, pages 247–262. IEEE, 2011.

    Google Scholar 

  110. L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In International Symposium on Spatial and Temporal Databases, pages 405–410. Springer, 2009.

    Google Scholar 

  111. R. Soden and L. Palen. From crowdsourced mapping to community mapping: the post-earthquake work of openstreetmap haiti. In COOP 2014-Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27–30 May 2014, Nice (France), pages 311–326. Springer, 2014.

    Google Scholar 

  112. D. J. Solove. A taxonomy of privacy. University of Pennsylvania law review, pages 477–564, 2006.

    Google Scholar 

  113. H. Soroush, K. Sung, E. Learned-Miller, B. N. Levine, and M. Liberatore. Turning off gps is not enough: Cellular location leaks over the internet. In International Symposium on Privacy Enhancing Technologies Symposium, pages 103–122. Springer, 2013.

    Google Scholar 

  114. A. Staff. Location Sharing Is Easier Than You Think, 2016.

    Google Scholar 

  115. D. T. Staff. The history of social networking, May 2016.

    Google Scholar 

  116. B. Steele. NPR’s Gravitas, Sept. 2002.

    Google Scholar 

  117. F. Stutzman, R. Capra, and J. Thompson. Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1):590–598, 2011.

    Article  Google Scholar 

  118. F. Stutzman, R. Gross, and A. Acquisti. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of privacy and confidentiality, 4(2):2, 2013.

    Google Scholar 

  119. N. J. Thrower. Maps and civilization: cartography in culture and society. University of Chicago Press, 2008.

    Book  Google Scholar 

  120. L. Tompson, S. Johnson, M. Ashby, C. Perkins, and P. Edwards. Uk open source crime data: accuracy and possibilities for research. Cartography and Geographic Information Science, 42(2):97–111, 2015.

    Article  Google Scholar 

  121. M.-T. Tran, I. Echizen, and A.-D. Duong. Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services. In Availability, Reliability, and Security, 2010. ARES’10 International Conference on, pages 580–585. IEEE, 2010.

    Google Scholar 

  122. J. Y. Tsai, P. G. Kelley, L. F. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. ISJLP, 6:119, 2010.

    Google Scholar 

  123. U.S. Department of Commerce Economic and Statistics Administration, U.S. Census Bureau. Small area income and poverty estimates (saipe) program, 2014.

    Google Scholar 

  124. A. Uteck. Ubiquitous computing and spatial privacy. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pages 83–101, 2009.

    Google Scholar 

  125. S. Utz and N. Kramer. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2):2, 2009.

    Google Scholar 

  126. VB Insight. Identity and marketing: Capturing, unifying, and using customer data to drive revenue growth | Insight | VentureBeat, 2015.

    Google Scholar 

  127. VCloudNews. Every Day Big Data Statistics – 2.5 Quintillion Bytes of Data Created Daily.

    Google Scholar 

  128. C. R. Vicente, I. Assent, and C. S. Jensen. Effective privacy-preserving online route planning. In 2011 IEEE 12th International Conference on Mobile Data Management, volume 1, pages 119–128. IEEE, 2011.

    Google Scholar 

  129. C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20–27, 2011.

    Article  Google Scholar 

  130. B. Vladlena, G. Saridakis, H. Tennakoon, and J. N. Ezingeard. The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80:36–44, 2015.

    Article  Google Scholar 

  131. N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. How others compromise your location privacy: The case of shared public ips at hotspots. In International Symposium on Privacy Enhancing Technologies Symposium, pages 123–142. Springer, 2013.

    Google Scholar 

  132. I. Wagner and D. Eckhoff. Technical privacy metrics: A systematic survey. arXiv preprint arXiv:1512.00327, 2015.

    Google Scholar 

  133. M. Wall. Big Data: Are you ready for blast-off? BBC News, Mar. 2014.

    Google Scholar 

  134. S. D. Warren and L. D. Brandeis. The right to privacy. Harvard law review, pages 193–220, 1890.

    Article  Google Scholar 

  135. J. Wartell and J. T. McEwen. Privacy in the information age: A guide for sharing crime maps and spatial data series: Research report. Institute for Law and Justice, U.S. Department of Justice, Office of Justice Programs, 2001.

    Google Scholar 

  136. D. Wyatt, T. Choudhury, J. Bilmes, and J. A. Kitts. Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science. ACM Transactions on Intelligent Systems and Technology (TIST), 2(1):7, 2011.

    Article  Google Scholar 

  137. D. Yang, D. Zhang, V. W. Zheng, and Z. Yu. Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(1):129–142, 2015.

    Article  Google Scholar 

  138. J. Ye, Z. Zhu, and H. Cheng. What’s your next move: User activity prediction in location-based social networks. In Proceedings of the SIAM International Conference on Data Mining. SIAM. SIAM, 2013.

    Google Scholar 

  139. A. L. Young and A. Quan-Haase. Privacy protection strategies on facebook: The internet privacy paradox revisited. Information, Communication & Society, 16(4):479–500, 2013.

    Article  Google Scholar 

  140. M. Yutaka, O. Naoaki, I. Kiyoshi, et al. Inferring long-term user property based on users’ location history. In Proceedings of the IJCAI. IJCAI, 2007.

    Google Scholar 

  141. P. A. Zandbergen. Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5–25, 2009.

    Article  Google Scholar 

  142. Z. Zhang, L. Zhou, X. Zhao, G. Wang, Y. Su, M. Metzger, H. Zheng, and B. Y. Zhao. On the validity of geosocial mobility traces. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, page 11. ACM, 2013.

    Google Scholar 

  143. D. Zheng, T. Hu, Q. You, H. Kautz, and J. Luo. Towards lifestyle understanding: Predicting home and vacation locations from user’s online photo collections. In Proceedings of the 9th International AAAI Conference on Web and Social Media, pages 553–560, 2015.

    Google Scholar 

  144. Y. Zheng. Location-based social networks: Users. In Computing with spatial trajectories, pages 243–276. Springer, 2011.

    Google Scholar 

  145. G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In International Workshop on Privacy Enhancing Technologies, pages 62–76. Springer, 2007.

    Google Scholar 

  146. M. Zook, M. Graham, T. Shelton, and S. Gorman. Volunteered geographic information and crowdsourcing disaster relief: a case study of the haitian earthquake. World Medical & Health Policy, 2(2):7–33, 2010.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Bilogrevic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bilogrevic, I. (2018). Privacy in Geospatial Applications and Location-Based Social Networks. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98161-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98160-4

  • Online ISBN: 978-3-319-98161-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics