Abstract
This paper describes and evaluates three methods for anonymizing location data in the context of an example of practical relevance. These anonymization methods are designed for a smartphone-based system to integrate voluntary helpers into professional rescue processes, especially in case of time-critical medical emergencies, but can also be used for other collaboration approaches. We analyze the methods with a focus on anonymity of the operation site, precision and filtering.
References
Detjen, H., Hoffmann, S., Rösner, L., Winter, S., Geisler, S., Krämer, N., Bumiller, G.: Integrating volunteers into rescue processes: analysis of user requirements and mobile app conception. Int. J. Inf. Syst. Crisis Response Manag. 7, 1–18 (2015)
Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557–570 (2002)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond K-anonymity. ACM Trans. Knowl. Discov. Data 1, 3 (2007)
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering (2007)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1
Vagts, H.-H.: Privatheit und Datenschutz in der intelligenten Überwachung. KIT Scientific Publishing, Karlsruhe (2013)
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, California (2003)
Masoumzadeh, A., Joshi, J., Karimi, H.A.: LBS (K, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, Washington (2009)
European Commission, “europa.eu”. http://ec.europa.eu/eurostat/de/web/population-and-housing-census/census-data/2011-census. Accessed May 10 2016
Kim, J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the Section on Survey Research Methods of the American (1986)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Detjen, H., Hoffmann, S., Bumiller, G., Geisler, S., Jansen, M., Markard, M. (2017). Anonymity-Preserving Methods for Client-Side Filtering in Position-Based Collaboration Approaches. In: Yoshino, T., Yuizono, T., Zurita, G., Vassileva, J. (eds) Collaboration Technologies and Social Computing. CollabTech 2017. Lecture Notes in Computer Science(), vol 10397. Springer, Cham. https://doi.org/10.1007/978-3-319-63088-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-63088-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63087-8
Online ISBN: 978-3-319-63088-5
eBook Packages: Computer ScienceComputer Science (R0)