Privacy in Geospatial Applications and Location-Based Social Networks

The use of location data has greatly benefited from the availability of location-based services, the popularity of social networks, and the accessibility of public location data sets. However, in addition to providing users with the ability to obtain accurate driving directions or the convenience of geo-tagging friends and pictures, location is also a very sensitive type of data, as attested by more than a decade of research on different aspects of privacy related to location data.

[1]  Stanislaw P. Radziszowski,et al.  Homomorphic proximity computation in geosocial networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[2]  Klemens Böhm,et al.  Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services , 2009, OTM Conferences.

[3]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[4]  Shane D. Johnson,et al.  UK open source crime data: accuracy and possibilities for research , 2015 .

[5]  Mirco Musolesi,et al.  Privacy and the City: User Identification and Location Semantics in Location-Based Social Networks , 2015, ICWSM.

[6]  Debra Herrmann,et al.  Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .

[7]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Amy J. Blatt,et al.  The Benefits and Risks of Volunteered Geographic Information , 2015 .

[9]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[10]  Satish V. Ukkusuri,et al.  Location Contexts of User Check-Ins to Model Urban Geo Life-Style Patterns , 2015, PloS one.

[11]  Graham D. Burchell,et al.  The Foucault Effect: Studies in Governmentality , 1991 .

[12]  Gang Wang,et al.  On the validity of geosocial mobility traces , 2013, HotNets.

[13]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  Jeremy W. Crampton,et al.  Mapping: A Critical Introduction to Cartography and GIS , 2010 .

[15]  Pern Hui Chia,et al.  Interdependent Privacy: Let Me Share Your Data , 2013, Financial Cryptography.

[16]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[17]  S. Utz,et al.  The privacy paradox on social network sites revisited: The role of individual characteristics and group norms , 2009 .

[18]  Sabine Trepte,et al.  Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors , 2015 .

[19]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[20]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[21]  Norman Joseph William Thrower Maps and Civilization: Cartography in Culture and Society , 1996 .

[22]  Marco Furini Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants , 2014, Adv. Hum. Comput. Interact..

[23]  Bartha M Knoppers,et al.  Sharing health-related data: a privacy test? , 2016, npj Genomic Medicine.

[24]  M. Goodchild Citizens as sensors: the world of volunteered geography , 2007 .

[25]  Vladlena Benson,et al.  Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? , 2015, Inf. Technol. People.

[26]  D. Lazer,et al.  The Parable of Google Flu: Traps in Big Data Analysis , 2014, Science.

[27]  Satish V. Ukkusuri,et al.  Understanding Social Influence in Activity Location Choice and Lifestyle Patterns Using Geolocation Data from Social Media , 2016, Front. ICT.

[28]  Esma Aïmeur,et al.  Privacy Issues in Geosocial Networks , 2014, CRiSIS.

[29]  Timothy Baldwin,et al.  Text-Based Twitter User Geolocation Prediction , 2014, J. Artif. Intell. Res..

[30]  R. Kitchin,et al.  The real-time city? Big data and smart urbanism , 2013, GeoJournal.

[31]  Leysia Palen,et al.  From Crowdsourced Mapping to Community Mapping: The Post-earthquake Work of OpenStreetMap Haiti , 2014, COOP.

[32]  Krzysztof Janowicz,et al.  Can Twitter data be used to validate travel demand models , 2015 .

[33]  Bandana Kar,et al.  Is My Information Private? Geo-Privacy in the World of Social Media , 2014, GIO@GIScience.

[34]  Christian S. Jensen,et al.  Location-Related Privacy in Geo-Social Networks , 2011, IEEE Internet Computing.

[35]  K. Bowers,et al.  Crime Mapping On-line: Public Perception of Privacy Issues , 2014, European Journal on Criminal Policy and Research.

[36]  Rafail Ostrovsky,et al.  Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.

[37]  Jeff A. Bilmes,et al.  Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science , 2011, TIST.

[38]  Janus Dam Nielsen,et al.  Location privacy via actively secure private proximity testing , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[39]  Hisashi Kobayashi,et al.  Signal strength based indoor geolocation , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[40]  Jonathan Katz,et al.  Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution , 2012, 2012 IEEE Symposium on Security and Privacy.

[41]  Valtteri Niemi,et al.  Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks , 2012, Pervasive.

[42]  Hyang-Sook Kim,et al.  What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing , 2016, Comput. Hum. Behav..

[43]  Sang Michael Xie,et al.  Combining satellite imagery and machine learning to predict poverty , 2016, Science.

[44]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[45]  Xing Xie,et al.  Collaborative activity recognition via check-in history , 2011, LBSN '11.

[46]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[47]  Robert G. Capra,et al.  Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..

[48]  Lilian Mitrou,et al.  Which side are you on? A new Panopticon vs. privacy , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[49]  Jessica Vitak,et al.  Digital footprints: online identity management and search in the age of transparency , 2007 .

[50]  S. Gorman,et al.  Volunteered Geographic Information and Crowdsourcing Disaster Relief: A Case Study of the Haitian Earthquake , 2010 .

[51]  G. Annas HIPAA regulations - a new era of medical-record privacy? , 2003, The New England journal of medicine.

[52]  Kôiti Hasida,et al.  Inferring Long-term User Properties Based on Users' Location History , 2007, IJCAI.

[53]  Mary J. Culnan,et al.  Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .

[54]  Christian S. Jensen,et al.  Effective Privacy-Preserving Online Route Planning , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.

[55]  Hua Lu,et al.  Location Privacy Techniques in Client-Server Architectures , 2009, Privacy in Location-Based Applications.

[56]  Mehmet Hadi Gunes,et al.  How to Find Hidden Users: A Survey of Attacks on Anonymity Networks , 2015, IEEE Communications Surveys & Tutorials.

[57]  Igor Bilogrevic,et al.  (Smart)watch your taps: side-channel keystroke inference attacks using smartwatches , 2015, SEMWEB.

[58]  Abdulmotaleb El-Saddik,et al.  Absence Privacy Loss , 2015, Computer.

[59]  Rasika Dayarathna,et al.  Taxonomy for Information Privacy Metrics , 2011 .

[60]  Jean-Noël Ezingeard,et al.  The role of security notices and online consumer behaviour: An empirical study of social networking users , 2015, Int. J. Hum. Comput. Stud..

[61]  Davy Janssens,et al.  Characterizing activity sequences using profile Hidden Markov Models , 2015, Expert Syst. Appl..

[62]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[63]  Daqing Zhang,et al.  Modeling User Activity Preference by Leveraging User Spatial Temporal Characteristics in LBSNs , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[64]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[65]  Jean-Pierre Hubaux,et al.  How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots , 2013, Privacy Enhancing Technologies.

[66]  Paul A. Zandbergen,et al.  Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning , 2009 .

[67]  Niki Pissinou,et al.  A survey of privacy vulnerabilities and defenses in geosocial networks , 2013, IEEE Communications Magazine.

[68]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[69]  David Jurgens,et al.  That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships , 2013, ICWSM.

[70]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[71]  Panayiotis Kotzanikolaou,et al.  Lightweight private proximity testing for geospatial social networks , 2016, Comput. Commun..

[72]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[73]  P. Meier Crisis Mapping in Action: How Open Source Software and Global Volunteer Networks Are Changing the World, One Map at a Time , 2012 .

[74]  Jeremy W. Crampton,et al.  Cartographic Rationality and the Politics of Geosurveillance and Security , 2003 .

[75]  Sushil Jajodia,et al.  Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies , 2010, The VLDB Journal.

[76]  C. Cottrill,et al.  Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making , 2015 .

[77]  Amy J. Blatt,et al.  Data Privacy and Ethical Uses of Volunteered Geographic Information , 2015 .

[78]  Alessandro Acquisti,et al.  Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.

[79]  J. Reiman Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .

[80]  Minh-Triet Tran,et al.  Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services , 2010, 2010 International Conference on Availability, Reliability and Security.

[81]  Michele Bezzi,et al.  An information theoretic approach for privacy metrics , 2010, Trans. Data Priv..

[82]  Brian Neil Levine,et al.  Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet , 2013, Privacy Enhancing Technologies.

[83]  Ian Goldberg,et al.  Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.

[84]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[85]  Jean-Pierre Hubaux,et al.  On Non-cooperative Genomic Privacy , 2015, Financial Cryptography.

[86]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison , 2020, On Violence.

[87]  Yu Zheng,et al.  Location-Based Social Networks: Users , 2011, Computing with Spatial Trajectories.

[88]  Jean-Pierre Hubaux,et al.  Quantifying Interdependent Privacy Risks with Location Data , 2017, IEEE Transactions on Mobile Computing.

[89]  Frédéric Raynal,et al.  New threats and attacks on the World Wide Web , 2006, IEEE Security & Privacy.

[90]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[91]  Bartha Maria Knoppers,et al.  Exposing participants? Population biobanks go geo , 2015, European Journal of Human Genetics.

[92]  Satish V. Ukkusuri,et al.  Urban activity pattern classification using topic models from online geo-location data , 2014 .

[93]  Marco Gruteser,et al.  On the Anonymity of Periodic Location Samples , 2005, SPC.

[94]  S. Chainey,et al.  Engagement, Empowerment and Transparency: Publishing Crime Statistics using Online Crime Mapping , 2012 .

[95]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[96]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[97]  Francis Harvey,et al.  To Volunteer or to Contribute Locational Information? Towards Truth in Labeling for Crowdsourced Geographic Information , 2013 .

[98]  Jianliang Xu,et al.  Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks , 2013, IEEE Pervasive Computing.

[99]  Rob Kitchin,et al.  Data-Driven, Networked Urbanism , 2015 .

[100]  Christian S. Jensen,et al.  Preserving location and absence privacy in geo-social networks , 2010, CIKM '10.

[101]  Philippe Golle,et al.  On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.

[102]  Martin Ortlieb,et al.  "If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies , 2016, CHI.

[103]  Nikolaos Polatidis,et al.  A Method for Privacy-Preserving Context-Aware Mobile Recommendations , 2015, e-Democracy.

[104]  Zhe Zhu,et al.  What's Your Next Move: User Activity Prediction in Location-based Social Networks , 2013, SDM.

[105]  Mirco Musolesi,et al.  It's the way you check-in: identifying users in location-based social networks , 2014, COSN '14.

[106]  Cristian Borcea,et al.  GDC: Group Discovery Using Co-location Traces , 2010, 2010 IEEE Second International Conference on Social Computing.

[107]  Anabel Quan-Haase,et al.  PRIVACY PROTECTION STRATEGIES ON FACEBOOK , 2013 .

[108]  Krzysztof Janowicz,et al.  Where is also about time: A location-distortion model to improve reverse geocoding using behavior-driven temporal semantic signatures , 2015, Comput. Environ. Urban Syst..

[109]  Ove Andersen,et al.  A Location Privacy Aware Friend Locator , 2009, SSTD.

[110]  Andrei Sabelfeld,et al.  Understanding and Enforcing Opacity , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.