Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Anonymizing mobility data using semantic cloaking
Barak O., Cohen G., Toch E. Pervasive and Mobile Computing28 (C):102-112,2016.Type:Article
Date Reviewed: Jul 20 2016

Outside of a sci-fi reference, semantic cloaking is an approach for obscuring a user’s location and ensuring identity anonymity while still supporting many online location services. With increased and harmful data breaches, this approach can both hide the mobility dataset of a user and also aggregate her location in the crowd.

Compared with encryption or location sharing, this cloaking is done by completely removing physical locations and replacing them with semantic locations, such as home or work. The original user’s identity cannot be found even by analyzing all the data. This is done by merging consecutive waypoints, looking at attributes such as time and distance, and analyzing stationary aspects of the user’s location. These physical trajectories are then correlated with physical points of interest from other data sources. The label choices are important since reduced privacy might result in being left out of popular crowds.

The authors developed a four-state semantic labeling framework to explore distinct episodes in the data, including places, transitions, and stationary time. A machine learning classifier then combines it all to provide semantic inference. Their approach relies on training with large ground truth datasets, and choosing the best approaches by accuracy, area under the receiving curve, and per label precision and recall. The strongest semantic location obfuscation can then be chosen based on these user datasets.

The paper provides an extensive evaluation of their semantic cloaking approach on large user location datasets. They show how the number of spatial points changes the accuracy of their algorithms, as does the number of physical and semantic location options. The authors acknowledge that their approach only works where physical locations can be mapped to semantic locations, so move-by-move navigation is not an appropriate scenario. However, where appropriate, semantic cloaking could provide an important tool for user mobility privacy.

Reviewer:  Scott Moody Review #: CR144606 (1612-0942)
Bookmark and Share
  Featured Reviewer  
 
Privacy (K.4.1 ... )
 
 
Wireless Communication (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Privacy": Date
Handbook of personal data protection
Madsen W., Stockton Press, New York, NY, 1992. Type: Book (9780333569207)
Nov 1 1993
Privacy and security issues in information systems
Turn R., Ware W., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
Data bases
Burnham D., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy