scholarly journals GLOVE: Towards Privacy-Preserving Publishing of Record-Level-Truthful Mobile Phone Trajectories

2021 ◽  
Vol 2 (3) ◽  
pp. 1-36
Author(s):  
Marco Gramaglia ◽  
Marco Fiore ◽  
Angelo Furno ◽  
Razvan Stanica

Datasets of mobile phone trajectories collected by network operators offer an unprecedented opportunity to discover new knowledge from the activity of large populations of millions. However, publishing such trajectories also raises significant privacy concerns, as they contain personal data in the form of individual movement patterns. Privacy risks induce network operators to enforce restrictive confidential agreements in the rare occasions when they grant access to collected trajectories, whereas a less involved circulation of these data would fuel research and enable reproducibility in many disciplines. In this work, we contribute a building block toward the design of privacy-preserving datasets of mobile phone trajectories that are truthful at the record level. We present GLOVE, an algorithm that implements k -anonymity, hence solving the crucial unicity problem that affects this type of data while ensuring that the anonymized trajectories correspond to real-life users. GLOVE builds on original insights about the root causes behind the undesirable unicity of mobile phone trajectories, and leverages generalization and suppression to remove them. Proof-of-concept validations with large-scale real-world datasets demonstrate that the approach adopted by GLOVE allows preserving a substantial level of accuracy in the data, higher than that granted by previous methodologies.

2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Jinbao Wang ◽  
Ling Tian ◽  
Yan Huang ◽  
Donghua Yang ◽  
Hong Gao

Modern applications and services leveraged by interactive cyberphysical systems (CPS) are providing significant convenience to our daily life in various aspects at present. Clients submit their requests including query contents to CPS servers to enjoy diverse services such as health care, automatic driving, and location-based services. However, privacy concerns arise at the same time. Content privacy is recognized and a lot of efforts have been made in the literature of privacy preserving in interactive cyberphysical systems such as location-based services. Nevertheless, neither the cloaking based solutions nor existing client based solutions have achieved effective content privacy by optimizing proper content privacy metrics. In this paper we formulate the problem of achieving the optimal content privacy in interactive cyberphysical systems using k-anonymity solutions based on two content privacy metrics, which are defined using the concepts of entropy and differential privacy. Then we propose an algorithm, Multilayer Alignment (MLA), to establish k-anonymity mechanisms for preserving content privacy in interactive cyberphysical systems. Our proposed MLA is theoretically proved to achieve the optimal content privacy in terms of both the entropy based and the differential privacy mannered content privacy metrics. Evaluation based on real-life datasets is conducted, and the evaluation results validate the effectiveness of our proposed algorithm.


2020 ◽  
Author(s):  
Maria Angelica Carrillo ◽  
Axel Kroeger ◽  
Rocio Cardenas Sanchez ◽  
Sonia Diaz Monsalve ◽  
Silvia Runge Ranzinger

Abstract Background: The rapid expansion of dengue, Zika and chikungunya with large scale outbreaks are an increasing public health concern in many countries. Additionally, the recent coronavirus pandemic urged the need to get connected for fast information transfer and exchange. As response, health programmes have -among other interventions- incorporated digital tools such as mobile phones for supporting the control and prevention of infectious diseases. However, little is known about the benefits of mobile phone technology in terms of input, process and outcome dimensions. The purpose of this scoping review is to analyse the evidence of the use of mobile phones as an intervention tool regarding the performance, acceptance, usability, feasibility, cost and effectiveness in dengue, Zika and chikungunya control programmes. Methods: We conducted a scoping review of studies and reports by systematically searching: i) electronic databases (PubMed, PLOS ONE, PLOS Neglected Tropical Disease, LILACS, WHOLIS, ScienceDirect and Google scholar), ii) grey literature, using Google web and iii) documents in the list of references of the selected papers. Selected studies were categorized using a pre-determined data extraction form. Finally, a narrative summary of the evidence related to general characteristics of available mobile health tools and outcomes was produced. Results: The systematic literature search identified 1289 records, 32 of which met the inclusion criteria. From the reference lists of included articles 4 records were identified coming to a total of 36 studies. The content analysis identified five mobile phone categories: mobile applications (n = 18), short message services (n=7), camera phone (n = 6), mobile phone tracking data (n = 4), and simple mobile communication (n = 1). These devices were used for surveillance, prevention and management. In general, mobile phone-based studies reported good performance, acceptance by users, usability in downloads as well as feasibility of mobile phone under real life conditions and effectiveness in terms of contributing to a reduction of vectors and disease. It can be concluded that there are great opportunities for using mobile phones in the fight against arboviral diseases as well as other epidemic diseases . Further studies particularly on acceptance, cost and effectiveness at scale are recommended.


2020 ◽  
Author(s):  
Maria Angelica Carrillo ◽  
Axel Kroeger ◽  
Rocio Cardenas Sanchez ◽  
Sonia Diaz Monsalve ◽  
Silvia Runge Ranzinger

Abstract Background: The rapid expansion of dengue, Zika and chikungunya with large scale outbreaks are an increasing public health concern in many countries. Additionally, the recent coronavirus pandemic urged the need to get connected for fast information transfer and exchange. As response, health programmes have -among other interventions- incorporated digital tools such as mobile phones for supporting the control and prevention of infectious diseases. However, little is known about the benefits of mobile phone technology in terms of input, process and outcome dimensions. The purpose of this scoping review is to analyse the evidence of the use of mobile phones as an intervention tool regarding the performance, acceptance, usability, feasibility, cost and effectiveness in dengue, Zika and chikungunya control programmes.Methods: We conducted a scoping review of studies and reports by systematically searching: i) electronic databases (PubMed, PLOS ONE, PLOS Neglected Tropical Disease, LILACS, WHOLIS, ScienceDirect and Google scholar), ii) grey literature, using Google web and iii) documents in the list of references of the selected papers. Selected studies were categorized using a pre-determined data extraction form. Finally, a narrative summary of the evidence related to general characteristics of available mobile health tools and outcomes was produced.Results: The systematic literature search identified 1289 records, 32 of which met the inclusion criteria and 4 records from the reference lists. A total of 36 studies were included coming from twenty different countries. Five mobile phone services were identified in this review: mobile applications (n = 18), short message services (n=7), camera phone (n = 6), mobile phone tracking data (n = 4), and simple mobile communication (n = 1). Mobile phones were used for surveillance, prevention, diagnosis, and communication demonstrating good performance, acceptance and usability by users, as well as feasibility of mobile phone under real life conditions and effectiveness in terms of contributing to a reduction of vectors/ disease and improving users-oriented behaviour changes. It can be concluded that there are benefits for using mobile phones in the fight against arboviral diseases as well as other epidemic diseases. Further studies particularly on acceptance, cost and effectiveness at scale are recommended.


2019 ◽  
Vol 2019 ◽  
pp. 1-17 ◽  
Author(s):  
Upul Jayasinghe ◽  
Gyu Myoung Lee ◽  
Áine MacDermott ◽  
Woo Seop Rhee

Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative services for its stakeholders. Yet, this paradigm continuously suffers from numerous security and privacy concerns mainly due to its massive scale, distributed nature, and scarcity of resources towards the edge of IoT networks. Interestingly, blockchain based techniques offer strong countermeasures to protect data from tampering while supporting the distributed nature of the IoT. However, the enormous amount of energy consumption required to verify each block of data make it difficult to use with resource-constrained IoT devices and with real-time IoT applications. Nevertheless, it can expose the privacy of the stakeholders due to its public ledger system even though it secures data from alterations. Edge computing approaches suggest a potential alternative to centralized processing in order to populate real-time applications at the edge and to reduce privacy concerns associated with cloud computing. Hence, this paper suggests the novel privacy preserving blockchain called TrustChain which combines the power of blockchains with trust concepts to eliminate issues associated with traditional blockchain architectures. This work investigates how TrustChain can be deployed in the edge computing environment with different levels of absorptions to eliminate delays and privacy concerns associated with centralized processing and to preserve the resources in IoT networks.


Author(s):  
Mirco Nanni ◽  
Gennady Andrienko ◽  
Albert-László Barabási ◽  
Chiara Boldrini ◽  
Francesco Bonchi ◽  
...  

AbstractThe rapid dynamics of COVID-19 calls for quick and effective tracking of virus transmission chains and early detection of outbreaks, especially in the “phase 2” of the pandemic, when lockdown and other restriction measures are progressively withdrawn, in order to avoid or minimize contagion resurgence. For this purpose, contact-tracing apps are being proposed for large scale adoption by many countries. A centralized approach, where data sensed by the app are all sent to a nation-wide server, raises concerns about citizens’ privacy and needlessly strong digital surveillance, thus alerting us to the need to minimize personal data collection and avoiding location tracking. We advocate the conceptual advantage of a decentralized approach, where both contact and location data are collected exclusively in individual citizens’ “personal data stores”, to be shared separately and selectively (e.g., with a backend system, but possibly also with other citizens), voluntarily, only when the citizen has tested positive for COVID-19, and with a privacy preserving level of granularity. This approach better protects the personal sphere of citizens and affords multiple benefits: it allows for detailed information gathering for infected people in a privacy-preserving fashion; and, in turn this enables both contact tracing, and, the early detection of outbreak hotspots on more finely-granulated geographic scale. The decentralized approach is also scalable to large populations, in that only the data of positive patients need be handled at a central level. Our recommendation is two-fold. First to extend existing decentralized architectures with a light touch, in order to manage the collection of location data locally on the device, and allow the user to share spatio-temporal aggregates—if and when they want and for specific aims—with health authorities, for instance. Second, we favour a longer-term pursuit of realizing a Personal Data Store vision, giving users the opportunity to contribute to collective good in the measure they want, enhancing self-awareness, and cultivating collective efforts for rebuilding society.


2020 ◽  
Author(s):  
Maria Angelica Carrillo ◽  
Axel Kroeger ◽  
Rocio Cardenas Sanchez ◽  
Sonia Diaz Monsalve ◽  
Silvia Runge Ranzinger

Abstract Background: The rapid expansion of dengue, Zika and chikungunya with large scale outbreaks are an increasing public health concern in many countries. Additionally, the recent coronavirus pandemic urged the need to get connected for fast information transfer and exchange. As response, health programmes have -among other interventions- incorporated digital tools such as mobile phones for supporting the control and prevention of infectious diseases. However, little is known about the benefits of mobile phone technology in terms of input, process and outcome dimensions. The purpose of this scoping review is to analyse the evidence of the use of mobile phones as an intervention tool regarding the performance, acceptance, usability, feasibility, cost and effectiveness in dengue, Zika and chikungunya control programmes.Methods: We conducted a scoping review of studies and reports by systematically searching: i) electronic databases (PubMed, PLOS ONE, PLOS Neglected Tropical Disease, LILACS, WHOLIS, ScienceDirect and Google scholar), ii) grey literature, using Google web and iii) documents in the list of references of the selected papers. Selected studies were categorized using a pre-determined data extraction form. Finally, a narrative summary of the evidence related to general characteristics of available mobile health tools and outcomes was produced. Results: The systematic literature search identified 1289 records, 32 of which met the inclusion criteria and 4 records from the reference lists. A total of 36 studies were included coming from twenty different countries. Five mobile phone services were identified in this review: mobile applications (n = 18), short message services (n=7), camera phone (n = 6), mobile phone tracking data (n = 4), and simple mobile communication (n = 1). Mobile phones were used for surveillance, prevention, diagnosis, and communication demonstrating good performance, acceptance and usability by users, as well as feasibility of mobile phone under real life conditions and effectiveness in terms of contributing to a reduction of vectors/ disease and improving users-oriented behaviour changes. It can be concluded that there are great opportunities for using mobile phones in the fight against arboviral diseases as well as other epidemic diseases. Further studies particularly on acceptance, cost and effectiveness at scale are recommended.


2020 ◽  
Author(s):  
Imdad Ullah ◽  
Roksana Boreli ◽  
Salil S. Kanhere

Targeted advertising has transformed the marketing trend for any business by creating new opportunities for advertisers to reach prospective customers by delivering them personalised ads using an infrastructure of a variety of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a rich amount of user's personal data, which has prompted serious privacy concerns among individuals and organisations. This article presents a detailed survey of privacy risks including the information flow between advertising platform and ad/analytics networks, the profiling process, the advertising sources and criteria, the measurement analysis of targeted advertising based on user's interests and profiling context and ads delivery process in both in-app and in-browser targeted ads. We provide detailed discussion of challenges in preserving user privacy that includes privacy threats posed by the advertising and analytics companies, how private information is extracted and exchanged among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks, in addition to, overview data and tracking sharing technologies. Following, we present various techniques for preserving user privacy and a comprehensive analysis of various proposals founded on those techniques and compare them based on the underlying architectures, the privacy mechanisms and the deployment scenarios. Finally we discuss some potential research challenges and open research issues.<br>


2020 ◽  
Author(s):  
Imdad Ullah ◽  
Roksana Boreli ◽  
Salil S. Kanhere

Targeted advertising has transformed the marketing trend for any business by creating new opportunities for advertisers to reach prospective customers by delivering them personalised ads using an infrastructure of a variety of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a rich amount of user's personal data, which has prompted serious privacy concerns among individuals and organisations. This article presents a detailed survey of privacy risks including the information flow between advertising platform and ad/analytics networks, the profiling process, the advertising sources and criteria, the measurement analysis of targeted advertising based on user's interests and profiling context and ads delivery process in both in-app and in-browser targeted ads. We provide detailed discussion of challenges in preserving user privacy that includes privacy threats posed by the advertising and analytics companies, how private information is extracted and exchanged among various advertising entities, privacy threats from third-party tracking, re-identification of private information and associated privacy risks, in addition to, overview data and tracking sharing technologies. Following, we present various techniques for preserving user privacy and a comprehensive analysis of various proposals founded on those techniques and compare them based on the underlying architectures, the privacy mechanisms and the deployment scenarios. Finally we discuss some potential research challenges and open research issues.<br>


2021 ◽  
Author(s):  
Olumide Babalola

Internet of Things (IoT) refers to the seamless communication and interconnectivity of multiple devices within a certain network enabled by sensors and other technologies facilitating unusual processing of personal data for the performance of a certain goal. This article examines the various definitions of the IoT from technical and socio-technical perspectives and goes ahead to describe some practical examples of IoT by demonstrating their functionalities vis a vis the anticipated privacy and information security implications. Predominantly, the article discusses the information security and privacy risks posed by the operationality of IoT as envisaged under the EU GDPR and makes a few recommendations on how to address the risks.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Hua Dai ◽  
Xuelong Dai ◽  
Xiao Li ◽  
Xun Yi ◽  
Fu Xiao ◽  
...  

In the interest of privacy concerns, cloud service users choose to encrypt their personal data before outsourcing them to cloud. However, it is difficult to achieve efficient search over encrypted cloud data. Therefore, how to design an efficient and accurate search scheme over large-scale encrypted cloud data is a challenge. In this paper, we integrate bisecting k-means algorithm and multibranch tree structure and propose the α-filtering tree search scheme based on bisecting k-means clusters. The novel index tree is built from bottom-up, and a greedy depth first algorithm is used for filtering the nonrelevant document cluster by calculating the relevance score between the filtering vector and the query vector. The α-filtering tree can improve the efficiency without the loss of search accuracy. The experiment on a real-world dataset demonstrates the effectiveness of our scheme.


Sign in / Sign up

Export Citation Format

Share Document