Skip to main content

Anonymisierung von Floating Car Data

  • Chapter
  • First Online:
Management digitaler Plattformen

Zusammenfassung

Floating Car Data (FCD) können sensible persönliche Informationen wie Adressen, das Freizeitverhalten, Arztbesuche oder Arbeitstätigkeiten beinhalten. Auf der ExCELL Plattform sind umfangreiche Datensätze in Form von FCD vorhanden. Aus den obigen Gründen kann dieser Datenschatz der Allgemeinheit nicht als Open Data zur Verfügung gestellt werden. Die Lösung für dieses Problem besteht in der Anonymisierung der Datensätze, da aus anonymisierten Daten keine Rückschlüsse auf Personen möglich sind. Infolgedessen erkennt und entfernt ein Anonymisierungsservice auf der ExCELL Plattform sensible Bereiche in den FCD ohne die statistische Struktur der Daten zu verändern. Das Ergebnis der Anonymisierung sind Daten, die auf der ExCELL Plattform als Open Data bereitgestellt werden können.

Das Forschungsprojekt ExCELL wurde mit Mitteln des Bundesministeriums für Wirtschaft und Energie (BMWi) gefördert (Förderkennzeichen: 01MD15001B).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  • Bezzi M (2010) An information theoretic approach for privacy metrics. Trans Data Privacy 3 (3): S. 199-215.

    Google Scholar 

  • Douriez M, Doraiswamy H, Freire J, Silva CT (2016) Anonymizing NYC Taxi Data: Does It Matter?, IEEE International Conference on Data Science and Advanced Analytics (DSAA).

    Google Scholar 

  • Dwork C (2008) Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation.

    Google Scholar 

  • Gambs S, Killijian M-O, del Prado Cortez MN (2010) Show me how you move and I will tell you who you are, 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS.

    Google Scholar 

  • Ghinita G, Karras P, Kalnis P, Mamoulis N (2007) Fast data anonymization with low information loss, 33rd International Conference on Very Large Data Bases.

    Google Scholar 

  • Golle P, Partridge K (2009) On the anonymity of home/work location pairs. Pervasive Computing: S. 390-397.

    Google Scholar 

  • Gulcher JR, Kristjánsson K, Gudbjartsson H, Stefánsson K (2000) Protection of privacy by third-party encryption in genetic research in Iceland. European journal of human genetics: EJHG 8 (10): S. 739.

    Google Scholar 

  • Herrera JC, Work DB, Herring R, Ban XJ, Jacobson Q, Bayen AM (2010) Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment. Transportation Research Part C: Emerging Technologies 18 (4): S. 568-583.

    Google Scholar 

  • Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in gps traces via uncertainty-aware path cloaking, 14th ACM Conference on Computer and Communications Security.

    Google Scholar 

  • Jakobsson M, Juels A, Rivest RL (2002) Making mix nets robust for electronic voting by randomized partial checking, USENIX Security Symposium.

    Google Scholar 

  • Li N, Li T, Venkatasubramanian S (2007) t-closeness: Privacy beyond k-anonymity and l-diversity, 23rd International Conference on Data Engineering.

    Google Scholar 

  • Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-diversity: Privacy beyond k-anonymity, Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on.

    Google Scholar 

  • Maruseac M, Ghinita G (2016) Processing uncertain spatial data resulting from differentially-private sanitization. SIGSPATIAL Special 8 (2): S. 26-34.

    Google Scholar 

  • Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services, IEEE INFOCOM.

    Google Scholar 

  • Palanisamy B, Liu L (2014) Effective mix-zone anonymization techniques for mobile travelers. Geoinformatica 18 (1): S. 135-164.

    Google Scholar 

  • Rass S, Fuchs S, Schaffer M, Kyamakya K (2008) How to protect privacy in floating car data systems, ACM International Workshop on VehiculAr Inter-NETworking.

    Google Scholar 

  • Shokri R, Troncoso C, Diaz C, Freudiger J, Hubaux J-P (2010) Unraveling an old cloak: k-anonymity for location privacy, 9th Annual ACM workshop on Privacy in the Electronic Society.

    Google Scholar 

  • Yang D, Fang X, Xue G (2013) Truthful incentive mechanisms for k-anonymity location privacy, INFOCOM, 2013 Proceedings IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephan Pieper .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pieper, S., Kunde, F., Sauer, P. (2018). Anonymisierung von Floating Car Data. In: Wiesche, M., Sauer, P., Krimmling, J., Krcmar, H. (eds) Management digitaler Plattformen. Informationsmanagement und digitale Transformation. Springer Gabler, Wiesbaden. https://doi.org/10.1007/978-3-658-21214-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-21214-8_18

  • Published:

  • Publisher Name: Springer Gabler, Wiesbaden

  • Print ISBN: 978-3-658-21213-1

  • Online ISBN: 978-3-658-21214-8

  • eBook Packages: Business and Economics (German Language)

Publish with us

Policies and ethics